Diana Shazelin, Mohd Nasir (2012) Blaster.T Attack Pattern Generalization. Project Report. UTeM, Melaka, Malaysia. (Submitted)
![]()
|
PDF (24 Pages)
Blaster.T_Attack_Pattern_Generalization_-_24_Pages.pdf - Submitted Version Download (4MB) |
|
![]() |
PDF (Full Text)
Blaster.T_Attack_Pattern_Generalization_-_Full_Text.pdf - Submitted Version Restricted to Registered users only Download (30MB) |
Abstract
The number of malware variants is still persistent. The infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off. The current approach had used Intrusion Detection System (IDS) as a technique to detect this worm but it still not comprehensive enough because IDS can generate huge amounts of data. In this project, network traffic is explored to establish the attack pattern in order to reveal the true attacker or victim ofBlaster.T and identify the traces leave on the attacker and victim. This project will only concentrate on malware network intrusion and traditional worm namely Blaster worm variants. This project will trace pattern in attacker's and victim's perspective.Thus, the objectives of this project are to identify the features or attributes of mal ware in perspective of victim and attacker, to generate attack pattern for mal ware in perspective of victim and attacker and to generalize the attack pattern in perspective of victim and attacker.
Item Type: | Final Year Project (Project Report) |
---|---|
Uncontrolled Keywords: | Computer security, Computer networks -- Security measures |
Subjects: | Q Science > Q Science (General) Q Science > QA Mathematics > QA76 Computer software |
Divisions: | Library > Final Year Project > FTMK |
Depositing User: | Mi Azian Ab. Karim |
Date Deposited: | 23 Jan 2014 04:49 |
Last Modified: | 28 May 2015 04:12 |
URI: | http://digitalcollection.utem.edu.my/id/eprint/10612 |
Actions (login required)
![]() |
View Item |