Types and Methods of Detecting the Penetration of MaliciousCargoes


  • Hasanain M. J. Alfouadi University of Al-Qadisiyah, Computer Center Iraq, Diwaniyah, 58002
  • Marwah Nafea Saeea University of Wasit, College of Physical Education and Sports Sciences Iraq, Wasit, 52001
  • Ali Fahem Neamah University of Wasit, computer science and IT faculty Iraq, Wasit, 52001




Intrusion detection systems are management programs that detect possible attacks on networks and
computers, and usually do so by identifying information in the header of packages. But the cargo of packages
containing the main information can help detect abnormal traffic. This article examines the types of malicious cargo
and the different types of penetration detection systems and the methods offered to detect based on cargo. At the
end of this article, we will also introduce the Metasploit Framework, which is a framework used by testers and even
attackers and contains a variety of ready-made cargoes for different systems


] H. Alaidaros, M. Mahmuddin, and A. Al-Mazari An Overview of Flow-Based and Packet-Based Intrusion Detection Performance in High Speed


B. Beigh and M. A. Peer Intrusion Detection and Prevention System : Classification and Quick Review, vol. 2, pp. 661–675, 2012.

Cloudflare What Is A Malicious Payload?, pp. 7–7, 2019.

C. Figueroa Intrusion Detection Systems Overview, 2016.

I. M. Iqbal and R. A. Calix, “Analysis of a Payload-based Network Intrusion Detection System using Pattern Recognition Processors,” Int. Conf.

Collab. Technol. Syst, pp. 398–403, 2016.

M. Mahoney and P. K. Chan Learning Nonstationary Models of Normal Network Traffic for Detecting Novel Attacks, pp. 376–385, 2002.

K. Labib and R. Vemuri NSOM: A real-time network-based intrusion detection system using self-organizing maps, pp. 1–6, 2002.

K. Wang and S. J. Stolfo, “Anomalous Payload-based Network Intrusion Detection,” Comput. Sci. Dep. Columbia Univ, 2005.

Alfouadi, Saeea and Neamah , Wasit Journal of Computer and Mathematics Science, Vol. 2 No. 4 (2023) p. 107-114

D. Bolzoni, S. Etalle, P. Hartel, and E. Zambon, “POSEIDON: A 2-tier anomaly-based network intrusion detection system,” Proc. - Fourth IEEE

Int, pp. 144–156, 2006.

S. Thorat, K. Kishore, A. K. Khandelwal, and B. Bruhadeshwar, “Payload Content based Network Anomaly Detection,” Cent. Secur. Theory

Algorithmic Res, 2008.

K. Wang, J. J. Parekh, and S. J. Stolfo, “Anagram : A Content Anomaly Detector Resistant to,” Comput. Sci. Dep, 2007.

A. Jamdagni, Z. Tan, X. He, P. Nanda, and R. P. Liu, “RePIDS: A multi tier Real-time Payload-based Intrusion Detection System,” Comput.

Networks, vol. 57, no. 3, pp. 811–824, 2013.

S. Mrdovic, “Data Mining for Anomalous Network Payload Detection,” Univ. Sarajev. Fac. Electr. Eng, 2018.








How to Cite

H. M. J. Alfouadi, Marwah Nafea Saeea, and Ali Fahem Neamah, “Types and Methods of Detecting the Penetration of MaliciousCargoes”, WJCMS, vol. 2, no. 4, pp. 107–114, Dec. 2023, doi: 10.31185/wjcms.224.