According to Richard Bejtlich (Author of Tao of Network Security Monitoring and Extrusion Detection) there are five phases of compromise (of an external attack).
- Reconnaissance
- Exploitation
- Reinforcement
- Consolidation
- Pillage
Here is a brief summary of the Virus / Worm Behavior Analysis document (Adobe PDF document Size 105K) I prepared as part of my research on Virus behaviors around 8 months ago (in August 2005).
I was thinking about creating a virus database based on these attributes (my spreadsheet contains close to 250 attributes to understand the virus behavior).
Watch this space for more details… ..
No comments:
Post a Comment