Skip to main content

Showing 1–5 of 5 results for author: Rahayu, S S

.
  1. arXiv:1006.4569  [pdf

    cs.CR

    Advanced Trace Pattern For Computer Intrusion Discovery

    Authors: S. Siti Rahayu, Y. Robiah, S. Shahrin, M. Mohd Zaki, M. A. Faizal, Z. A. Zaheera

    Abstract: The number of crime committed based on the malware intrusion is never ending as the number of malware variants is growing tremendously and the usage of internet is expanding globally. Malicious codes easily obtained and use as one of weapon to gain their objective illegally. Hence, in this research, diverse logs from different OSI layer are explored to identify the traces left on the attacker and… ▽ More

    Submitted 23 June, 2010; originally announced June 2010.

    Comments: IEEE Publication Format, https://sites.google.com/site/journalofcomputing/

    Journal ref: Journal of Computing, Vol. 2, No. 6, June 2010, NY, USA, ISSN 2151-9617

  2. arXiv:1002.1678  [pdf

    cs.CR

    Scenario Based Worm Trace Pattern Identification Technique

    Authors: S. Siti Rahayu, Y. Robiah, S. Shahrin, Mohd M. Zaki, R. Irda, M. A. Faizal

    Abstract: The number of malware variants is growing tremendously and the study of malware attacks on the Internet is still a demanding research domain. In this research, various logs from different OSI layer are explore to identify the traces leave on the attacker and victim logs, and the attack worm trace pattern are establish in order to reveal true attacker or victim. For the purpose of this paper, it… ▽ More

    Submitted 8 February, 2010; originally announced February 2010.

    Comments: 9 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS January 2010, ISSN 1947 5500, http://sites.google.com/site/ijcsis/

    Report number: Computer Science ISSN 19475500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 7, No. 1, pp. 1-9, January 2010, USA

  3. arXiv:1001.3477  [pdf

    cs.CR

    New Multi-step Worm Attack Model

    Authors: Y. Robiah, S. Siti Rahayu, S. Shahrin, M. A. Faizal, M. Mohd Zaki, R. Marliza

    Abstract: The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack patter… ▽ More

    Submitted 20 January, 2010; originally announced January 2010.

    Journal ref: Journal of Computing, Vol. 2, Issue 1, January 2010

  4. arXiv:0909.4860  [pdf

    cs.CR

    A New Generic Taxonomy on Hybrid Malware Detection Technique

    Authors: Y. Robiah, S. Siti Rahayu, M. Mohd Zaki, S. Shahrin, M. A. Faizal, R. Marliza

    Abstract: Malware is a type of malicious program that replicate from host machine and propagate through network. It has been considered as one type of computer attack and intrusion that can do a variety of malicious activity on a computer. This paper addresses the current trend of malware detection techniques and identifies the significant criteria in each technique to improve malware detection in Intrusi… ▽ More

    Submitted 26 September, 2009; originally announced September 2009.

    Comments: 6 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/

    Report number: ISSN 1947 5500

    Journal ref: Robiah Y, Siti Rahayu S., Mohd Zaki M, Shahrin S., Faizal M. A., Marliza R., International Journal of Computer Science and Information Security, IJCSIS, Vol. 5, No. 1, pp. 56-61, September 2009, USA

  5. arXiv:0906.3843  [pdf

    cs.CR cs.NI

    Threshold Verification Technique for Network Intrusion Detection System

    Authors: M. A. Faizal, M. Mohd Zaki, S. Shahrin, Y. Robiah, S. Siti Rahayu, B. Nazrulazhar

    Abstract: Internet has played a vital role in this modern world, the possibilities and opportunities offered are limitless. Despite all the hype, Internet services are liable to intrusion attack that could tamper the confidentiality and integrity of important information. An attack started with gathering the information of the attack target, this gathering of information activity can be done as either fas… ▽ More

    Submitted 21 June, 2009; originally announced June 2009.

    Comments: 8 Pages, International Journal of Computer Science and Information Security

    Journal ref: IJCSIS Vol.2, No.1, June 2009