Formulating Generalize Malware Attack Pattern Using Features Selection

Malicious software or malware activity is increasingly threatened the network security as the malicious codes can be easily obtained and can be used as a weapon to gain illegal objectives. Hence, network traffic gathered from a control experiment are explored and features selection method is used t...

Full description

Saved in:
Bibliographic Details
Main Authors: Robiah, Yusof, Mohd Zaki, Mas'ud, Siti Rahayu, Selamat, Mohd Faizal, Abdollah, Shahrin, Sahib, Rudy Fadhlee, Mohd Dollah
Format: Article
Language:English
Published: Asian Research Publishing Network (ARPN) 2016
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/16990/2/robiah.pdf
http://eprints.utem.edu.my/id/eprint/16990/
http://www.arpnjournals.org/jeas/research_papers/rp_2016/jeas_0316_3819.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknikal Malaysia Melaka
Language: English
Description
Summary:Malicious software or malware activity is increasingly threatened the network security as the malicious codes can be easily obtained and can be used as a weapon to gain illegal objectives. Hence, network traffic gathered from a control experiment are explored and features selection method is used to identify the features involved in formulating the malware attack pattern. This paper proposes generalize malware attack pattern in two perspectives which is attacker and victim using traditional worm. This research shall facilitate the authorities in detecting the malware intrusion activities in cyber space while protecting the Critical National Information Infrastructure (CNII) in the country. These generalized malware attack pattern can be extended into research areas in alert correlation and computer forensic investigation.