Publication: Reverse engineering: EDOWA worm analysis and classification
dc.citedby | 1 | |
dc.contributor.affiliations | Faculty of Science and Technology | |
dc.contributor.affiliations | Universiti Sains Islam Malaysia (USIM) | |
dc.contributor.author | Saudi M.M. | en_US |
dc.contributor.author | Tamil E.M. | en_US |
dc.contributor.author | Cullen A.J. | en_US |
dc.contributor.author | Woodward M.E. | en_US |
dc.contributor.author | Idris M.Y.I. | en_US |
dc.date.accessioned | 2024-05-28T08:40:02Z | |
dc.date.available | 2024-05-28T08:40:02Z | |
dc.date.issued | 2009 | |
dc.description.abstract | Worms have become a real threat for computer users for the past few years. Worm is more prevalent today than ever before, and both home users and system administrators need to be on the alert to protect their network or company against attacks. It is coming out so fast these days that even the most accurate scanners cannot track all of the new ones. Indeed until now there is no specific way to classify the worm. To understand the threats posed by the worms, this research had been carried out. In this paper the researchers proposed a new way to classify the worms which later is used as the basis to build up a system which is called as the EDOWA system to detect worms attack. Details on how the new worm of classification which is called as EDOWA worm classification is produced are explained in this paper. Hopefully this new worm classification can be used as the basis model to produce a system either to detect or defend organization from worms attack. � 2009 Springer Netherlands. | |
dc.description.nature | Final | en_US |
dc.identifier.doi | 10.1007/978-90-481-2311-7_24 | |
dc.identifier.epage | 288 | |
dc.identifier.isbn | 9789050000000 | |
dc.identifier.issn | 18761100 | |
dc.identifier.scopus | 2-s2.0-78651561290 | |
dc.identifier.spage | 277 | |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-78651561290&doi=10.1007%2f978-90-481-2311-7_24&partnerID=40&md5=65363bb9db29ea2f516dc32eaf22798d | |
dc.identifier.uri | https://oarep.usim.edu.my/handle/123456789/9256 | |
dc.identifier.volume | 39 LNEE | |
dc.language | English | |
dc.language.iso | en_US | |
dc.relation.ispartof | Lecture Notes in Electrical Engineering | |
dc.source | Scopus | |
dc.subject | Classification | en_US |
dc.subject | Payload | en_US |
dc.subject | Worm analysis | en_US |
dc.subject | Worm classification | en_US |
dc.subject | Classification | en_US |
dc.subject | Computer users | en_US |
dc.subject | Home users | en_US |
dc.subject | Payload | en_US |
dc.subject | System administrators | en_US |
dc.subject | Worm analysis | en_US |
dc.subject | Worm classification | en_US |
dc.subject | Electrical engineering | en_US |
dc.subject | Reverse engineering | en_US |
dc.subject | Reengineering | en_US |
dc.title | Reverse engineering: EDOWA worm analysis and classification | |
dc.type | Conference Paper | en_US |
dspace.entity.type | Publication |