SCENARIO BASED WORM TRACE PATTERN IDENTIFICATION TECHNIQUE

The number of malware variants is growing tremendously and the study of malware attacks on the Internet is still a demanding research domain. In this research, various logs from different OSI layer are explore to identify the traces leave on the attacker and victim logs, and the attack worm trace p...

Penerangan Penuh

Disimpan dalam:
Butiran Bibliografi
Pengarang-pengarang Utama: Selamat, S. R., Yusof, R., Sahib, S., Mas'ud, M. Z., Roslan, I., Abdollah, M. F.
Format: Artikel
Diterbitkan: LJS Publisher and IJCSIS Press 2010
Subjek-subjek:
Capaian Atas Talian:http://sites.google.com/site/ijcsis/
http://sites.google.com/site/ijcsis/
http://eprints.utem.edu.my/79/1/1002.1678.pdf
Penanda-penanda: Tambah Penanda
Tiada Penanda, Jadilah orang pertama menanda rekod ini!
Jadilah orang pertama meninggalkan komen!
Anda perlu log masuk dahulu