Browse By Repository:

 
 
 
   

Blaster.T Attack Pattern Generalization

Diana Shazelin, Mohd Nasir (2012) Blaster.T Attack Pattern Generalization. Project Report. UTeM, Melaka, Malaysia. (Submitted)

[img]
Preview
PDF (24 Pages)
Blaster.T_Attack_Pattern_Generalization_-_24_Pages.pdf - Submitted Version

Download (4MB)
[img] PDF (Full Text)
Blaster.T_Attack_Pattern_Generalization_-_Full_Text.pdf - Submitted Version
Restricted to Registered users only

Download (30MB)

Abstract

The number of malware variants is still persistent. The infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off. The current approach had used Intrusion Detection System (IDS) as a technique to detect this worm but it still not comprehensive enough because IDS can generate huge amounts of data. In this project, network traffic is explored to establish the attack pattern in order to reveal the true attacker or victim ofBlaster.T and identify the traces leave on the attacker and victim. This project will only concentrate on malware network intrusion and traditional worm namely Blaster worm variants. This project will trace pattern in attacker's and victim's perspective.Thus, the objectives of this project are to identify the features or attributes of mal ware in perspective of victim and attacker, to generate attack pattern for mal ware in perspective of victim and attacker and to generalize the attack pattern in perspective of victim and attacker.

Item Type: Final Year Project (Project Report)
Uncontrolled Keywords: Computer security, Computer networks -- Security measures
Subjects: Q Science > Q Science (General)
Q Science > QA Mathematics > QA76 Computer software
Divisions: Library > Final Year Project > FTMK
Depositing User: Mi Azian Ab. Karim
Date Deposited: 23 Jan 2014 04:49
Last Modified: 28 May 2015 04:12
URI: http://digitalcollection.utem.edu.my/id/eprint/10612

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year