Tracing Technique for Blaster Attack

Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial rele...

Full description

Saved in:
Bibliographic Details
Main Authors: Selamat, S. R., Yusof, R., Sahib, S., Abdollah, M. F., Mas'ud, Z., Roslan, I.
Format: Article
Language:en
Published: 2009
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/16/1/Tracing_Technique_for_Blaster_Attack.pdf
http://eprints.utem.edu.my/id/eprint/16/
http://sites.google.com/site/ijcsis/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832715920489840640
author Selamat, S. R.
Yusof, R.
Sahib, S.
Abdollah, M. F.
Mas'ud, Z.
Roslan, I.
author_facet Selamat, S. R.
Yusof, R.
Sahib, S.
Abdollah, M. F.
Mas'ud, Z.
Roslan, I.
author_sort Selamat, S. R.
building UTEM Library
collection Institutional Repository
content_provider Universiti Teknikal Malaysia Melaka
content_source UTEM Institutional Repository
continent Asia
country Malaysia
description Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log. The researchers intended to do a preliminary investigation upon this particular attack so that it can be used for further research in alert correlation and computer forensic investigation.
format Article
id my.utem.eprints-16
institution Universiti Teknikal Malaysia Melaka
language en
publishDate 2009
record_format eprints
spelling my.utem.eprints-162021-09-19T04:12:09Z http://eprints.utem.edu.my/id/eprint/16/ Tracing Technique for Blaster Attack Selamat, S. R. Yusof, R. Sahib, S. Abdollah, M. F. Mas'ud, Z. Roslan, I. QA75 Electronic computers. Computer science Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log. The researchers intended to do a preliminary investigation upon this particular attack so that it can be used for further research in alert correlation and computer forensic investigation. 2009 Article PeerReviewed application/pdf en http://eprints.utem.edu.my/id/eprint/16/1/Tracing_Technique_for_Blaster_Attack.pdf Selamat, S. R. and Yusof, R. and Sahib, S. and Abdollah, M. F. and Mas'ud, Z. and Roslan, I. (2009) Tracing Technique for Blaster Attack. International Journal of Computer Science and Information Security, 4 (1). pp. 1-8. ISSN 1947-5500 http://sites.google.com/site/ijcsis/
spellingShingle QA75 Electronic computers. Computer science
Selamat, S. R.
Yusof, R.
Sahib, S.
Abdollah, M. F.
Mas'ud, Z.
Roslan, I.
Tracing Technique for Blaster Attack
title Tracing Technique for Blaster Attack
title_full Tracing Technique for Blaster Attack
title_fullStr Tracing Technique for Blaster Attack
title_full_unstemmed Tracing Technique for Blaster Attack
title_short Tracing Technique for Blaster Attack
title_sort tracing technique for blaster attack
topic QA75 Electronic computers. Computer science
url http://eprints.utem.edu.my/id/eprint/16/1/Tracing_Technique_for_Blaster_Attack.pdf
http://eprints.utem.edu.my/id/eprint/16/
http://sites.google.com/site/ijcsis/
url_provider http://eprints.utem.edu.my/