ANALISA MALWARE PADA TRAFFIC JARINGAN BERBASIS POLA LALU LINTAS DATA MENGGUNAKAN METODE ANOMALY
DOI:
https://doi.org/10.34151/prosidingsnast.v1i1.5109Abstract
Network security is a major challenge in the era of increasingly rapid digitalization. PDF files, which are widely used for sharing information, are often exploited by cybercriminals to insert malware. This research aims to analyze the impact of malware in PDF files on network traffic using Wireshark software. With a traffic pattern-based approach and anomaly detection, this research identifies malicious activities such as connections to servers, data exfiltration, traffic spikes, and the use of obfuscation techniques.
The malware in the PDF file shows suspicious traffic patterns that include increased volume of outgoing data, and repeated data packets to certain destinations. Additionally, these activities cause significant disruption to network performance, open security gaps, and increase the risk of sensitive data leakage. Wireshark is used to capture, analyze and identify traffic anomalies in real-time.
The research results show that pattern and anomaly-based analysis using Wireshark effectively improves the accuracy of PDF malware detection at the network level. These findings support the importance of applying traffic analysis methods to detect hidden cyber threats. In addition, this research makes an important contribution to the development of network analysis-based cyber attack mitigation strategies, helping organizations respond to threats more quickly and reduce potential losses. With this approach, network security can be strengthened to deal with evolving threats.
References
Suhaemin, Amin., & Muslih. (2023). Karakteristik Cybercrime di Indonesia. Edulaw: Journal of Islamic Law and Jurisprudance. Vol. 5. No. 2.
Matin., & Rahardjo., (2020) Malware detection using honeypot and machine learning. IEEE. 7(2). 1-4
Amdani, R.T., & Iqbal, M. (2021). Analisis Dan Deteksi Malware Poison Ivy Malware Analisis Statis Analysis And Detection Of Malware Poison Ivy With Malware Dynamic Analysis Method And Malware Static Analysis, 7(2), Pp. 178–191.
Nasution, M.A.H. & Laksono, A.T. (2020). ‘Investigasi Serangan Backdoor Remote Access Trojan (Ra ) Terhadap Smartphone’, 7(4), Pp. 505-510. Https://Doi.Org/10.30865/Jurikom.V7i4.2301.
Pressman, & R. S. (2021). Rekayasa Perangkat Lunak: Pendekatan Praktisi Yogyakarta: Andi. (Edisi 7, hal. 45-78).
Solomon, R., & Maunder, S. (2021). TCP/IP Analysis and Troubleshooting. Springer. pp. 45-78.
Alhassan, I., Bock, C., & Bozkurt, S. (2022). Malware Detection using Anomaly Detection Algorithms. IEEE Xplore.
Liao, Y., & Chiu, H. (2021). Network Traffic Anomaly Detection: A Comprehensive Survey. Wiley.
Akhtar, M. S., & Feng, T. (2022). Malware Analysis and Detection Using Machine Learning Algorithms. Symmetry, 14(11), 2304.
Zhang, T., & Lee, J. (2021). Advanced Techniques in Intrusion Detection and Anomaly Detection for Computer Networks. Academic Press.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Jian Malik Hidayat
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.