The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms’ attack model which describes the process of worms’ infection. For the purpose of this paper, only Blaster variants were used during the experiment. This paper proposes a multi-step worm attack model which can be extended into research areas in alert correlation and computer forensic investigation
The significant threats of malware are still continuing due to their rapid distribution nature on th...
Internet worms pose a major threat to Internet infrastructure security, and their destruction is tru...
Computer worms are a type of malicious malware that prey on networked machines. A number of differe...
The significant threats of traditional worms such as Blaster, Sasser, Code Red and Slammer are still...
The number of malware variants is growing tremendously and the study of malware attacks on the Inter...
Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned t...
The number of crime committed based on the malware intrusion is never ending as the number of malwar...
In recent years, fast spreading worms have become one of the major threats to the security of the In...
In recent years, fast spreading worms, such as Code Red, Slammer, Blaster and Sasser, have become on...
In recent years, fast spreading worms, such as Code Red, Slammer, Blaster and Sasser, have become on...
This research addresses the problem of computer worms in the modern Internet. A worm is similar to a...
An Internet worm replicates itself by automatically infecting vulnerable systems and may infect hund...
Malicious logic, specifically worms, has caused monetary expenditure problems to network users in th...
Malicious logic, specifically worms cost network users an enormous amount of time and money. Worms, ...
the major threats to the security of the Internet. In order to defend against future worms, it is im...
The significant threats of malware are still continuing due to their rapid distribution nature on th...
Internet worms pose a major threat to Internet infrastructure security, and their destruction is tru...
Computer worms are a type of malicious malware that prey on networked machines. A number of differe...
The significant threats of traditional worms such as Blaster, Sasser, Code Red and Slammer are still...
The number of malware variants is growing tremendously and the study of malware attacks on the Inter...
Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned t...
The number of crime committed based on the malware intrusion is never ending as the number of malwar...
In recent years, fast spreading worms have become one of the major threats to the security of the In...
In recent years, fast spreading worms, such as Code Red, Slammer, Blaster and Sasser, have become on...
In recent years, fast spreading worms, such as Code Red, Slammer, Blaster and Sasser, have become on...
This research addresses the problem of computer worms in the modern Internet. A worm is similar to a...
An Internet worm replicates itself by automatically infecting vulnerable systems and may infect hund...
Malicious logic, specifically worms, has caused monetary expenditure problems to network users in th...
Malicious logic, specifically worms cost network users an enormous amount of time and money. Worms, ...
the major threats to the security of the Internet. In order to defend against future worms, it is im...
The significant threats of malware are still continuing due to their rapid distribution nature on th...
Internet worms pose a major threat to Internet infrastructure security, and their destruction is tru...
Computer worms are a type of malicious malware that prey on networked machines. A number of differe...