An improved traditional worm attack pattern

@article{Robiah2010AnIT,
  title={An improved traditional worm attack pattern},
  author={Y. Robiah and S. Siti Rahayu and S. Sainudeen Sahib and M. Mohd Zaki and M. A. Faizal and R. Marliza},
  journal={2010 International Symposium on Information Technology},
  year={2010},
  volume={2},
  pages={1067-1072}
}
The significant threats of traditional worms such as Blaster, Sasser, Code Red and Slammer are still continuing due to their hasty spreading nature on the internet. The worms attack pattern from three different scenarios have been extracted from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern are further analyzed to form the general worms' attack pattern which describes the process of worms' infection. This paper proposes a… CONTINUE READING

References

Publications referenced by this paper.
SHOWING 1-10 OF 10 REFERENCES

Introduction to Attack Patterns

S. Barnum, A. Sethi
  • 2006

On the Performance of Internet Worm Scanning Strategies

C. Z. Cliff, T. Don, G. Weibo
  • ACM Performance and Evaluation Journal.,
  • 2006

October). Win32lBlaster: A Case StudyFom

M. Braverman
  • 2005

Virus alert about the Blaster worm and its variants [ Electronic Version ]

Symantec.
  • 2003

Similar Papers

Loading similar papers…