Formulating Generalize Malware Attack Pattern Using Features Selection
Malicious software or malware activity is increasingly threatened the network security as the malicious codes can be easily obtained and can be used as a weapon to gain illegal objectives. Hence, network traffic gathered from a control experiment are explored and features selection method is used t...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Asian Research Publishing Network (ARPN)
2016
|
Subjects: | |
Online Access: | http://eprints.utem.edu.my/id/eprint/16990/2/robiah.pdf http://eprints.utem.edu.my/id/eprint/16990/ http://www.arpnjournals.org/jeas/research_papers/rp_2016/jeas_0316_3819.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknikal Malaysia Melaka |
Language: | English |
Summary: | Malicious software or malware activity is increasingly threatened the network security as the malicious codes can
be easily obtained and can be used as a weapon to gain illegal objectives. Hence, network traffic gathered from a control experiment are explored and features selection method is used to identify the features involved in formulating the malware attack pattern. This paper proposes generalize malware attack pattern in two perspectives which is attacker and victim using traditional worm. This research shall facilitate the authorities in detecting the malware intrusion activities in cyber space while protecting the Critical National Information Infrastructure (CNII) in the country. These generalized malware attack pattern can be extended into research areas in alert correlation and computer forensic investigation. |
---|