Perancangan Sistem Pendeteksi Dan Pencegahan Penyebaran Malware Melalui SMS Gateway
Abstract
Internet network is a media or technology that is very useful at this time. Almost everyone who uses electronics using internet network. With this internet network, humans can access the virtual world with ease, either in browsing, streaming, social media access and others. On the other hand there is a lack of Internet network technology. With the internet, computers can connect with other computers, so many cases of malware attacks through the internet network. Recently there has been a very dangerous malware attack. The malware is known as wannacry ransomware. Wannacry can attack computers that use windows operating system. Computers that have been infected wannacry will make all existing data in the computer hard drive becomes encrypted, so the user can not open the data that has been infected with the virus.
To solve the problem then it is proposed Design of Malware Detection and Prevention System Using Unified Modeling Language (UML). This system is designed using Router, Server, and SMS Gateway. Router is used for network configuration. The server is used for WEB-based storage systems that serve to detect ports. SMS Gateway is used to send SMS to the network admins. With the proposed system is expected to help detect the presence of malware that goes through the router, so that the system will automatically send notification of malware via SMSÂ
Full Text:
PDFReferences
M. Howard, A. Pfeffer, M. Dalal, and M. Reposa, “Predicting Signatures of Future Malware Variants,†12th Int. Conf. Malicious Unwanted Softw. (MALWARE 2017), pp. 126–132, 2017.
M. Kalash, M. Rochan, N. Mohammed, N. D. B. Bruce, Y. Wang, and F. Iqbal, “Malware Classification with Deep Convolutional Neural Networks,†2018 9th IFIP Int. Conf. New Technol. Mobil. Secur., pp. 1–5, 2018.
S. Hsiao and D. Kao, “The Static Analysis of WannaCry ġ Ransomware,†pp. 153–158, 2018.
D.-Y. Kao and S.-C. Hsiao, “The dynamic analysis of WannaCry ransomware - IEEE Conference Publication,†Int. Conf. Adv. Commun. Technolo gy(ICACT, pp. 159–166, 2018.
N. Hampton and Z. A. Baig, “Ransomware: Emergence of the cyber-extortion menace,†Aust. Inf. Secur. Manag. Conf., vol. 13, pp. 47–56, 2015.
Q. Chen and R. A. Bridges, “Automated Behavioral Analysis of Malware A Case Study of WannaCry Ransomware,†pp. 454–460, 2017.
S. Mohurle and M. Patil, “A brief study of Wannacry Threat : Ransomware Attack 2017,†Int. J. Adv. Res. Comput. Sci., vol. 8, no. 5, pp. 2016–2018, 2017.
X. Lu, W. Lei, and W. Zhang, “The design and implementation of XMPP-based SMS gateway,†Proc. - 2012 4th Int. Conf. Comput. Intell. Commun. Syst. Networks, CICSyN 2012, pp. 145–148, 2012.
C. Taddia and G. Mazzini, “Architectures for an efficient SMS Gateway service,†2015 23rd Int. Conf. Software, Telecommun. Comput. Networks, SoftCOM 2015, pp. 254–258, 2015.
M. Kashif, “Secure SMS communication using encryption gateway and digital signature,†Proc. - 17th IEEE Int. Conf. Comput. Sci. Eng. CSE 2014, Jointly with 13th IEEE Int. Conf. Ubiquitous Comput. Commun. IUCC 2014, 13th Int. Symp. Pervasive Syst. Algorithms, Networks, I-SPAN 2014 8th Int. Conf. Front. Comput. Sci. Technol. FCST 2014, pp. 1430–1434, 2015.
DOI: https://doi.org/10.35314/isi.v3i1.340
Refbacks
- There are currently no refbacks.