Publication: Detection algorithm for internet worms scanning that used user datagram protocol
dc.FundingDetails | Ministry of Higher Education and Scientific Research Department of Information Technology, Ministry of Communications and Information Technology Ministry of Science and Technology | |
dc.FundingDetails | College of Engineering, University of Information Technology and Communications, Ministry of Higher Education and Scientific Research, Baghdad, Iraq Email: mohmadmhr@yahoo.com *Corresponding author | |
dc.FundingDetails | Biographical notes: Mohammad M. Rasheed received his BSc in Computer Science from the University of Baghdad, Iraq in 2002, and Master and PhD in Information Technology from the Northern University of Malaysia in 2008, 2013. He worked as a Research Scientist at the Ministry of Science and Technology. His current research interest is on information technology systems and internet worm detection. He published a number of papers in national, international conferences and international journals. | |
dc.contributor.affiliations | Islamic Science Institute | |
dc.contributor.affiliations | University of Information Technology and Communications | |
dc.contributor.affiliations | Universiti Sains Islam Malaysia (USIM) | |
dc.contributor.affiliations | Universiti Utara Malaysia (UUM) | |
dc.contributor.author | Rasheed M.M. | en_US |
dc.contributor.author | Norwawi N.M. | en_US |
dc.contributor.author | Ghazali O. | en_US |
dc.contributor.author | Faaeq M.K. | en_US |
dc.date.accessioned | 2024-05-28T08:25:21Z | |
dc.date.available | 2024-05-28T08:25:21Z | |
dc.date.issued | 2019 | |
dc.description | International Journal of Information and Computer Security, 2019 Vol.11 No.1, pp.17 - 32 | en_US |
dc.description.abstract | The main purpose of intrusion detection system (IDS) is to find out intrusions among normal audit data and this can be considered as a classification problem. This problem is brought about by the user datagram protocol (UDP) which is a connectionless protocol that means it does not require a formal handshake to get the data flowing and has no need for SYNs, ACKs, FINs flags, or any other handshaking. Worms also make use of UDP protocol to connect or scan with other hosts. In this research, UDP scanning worm detection (UDPSWD) was proposed to detect UDP worm scanning by checking the failure message connections. UDPSWD focuses on the internet control message protocol (ICMP) unreachable, ICMP time exceeded and UDP is not responded to. The results show that UDPSWD is faster in comparison to other techniques, with no false positive or negative alarm. Copyright 2019 Inderscience Enterprises Ltd. | en_US |
dc.description.nature | Final | en_US |
dc.identifier.doi | 10.1504/IJICS.2019.096847 | |
dc.identifier.epage | 32 | |
dc.identifier.issn | 17441765 | |
dc.identifier.issue | 1 | |
dc.identifier.scopus | 2-s2.0-85058802650 | |
dc.identifier.spage | 17 | |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85058802650&doi=10.1504%2fIJICS.2019.096847&partnerID=40&md5=379f4991d9cb8aff3a1bc3b556b57cad | |
dc.identifier.uri | https://www.inderscience.com/info/inarticle.php?artid=96847 | |
dc.identifier.uri | https://oarep.usim.edu.my/handle/123456789/8638 | |
dc.identifier.volume | 11 | |
dc.language | English | |
dc.language.iso | en_US | en_US |
dc.publisher | Inderscience Enterprises Ltd. | en_US |
dc.relation.ispartof | International Journal of Information and Computer Security | en_US |
dc.source | Scopus | |
dc.subject | Behavioural worm | en_US |
dc.subject | Internet worm detection | en_US |
dc.subject | UDP scanning | en_US |
dc.title | Detection algorithm for internet worms scanning that used user datagram protocol | en_US |
dc.title.alternative | Int. J. Inf. Comput. Secur. | en_US |
dc.type | Article | en_US |
dspace.entity.type | Publication |