Tala Tafazzoli

Learn More
The term malware, in the area related to computer science, is used to define malicious code which is designed and written to execute attacks on software systems. In this paper, after a quick review of malact ontology, malware ontology is presented. Malwares include viruses, worms, botnets, spywares, backdoors, trojan horses, rootkits and exploits. In this(More)
Computer worms have infected millions of computers since the 1980s. For an incident handler or a forensic investigator, it is important to know whether the worm attack to the network has been initiated from multiple different sources or just from one node. In this paper, we study the problem of predicting the number of infectious origin nodes, when the(More)
Cybercrime is increasing at a faster pace and sometimes causes billions of dollars of businesslosses so investigating attackers after commitment is of utmost importance and become one of the main concerns of network managers. Network forensics as the process of Collecting, identifying, extracting and analyzing data and systematically monitoring traffic of(More)
Detection methods in Distributed Denial of Service attacks try to detect attacks before the target machine is shutdown. There are two major methods for attack detection in target, Anomaly and Pattern-Based. Pattern-based methods are sensitive to attack signatures and as such cannot detect attacks when the attack patterns change slightly. Anomaly methods, on(More)
  • 1