Formulating Generalize Malware Attack Pattern Using Features Selection
Malicious software or malware activity is increasingly threatened the network security as the malicious codes can be easily obtained and can be used as a weapon to gain illegal objectives. Hence, network traffic gathered from a control experiment are explored and features selection method is used t...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Asian Research Publishing Network (ARPN)
2016
|
Subjects: | |
Online Access: | http://eprints.utem.edu.my/id/eprint/16990/2/robiah.pdf http://eprints.utem.edu.my/id/eprint/16990/ http://www.arpnjournals.org/jeas/research_papers/rp_2016/jeas_0316_3819.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknikal Malaysia Melaka |
Language: | English |
id |
my.utem.eprints.16990 |
---|---|
record_format |
eprints |
spelling |
my.utem.eprints.169902021-09-07T09:42:11Z http://eprints.utem.edu.my/id/eprint/16990/ Formulating Generalize Malware Attack Pattern Using Features Selection Robiah, Yusof Mohd Zaki, Mas'ud Siti Rahayu, Selamat Mohd Faizal, Abdollah Shahrin, Sahib Rudy Fadhlee, Mohd Dollah T Technology (General) Malicious software or malware activity is increasingly threatened the network security as the malicious codes can be easily obtained and can be used as a weapon to gain illegal objectives. Hence, network traffic gathered from a control experiment are explored and features selection method is used to identify the features involved in formulating the malware attack pattern. This paper proposes generalize malware attack pattern in two perspectives which is attacker and victim using traditional worm. This research shall facilitate the authorities in detecting the malware intrusion activities in cyber space while protecting the Critical National Information Infrastructure (CNII) in the country. These generalized malware attack pattern can be extended into research areas in alert correlation and computer forensic investigation. Asian Research Publishing Network (ARPN) 2016-03 Article PeerReviewed text en http://eprints.utem.edu.my/id/eprint/16990/2/robiah.pdf Robiah, Yusof and Mohd Zaki, Mas'ud and Siti Rahayu, Selamat and Mohd Faizal, Abdollah and Shahrin, Sahib and Rudy Fadhlee, Mohd Dollah (2016) Formulating Generalize Malware Attack Pattern Using Features Selection. ARPN Journal Of Engineering And Applied Sciences, 11 (5). pp. 3385-3390. ISSN 1819-6608 http://www.arpnjournals.org/jeas/research_papers/rp_2016/jeas_0316_3819.pdf |
institution |
Universiti Teknikal Malaysia Melaka |
building |
UTEM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknikal Malaysia Melaka |
content_source |
UTEM Institutional Repository |
url_provider |
http://eprints.utem.edu.my/ |
language |
English |
topic |
T Technology (General) |
spellingShingle |
T Technology (General) Robiah, Yusof Mohd Zaki, Mas'ud Siti Rahayu, Selamat Mohd Faizal, Abdollah Shahrin, Sahib Rudy Fadhlee, Mohd Dollah Formulating Generalize Malware Attack Pattern Using Features Selection |
description |
Malicious software or malware activity is increasingly threatened the network security as the malicious codes can
be easily obtained and can be used as a weapon to gain illegal objectives. Hence, network traffic gathered from a control experiment are explored and features selection method is used to identify the features involved in formulating the malware attack pattern. This paper proposes generalize malware attack pattern in two perspectives which is attacker and victim using traditional worm. This research shall facilitate the authorities in detecting the malware intrusion activities in cyber space while protecting the Critical National Information Infrastructure (CNII) in the country. These generalized malware attack pattern can be extended into research areas in alert correlation and computer forensic investigation. |
format |
Article |
author |
Robiah, Yusof Mohd Zaki, Mas'ud Siti Rahayu, Selamat Mohd Faizal, Abdollah Shahrin, Sahib Rudy Fadhlee, Mohd Dollah |
author_facet |
Robiah, Yusof Mohd Zaki, Mas'ud Siti Rahayu, Selamat Mohd Faizal, Abdollah Shahrin, Sahib Rudy Fadhlee, Mohd Dollah |
author_sort |
Robiah, Yusof |
title |
Formulating Generalize Malware Attack Pattern Using Features Selection |
title_short |
Formulating Generalize Malware Attack Pattern Using Features Selection |
title_full |
Formulating Generalize Malware Attack Pattern Using Features Selection |
title_fullStr |
Formulating Generalize Malware Attack Pattern Using Features Selection |
title_full_unstemmed |
Formulating Generalize Malware Attack Pattern Using Features Selection |
title_sort |
formulating generalize malware attack pattern using features selection |
publisher |
Asian Research Publishing Network (ARPN) |
publishDate |
2016 |
url |
http://eprints.utem.edu.my/id/eprint/16990/2/robiah.pdf http://eprints.utem.edu.my/id/eprint/16990/ http://www.arpnjournals.org/jeas/research_papers/rp_2016/jeas_0316_3819.pdf |
_version_ |
1710679411001393152 |