The performance analysis of malware attack / Nur Khairani Kamarudin ... [et al.]

Kamarudin, Nur Khairani and Md Hasani, Nur Nazifa and Ruslan, Rafiza and Ramle, Rashidah and Ahmad Zukri, Nurul Hidayah and Abd Halim, Iman Hazwam (2018) The performance analysis of malware attack / Nur Khairani Kamarudin ... [et al.]. Journal of Computing Research and Innovation (JCRINN), 3 (4): 3. pp. 19-24. ISSN 2600-8793

Abstract

People in this new era of modernization nowadays take Internet as one of the vital thing for daily activities. Internet is not only for adults, it is also a needs for people of all ages. However, network vulnerabilities exist in all network that are connec ted to the Internet. The network mostly are exposed to the malicious software or mostly known as malware. In fact, this malware is growing rapidly and giving a bad impact to the human intervention. The number of attack are increasing rapidly and it comes i n various way just to exploit the victims. There are various type of malware attack. For instance, viruses, worms, spyware, rootkits, Trojan horse and botnet are considered as noteworthy threat for the computer network. Some people giving full confidence on the security of data transmission to the network. However, other can access the personal information without them realizing it. The objective of this paper is to detect malware attack using honeypot Dionaea. Malicious file launched was detected by the honeypot and the file was analyzed by using the sandbox tool, Virus Total. This paper found that honeypot Dionaea is helpful in detecting various types of malware attack.

Metadata

Item Type: Article
Creators:
Creators
Email / ID Num.
Kamarudin, Nur Khairani
UNSPECIFIED
Md Hasani, Nur Nazifa
UNSPECIFIED
Ruslan, Rafiza
UNSPECIFIED
Ramle, Rashidah
UNSPECIFIED
Ahmad Zukri, Nurul Hidayah
UNSPECIFIED
Abd Halim, Iman Hazwam
UNSPECIFIED
Subjects: T Technology > TK Electrical engineering. Electronics. Nuclear engineering > Telecommunication > Computer networks. General works. Traffic monitoring
T Technology > TK Electrical engineering. Electronics. Nuclear engineering > Telecommunication > Computer networks. General works. Traffic monitoring > Intrusion detection systems (Computer security). Computer network security. Hackers
Divisions: Universiti Teknologi MARA, Perlis > Arau Campus > Faculty of Computer and Mathematical Sciences
Journal or Publication Title: Journal of Computing Research and Innovation (JCRINN)
UiTM Journal Collections: UiTM Journal > Journal of Computing Research and Innovation (JCRINN)
ISSN: 2600-8793
Volume: 3
Number: 4
Page Range: pp. 19-24
Keywords: Honeypot, malware, Kali Linux, Dionaea, malicious file, memory usage
Date: 2018
URI: https://ir.uitm.edu.my/id/eprint/59587
Edit Item
Edit Item

Download

[thumbnail of 59587.pdf] Text
59587.pdf

Download (339kB)

ID Number

59587

Indexing

Statistic

Statistic details