ANALISIS DAN DETEKSI MALWARE PADA PROTOKOL JARINGAN MENGGUNAKAN METODE MALWARE ANALISIS DINAMIS DAN MALWARE ANALISIS STATIS

Vicram Renondo Sianipar, Hotma Pangaribuan
{"title":"ANALISIS DAN DETEKSI MALWARE PADA PROTOKOL JARINGAN MENGGUNAKAN METODE MALWARE ANALISIS DINAMIS DAN MALWARE ANALISIS STATIS","authors":"Vicram Renondo Sianipar, Hotma Pangaribuan","doi":"10.33884/comasiejournal.v9i6.7833","DOIUrl":null,"url":null,"abstract":"Network security is a crucial issue in the rapidly developing era of information technology. One of the main threats is malware, which is malicious software that harms systems and data. To solve this problem, analysis and detection of malware on network protocols need to be improved using effective methods. This research explores the application of two main methods, namely static and dynamic malware analysis. First, static malware analysis involves examining malware files without running them. This method includes analysis of signatures, heuristics, and malicious code to identify typical malware patterns in files on the network.Second, dynamic malware analysis executes malware in an isolated environment (sandbox) to monitor its behavior and impact on the system. This process allows detection of malicious changes and attempts by malware to propagate itself. By combining these two methods, a holistic and efficient approach in malware detection on network protocols can be achieved. It is hoped that the results of this research can improve network security, protect infrastructure from ever-evolving malware threats. The use of static and dynamic analysis methods will help deal with increasingly complex security challenges, enabling networks to operate more securely and reliably.","PeriodicalId":500489,"journal":{"name":"Computer and Science Industrial Engineering (COMASIE)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer and Science Industrial Engineering (COMASIE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.33884/comasiejournal.v9i6.7833","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Network security is a crucial issue in the rapidly developing era of information technology. One of the main threats is malware, which is malicious software that harms systems and data. To solve this problem, analysis and detection of malware on network protocols need to be improved using effective methods. This research explores the application of two main methods, namely static and dynamic malware analysis. First, static malware analysis involves examining malware files without running them. This method includes analysis of signatures, heuristics, and malicious code to identify typical malware patterns in files on the network.Second, dynamic malware analysis executes malware in an isolated environment (sandbox) to monitor its behavior and impact on the system. This process allows detection of malicious changes and attempts by malware to propagate itself. By combining these two methods, a holistic and efficient approach in malware detection on network protocols can be achieved. It is hoped that the results of this research can improve network security, protect infrastructure from ever-evolving malware threats. The use of static and dynamic analysis methods will help deal with increasingly complex security challenges, enabling networks to operate more securely and reliably.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用动态分析和静态分析方法对网络协议中的恶意软件进行分析和检测
在快速发展的信息技术时代,网络安全是一个至关重要的问题。其中一个主要威胁是恶意软件,这是一种破坏系统和数据的恶意软件。为了解决这一问题,需要采用有效的方法改进对网络协议恶意软件的分析和检测。本研究探讨了两种主要方法的应用,即静态和动态恶意软件分析。首先,静态恶意软件分析包括在不运行恶意软件文件的情况下检查它们。该方法包括签名分析、启发式分析和恶意代码分析,以识别网络文件中的典型恶意软件模式。其次,动态恶意软件分析在孤立的环境(沙箱)中执行恶意软件,以监视其行为和对系统的影响。此过程允许检测恶意更改和恶意软件传播自身的尝试。将这两种方法结合起来,可以实现对网络协议恶意软件的全面、高效的检测。希望这项研究的结果可以提高网络安全性,保护基础设施免受不断发展的恶意软件威胁。使用静态和动态分析方法将有助于应对日益复杂的安全挑战,使网络更加安全可靠地运行。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
IMPLEMENTASI DATA MINING MENGGUNAKAN ALGORITMA APRIORI UNTUK MENINGKATKAN POLA PENJUALAN ANALISIS RISIKO ERGONOMI PENJAHIT BERDASARKAN JENIS KELAMIN DI KOTA BATAM ANALISIS DAN DETEKSI MALWARE PADA PROTOKOL JARINGAN MENGGUNAKAN METODE MALWARE ANALISIS DINAMIS DAN MALWARE ANALISIS STATIS ANALISIS POLA PEMBELIAN KONSUMEN MENGGUNAKAN ALGORITMA APRIORI PERANCANGAN SISTEM APLIKASI PENJUALAN SPAREPART MOTOR BERBASIS ANDROID
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1