An orchestration approach for unwanted Internet traffic identification

E Feitosa, E Souto, DH Sadok - Computer Networks, 2012 - Elsevier
A simple examination of Internet traffic shows a wide mix of relevant and unwanted traffic.
The latter is becoming increasingly harmful to network performance and service availability …

Profiling mobile malware behaviour through hybrid malware analysis approach

MZ Mas' ud, S Sahib, MF Abdollah… - … and Security (IAS), 2013 - ieeexplore.ieee.org
Nowadays, the usage of mobile device among the community worldwide has been
tremendously increased. With this proliferation of mobile devices, more users are able to …

A Hierarchical Visibility theory for formal digital investigation of anti-forensic attacks

S Rekhis, N Boudriga - Computers & Security, 2012 - Elsevier
Among the leading topics of research in digital forensic investigation is the development of
theoretical and scientifically proven techniques of incident analysis. However, two main …

REAL-T: time modularization in reactive distributed applications

LD Benavides Navarro, C Pimienta, M Sanabria… - Colombian Conference …, 2018 - Springer
In this paper, we propose REAL-T, a distributed event-based language with explicit support
for time manipulation. The language introduces automata for operational time manipulation …

[PDF][PDF] Tracing the P2P botnets behaviours via hybrid analysis approach

R Abdullah, M Faizal, Z Noh - European Journal Scientific …, 2014 - eprints.utem.edu.my
P2P botnets has become central issue that threatens global network security. The unification
of botnets and P2P technology make it more powerful and complicated to detect. P2P …

An improved traditional worm attack pattern

Y Robiah, SS Rahayu, S Sahib, MM Zaki… - 2010 International …, 2010 - ieeexplore.ieee.org
The significant threats of traditional worms such as Blaster, Sasser, Code Red and Slammer
are still continuing due to their hasty spreading nature on the internet. The worms attack …

Enhanced alert correlation framework for heterogeneous log

R Yusof, SR Selamat, S Sahib, MZ Mas' ud… - … and Information Science …, 2011 - Springer
Management of intrusion alarms particularly in identifying malware attack is becoming more
demanding due to large amount of alert produced by low-level detectors. Alert correlation …

[PDF][PDF] A NEW MALWARE ATTACK PATTERN GENERALIZATION

Y Robiah, S Rahayu, S Sahib, M Mohd Zaki, MA Faizal… - researchgate.net
The significant threats of malware are still continuing due to their rapid distribution nature on
the internet. The malware attack pattern from nine different attack scenarios have been …