Digital forensic investigation of trojan attacks in network using wireshark, FTK imager and volatility / Muhamad Arif Hashim ... [et al.]

Trojan attacks are the most common and serious threat to network users. It is a program that appears to be useful program but actually harmful one. It is difficult to detect Trojan attacks because it uses special techniques to conceal its activities from antiviruses and users. Thus, this research in...

Full description

Saved in:
Bibliographic Details
Main Authors: Hashim, Muhamad Arif, Abd Halim, Iman Hazwam, Ismail, Mohammad Hafiz, Mohd Noor, Norfaizalfarid, Mohd Fuzi, Mohd Faris, Mohammed, Abdul Hapes, JM. Gining, Ray Adderley
Format: Article
Language:English
Published: UiTM Cawangan Perlis 2017
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/54361/1/54361.pdf
https://ir.uitm.edu.my/id/eprint/54361/
https://crinn.conferencehunter.com/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uitm.ir.54361
record_format eprints
spelling my.uitm.ir.543612022-09-21T09:24:38Z https://ir.uitm.edu.my/id/eprint/54361/ Digital forensic investigation of trojan attacks in network using wireshark, FTK imager and volatility / Muhamad Arif Hashim ... [et al.] Hashim, Muhamad Arif Abd Halim, Iman Hazwam Ismail, Mohammad Hafiz Mohd Noor, Norfaizalfarid Mohd Fuzi, Mohd Faris Mohammed, Abdul Hapes JM. Gining, Ray Adderley Computer networks. General works. Traffic monitoring Intrusion detection systems (Computer security). Computer network security. Hackers Trojan attacks are the most common and serious threat to network users. It is a program that appears to be useful program but actually harmful one. It is difficult to detect Trojan attacks because it uses special techniques to conceal its activities from antiviruses and users. Thus, this research intends to retrieve and investigate of Trojan attacks on the network using digital forensic tools namely Wireshark, FTK Imager and Volatility. Two types of Trojan attacks called Remote Access Trojan (RAT) and HTTP Trojan (HT) are created and experimented in this research. These Trojans are sent to the targeted computer in the network through email. Wireshark is used to capture the network packets and then analyze the suspicious packets. FTK Imager is used to capture RAM data on targeted computer. Volatility is used to analyze the captured RAM data and extract suspicious process. This suspicious process is dumped into file and scanned using the Avast antivirus to check whether this process is running Trojan or otherwise. This research may benefit and contribute to the computer security and forensic domain. It can be extends to investigate other Trojan attacks such as Zeus, SubSeven or Back Orifice by using the same digital forensic tools. UiTM Cawangan Perlis 2017 Article PeerReviewed text en https://ir.uitm.edu.my/id/eprint/54361/1/54361.pdf Digital forensic investigation of trojan attacks in network using wireshark, FTK imager and volatility / Muhamad Arif Hashim ... [et al.]. (2017) Journal of Computing Research and Innovation (JCRINN), 2 (2): 8. pp. 60-65. ISSN 2600-8793 https://crinn.conferencehunter.com/
institution Universiti Teknologi Mara
building Tun Abdul Razak Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Mara
content_source UiTM Institutional Repository
url_provider http://ir.uitm.edu.my/
language English
topic Computer networks. General works. Traffic monitoring
Intrusion detection systems (Computer security). Computer network security. Hackers
spellingShingle Computer networks. General works. Traffic monitoring
Intrusion detection systems (Computer security). Computer network security. Hackers
Hashim, Muhamad Arif
Abd Halim, Iman Hazwam
Ismail, Mohammad Hafiz
Mohd Noor, Norfaizalfarid
Mohd Fuzi, Mohd Faris
Mohammed, Abdul Hapes
JM. Gining, Ray Adderley
Digital forensic investigation of trojan attacks in network using wireshark, FTK imager and volatility / Muhamad Arif Hashim ... [et al.]
description Trojan attacks are the most common and serious threat to network users. It is a program that appears to be useful program but actually harmful one. It is difficult to detect Trojan attacks because it uses special techniques to conceal its activities from antiviruses and users. Thus, this research intends to retrieve and investigate of Trojan attacks on the network using digital forensic tools namely Wireshark, FTK Imager and Volatility. Two types of Trojan attacks called Remote Access Trojan (RAT) and HTTP Trojan (HT) are created and experimented in this research. These Trojans are sent to the targeted computer in the network through email. Wireshark is used to capture the network packets and then analyze the suspicious packets. FTK Imager is used to capture RAM data on targeted computer. Volatility is used to analyze the captured RAM data and extract suspicious process. This suspicious process is dumped into file and scanned using the Avast antivirus to check whether this process is running Trojan or otherwise. This research may benefit and contribute to the computer security and forensic domain. It can be extends to investigate other Trojan attacks such as Zeus, SubSeven or Back Orifice by using the same digital forensic tools.
format Article
author Hashim, Muhamad Arif
Abd Halim, Iman Hazwam
Ismail, Mohammad Hafiz
Mohd Noor, Norfaizalfarid
Mohd Fuzi, Mohd Faris
Mohammed, Abdul Hapes
JM. Gining, Ray Adderley
author_facet Hashim, Muhamad Arif
Abd Halim, Iman Hazwam
Ismail, Mohammad Hafiz
Mohd Noor, Norfaizalfarid
Mohd Fuzi, Mohd Faris
Mohammed, Abdul Hapes
JM. Gining, Ray Adderley
author_sort Hashim, Muhamad Arif
title Digital forensic investigation of trojan attacks in network using wireshark, FTK imager and volatility / Muhamad Arif Hashim ... [et al.]
title_short Digital forensic investigation of trojan attacks in network using wireshark, FTK imager and volatility / Muhamad Arif Hashim ... [et al.]
title_full Digital forensic investigation of trojan attacks in network using wireshark, FTK imager and volatility / Muhamad Arif Hashim ... [et al.]
title_fullStr Digital forensic investigation of trojan attacks in network using wireshark, FTK imager and volatility / Muhamad Arif Hashim ... [et al.]
title_full_unstemmed Digital forensic investigation of trojan attacks in network using wireshark, FTK imager and volatility / Muhamad Arif Hashim ... [et al.]
title_sort digital forensic investigation of trojan attacks in network using wireshark, ftk imager and volatility / muhamad arif hashim ... [et al.]
publisher UiTM Cawangan Perlis
publishDate 2017
url https://ir.uitm.edu.my/id/eprint/54361/1/54361.pdf
https://ir.uitm.edu.my/id/eprint/54361/
https://crinn.conferencehunter.com/
_version_ 1744651603614367744
score 13.209306