Improvising Intrusion Detection for Malware Activities on Dual-Stack Network Environment
Malware is software which was invented and meant for doing harms on computers. Malware is becoming a significant threat in computer network nowadays. Malware attack is not just only involving financial lost but it can also cause fatal errors which may cost lives in some cases. As new Internet Proto...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2012
|
Subjects: | |
Online Access: | http://eprints.utem.edu.my/id/eprint/5779/1/v67-118.pdf http://eprints.utem.edu.my/id/eprint/5779/ http://www.waset.org/journals/waset/v67.php |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.utem.eprints.5779 |
---|---|
record_format |
eprints |
spelling |
my.utem.eprints.57792015-05-28T03:37:26Z http://eprints.utem.edu.my/id/eprint/5779/ Improvising Intrusion Detection for Malware Activities on Dual-Stack Network Environment Muslim, Z. Yusof, R. Abu, N. A. Sahib, S. Q Science (General) Malware is software which was invented and meant for doing harms on computers. Malware is becoming a significant threat in computer network nowadays. Malware attack is not just only involving financial lost but it can also cause fatal errors which may cost lives in some cases. As new Internet Protocol version 6 (IPv6)emerged, many people believe this protocol could solve most malware propagation issues due to its broader addressing scheme. As IPv6 is still new compares to native IPv4, some transition mechanisms have been introduced to promote smoother migration. Unfortunately, these transition mechanisms allow some malwares to propagate its attack from IPv4 to IPv6 network environment. In this paper, a proof of concept shall be presented in order to show that some existing IPv4 malware detection technique need to be improvised in order to detect malware attack in dual-stack network more efficiently. A testbed of dual-stack network environment has been deployed and some genuine malware have been released to observe their behaviors. The results between these different scenarios will be analyzed and discussed further in term of their behaviors and propagation methods. The results show that malware behave differently on IPv6 from the IPv4 network protocol on the dual-stack network environment. A new detection technique is called for in order to cater this problem in the near future. 2012-07 Conference or Workshop Item PeerReviewed application/pdf en http://eprints.utem.edu.my/id/eprint/5779/1/v67-118.pdf Muslim, Z. and Yusof, R. and Abu, N. A. and Sahib, S. (2012) Improvising Intrusion Detection for Malware Activities on Dual-Stack Network Environment. In: WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY , July 2012, Stockholm, Sweden. http://www.waset.org/journals/waset/v67.php |
institution |
Universiti Teknikal Malaysia Melaka |
building |
UTEM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknikal Malaysia Melaka |
content_source |
UTEM Institutional Repository |
url_provider |
http://eprints.utem.edu.my/ |
language |
English |
topic |
Q Science (General) |
spellingShingle |
Q Science (General) Muslim, Z. Yusof, R. Abu, N. A. Sahib, S. Improvising Intrusion Detection for Malware Activities on Dual-Stack Network Environment |
description |
Malware is software which was invented and meant for doing harms on computers. Malware is becoming a significant threat
in computer network nowadays. Malware attack is not just only involving financial lost but it can also cause fatal errors which may cost lives in some cases. As new Internet Protocol version 6 (IPv6)emerged, many people believe this protocol could solve most malware propagation issues due to its broader addressing scheme. As IPv6 is still new compares to native IPv4, some transition mechanisms have been introduced to promote smoother migration.
Unfortunately, these transition mechanisms allow some malwares to propagate its attack from IPv4 to IPv6 network environment. In this paper, a proof of concept shall be presented in order to show that some existing IPv4 malware detection technique need to be improvised in order to detect malware attack in dual-stack network more efficiently. A testbed of dual-stack network environment has
been deployed and some genuine malware have been released to
observe their behaviors. The results between these different scenarios will be analyzed and discussed further in term of their behaviors and propagation methods. The results show that malware behave differently on IPv6 from the IPv4 network protocol on the dual-stack network environment. A new detection technique is called for in
order to cater this problem in the near future. |
format |
Conference or Workshop Item |
author |
Muslim, Z. Yusof, R. Abu, N. A. Sahib, S. |
author_facet |
Muslim, Z. Yusof, R. Abu, N. A. Sahib, S. |
author_sort |
Muslim, Z. |
title |
Improvising Intrusion Detection for Malware
Activities on Dual-Stack Network Environment |
title_short |
Improvising Intrusion Detection for Malware
Activities on Dual-Stack Network Environment |
title_full |
Improvising Intrusion Detection for Malware
Activities on Dual-Stack Network Environment |
title_fullStr |
Improvising Intrusion Detection for Malware
Activities on Dual-Stack Network Environment |
title_full_unstemmed |
Improvising Intrusion Detection for Malware
Activities on Dual-Stack Network Environment |
title_sort |
improvising intrusion detection for malware
activities on dual-stack network environment |
publishDate |
2012 |
url |
http://eprints.utem.edu.my/id/eprint/5779/1/v67-118.pdf http://eprints.utem.edu.my/id/eprint/5779/ http://www.waset.org/journals/waset/v67.php |
_version_ |
1665905302277455872 |
score |
13.223943 |