Improvising Intrusion Detection for Malware Activities on Dual-Stack Network Environment

Malware is software which was invented and meant for doing harms on computers. Malware is becoming a significant threat in computer network nowadays. Malware attack is not just only involving financial lost but it can also cause fatal errors which may cost lives in some cases. As new Internet Proto...

Full description

Saved in:
Bibliographic Details
Main Authors: Muslim, Z., Yusof, R., Abu, N. A., Sahib, S.
Format: Conference or Workshop Item
Language:English
Published: 2012
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/5779/1/v67-118.pdf
http://eprints.utem.edu.my/id/eprint/5779/
http://www.waset.org/journals/waset/v67.php
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utem.eprints.5779
record_format eprints
spelling my.utem.eprints.57792015-05-28T03:37:26Z http://eprints.utem.edu.my/id/eprint/5779/ Improvising Intrusion Detection for Malware Activities on Dual-Stack Network Environment Muslim, Z. Yusof, R. Abu, N. A. Sahib, S. Q Science (General) Malware is software which was invented and meant for doing harms on computers. Malware is becoming a significant threat in computer network nowadays. Malware attack is not just only involving financial lost but it can also cause fatal errors which may cost lives in some cases. As new Internet Protocol version 6 (IPv6)emerged, many people believe this protocol could solve most malware propagation issues due to its broader addressing scheme. As IPv6 is still new compares to native IPv4, some transition mechanisms have been introduced to promote smoother migration. Unfortunately, these transition mechanisms allow some malwares to propagate its attack from IPv4 to IPv6 network environment. In this paper, a proof of concept shall be presented in order to show that some existing IPv4 malware detection technique need to be improvised in order to detect malware attack in dual-stack network more efficiently. A testbed of dual-stack network environment has been deployed and some genuine malware have been released to observe their behaviors. The results between these different scenarios will be analyzed and discussed further in term of their behaviors and propagation methods. The results show that malware behave differently on IPv6 from the IPv4 network protocol on the dual-stack network environment. A new detection technique is called for in order to cater this problem in the near future. 2012-07 Conference or Workshop Item PeerReviewed application/pdf en http://eprints.utem.edu.my/id/eprint/5779/1/v67-118.pdf Muslim, Z. and Yusof, R. and Abu, N. A. and Sahib, S. (2012) Improvising Intrusion Detection for Malware Activities on Dual-Stack Network Environment. In: WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY , July 2012, Stockholm, Sweden. http://www.waset.org/journals/waset/v67.php
institution Universiti Teknikal Malaysia Melaka
building UTEM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknikal Malaysia Melaka
content_source UTEM Institutional Repository
url_provider http://eprints.utem.edu.my/
language English
topic Q Science (General)
spellingShingle Q Science (General)
Muslim, Z.
Yusof, R.
Abu, N. A.
Sahib, S.
Improvising Intrusion Detection for Malware Activities on Dual-Stack Network Environment
description Malware is software which was invented and meant for doing harms on computers. Malware is becoming a significant threat in computer network nowadays. Malware attack is not just only involving financial lost but it can also cause fatal errors which may cost lives in some cases. As new Internet Protocol version 6 (IPv6)emerged, many people believe this protocol could solve most malware propagation issues due to its broader addressing scheme. As IPv6 is still new compares to native IPv4, some transition mechanisms have been introduced to promote smoother migration. Unfortunately, these transition mechanisms allow some malwares to propagate its attack from IPv4 to IPv6 network environment. In this paper, a proof of concept shall be presented in order to show that some existing IPv4 malware detection technique need to be improvised in order to detect malware attack in dual-stack network more efficiently. A testbed of dual-stack network environment has been deployed and some genuine malware have been released to observe their behaviors. The results between these different scenarios will be analyzed and discussed further in term of their behaviors and propagation methods. The results show that malware behave differently on IPv6 from the IPv4 network protocol on the dual-stack network environment. A new detection technique is called for in order to cater this problem in the near future.
format Conference or Workshop Item
author Muslim, Z.
Yusof, R.
Abu, N. A.
Sahib, S.
author_facet Muslim, Z.
Yusof, R.
Abu, N. A.
Sahib, S.
author_sort Muslim, Z.
title Improvising Intrusion Detection for Malware Activities on Dual-Stack Network Environment
title_short Improvising Intrusion Detection for Malware Activities on Dual-Stack Network Environment
title_full Improvising Intrusion Detection for Malware Activities on Dual-Stack Network Environment
title_fullStr Improvising Intrusion Detection for Malware Activities on Dual-Stack Network Environment
title_full_unstemmed Improvising Intrusion Detection for Malware Activities on Dual-Stack Network Environment
title_sort improvising intrusion detection for malware activities on dual-stack network environment
publishDate 2012
url http://eprints.utem.edu.my/id/eprint/5779/1/v67-118.pdf
http://eprints.utem.edu.my/id/eprint/5779/
http://www.waset.org/journals/waset/v67.php
_version_ 1665905302277455872
score 13.223943