Analysis of Malware Impact on Network Traffic using Behavior-based Detection Technique
Open Access
- 1 April 2020
- journal article
- Published by Indonesian Scientific Journal in International Journal of Advances in Data and Information Systems
- Vol. 1 (1), 17-25
- https://doi.org/10.25008/ijadis.v1i1.14
Abstract
Malware is a software or computer program that is used to carry out malicious activity. Malware is made with the aim of harming user’s device because it can change user’s data, use up bandwidth and other resources without user's permission. Some research has been done before to identify the type of malware and its effects. But previous research only focused on grouping the types of malware that attack via network traffic. This research analyzes the impact of malware on network traffic using behavior-based detection techniques. This technique analyzes malware by running malware samples into an environment and monitoring the activities caused by malware samples. To obtain accurate results, the analysis is carried out by retrieving API call network information and network traffic activities. From the analysis of the malware API call network, information is generated about the order of the API call network used by malware. Using the network traffic, obtained malware activities by analyzing the behavior of network traffic malware, payload, and throughput of infected traffic. Furthermore, the results of the API call network sequence used by malware and the results of network traffic analysis, are analyzed so that the impact of malware on network traffic can be determined.Keywords
This publication has 12 references indexed in Scilit:
- Impact Analysis of Malware Based on Call Network API With Heuristic Detection MethodInternational Journal of Advances in Data and Information Systems, 2020
- Exploring the Possibility of USB based Fork Bomb Attack on Windows EnvironmentPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2019
- ARP Cache Poisoning sebagai Teknik Alternatif untuk Membatasi Penggunaan Bandwidth berbasis WaktuJurnal Rekayasa Sistem & Industri (JRSI), 2018
- Understanding the Root of Attack in Android MalwareThe International Journal of Integrated Engineering, 2018
- Integrated Static and Dynamic Analysis for Malware DetectionProcedia Computer Science, 2015
- MedusaRevista Médica de Homeopatía, 2012
- Behavior-Based Malware Analysis and DetectionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- Analyzing and Exploiting Network Behaviors of MalwareLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2010
- Behavioral detection of malware: from a survey towards an established taxonomyJournal of Computer Virology and Hacking Techniques, 2008
- Geometry-based machining precedence reasoning for feature-based process planningInternational Journal of Production Research, 2001