The performance analysis of malware attack / Nur Khairani Kamarudin ... [et al.]

People in this new era of modernization nowadays take Internet as one of the vital thing for daily activities. Internet is not only for adults, it is also a needs for people of all ages. However, network vulnerabilities exist in all network that are connec ted to the Internet. The network mostly are...

Full description

Saved in:
Bibliographic Details
Main Authors: Kamarudin, Nur Khairani, Md Hasani, Nur Nazifa, Ruslan, Rafiza, Ramle, Rashidah, Ahmad Zukri, Nurul Hidayah, Abd Halim, Iman Hazwam
Format: Article
Language:English
Published: UiTM Cawangan Perlis 2018
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/59587/1/59587.pdf
https://ir.uitm.edu.my/id/eprint/59587/
https://crinn.conferencehunter.com/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uitm.ir.59587
record_format eprints
spelling my.uitm.ir.595872022-09-26T01:49:56Z https://ir.uitm.edu.my/id/eprint/59587/ The performance analysis of malware attack / Nur Khairani Kamarudin ... [et al.] Kamarudin, Nur Khairani Md Hasani, Nur Nazifa Ruslan, Rafiza Ramle, Rashidah Ahmad Zukri, Nurul Hidayah Abd Halim, Iman Hazwam Computer networks. General works. Traffic monitoring Intrusion detection systems (Computer security). Computer network security. Hackers People in this new era of modernization nowadays take Internet as one of the vital thing for daily activities. Internet is not only for adults, it is also a needs for people of all ages. However, network vulnerabilities exist in all network that are connec ted to the Internet. The network mostly are exposed to the malicious software or mostly known as malware. In fact, this malware is growing rapidly and giving a bad impact to the human intervention. The number of attack are increasing rapidly and it comes i n various way just to exploit the victims. There are various type of malware attack. For instance, viruses, worms, spyware, rootkits, Trojan horse and botnet are considered as noteworthy threat for the computer network. Some people giving full confidence on the security of data transmission to the network. However, other can access the personal information without them realizing it. The objective of this paper is to detect malware attack using honeypot Dionaea. Malicious file launched was detected by the honeypot and the file was analyzed by using the sandbox tool, Virus Total. This paper found that honeypot Dionaea is helpful in detecting various types of malware attack. UiTM Cawangan Perlis 2018 Article PeerReviewed text en https://ir.uitm.edu.my/id/eprint/59587/1/59587.pdf The performance analysis of malware attack / Nur Khairani Kamarudin ... [et al.]. (2018) Journal of Computing Research and Innovation (JCRINN), 3 (4): 3. pp. 19-24. ISSN 2600-8793 https://crinn.conferencehunter.com/ 10.24191/jcrinn.v3i4.72 10.24191/jcrinn.v3i4.72 10.24191/jcrinn.v3i4.72
institution Universiti Teknologi Mara
building Tun Abdul Razak Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Mara
content_source UiTM Institutional Repository
url_provider http://ir.uitm.edu.my/
language English
topic Computer networks. General works. Traffic monitoring
Intrusion detection systems (Computer security). Computer network security. Hackers
spellingShingle Computer networks. General works. Traffic monitoring
Intrusion detection systems (Computer security). Computer network security. Hackers
Kamarudin, Nur Khairani
Md Hasani, Nur Nazifa
Ruslan, Rafiza
Ramle, Rashidah
Ahmad Zukri, Nurul Hidayah
Abd Halim, Iman Hazwam
The performance analysis of malware attack / Nur Khairani Kamarudin ... [et al.]
description People in this new era of modernization nowadays take Internet as one of the vital thing for daily activities. Internet is not only for adults, it is also a needs for people of all ages. However, network vulnerabilities exist in all network that are connec ted to the Internet. The network mostly are exposed to the malicious software or mostly known as malware. In fact, this malware is growing rapidly and giving a bad impact to the human intervention. The number of attack are increasing rapidly and it comes i n various way just to exploit the victims. There are various type of malware attack. For instance, viruses, worms, spyware, rootkits, Trojan horse and botnet are considered as noteworthy threat for the computer network. Some people giving full confidence on the security of data transmission to the network. However, other can access the personal information without them realizing it. The objective of this paper is to detect malware attack using honeypot Dionaea. Malicious file launched was detected by the honeypot and the file was analyzed by using the sandbox tool, Virus Total. This paper found that honeypot Dionaea is helpful in detecting various types of malware attack.
format Article
author Kamarudin, Nur Khairani
Md Hasani, Nur Nazifa
Ruslan, Rafiza
Ramle, Rashidah
Ahmad Zukri, Nurul Hidayah
Abd Halim, Iman Hazwam
author_facet Kamarudin, Nur Khairani
Md Hasani, Nur Nazifa
Ruslan, Rafiza
Ramle, Rashidah
Ahmad Zukri, Nurul Hidayah
Abd Halim, Iman Hazwam
author_sort Kamarudin, Nur Khairani
title The performance analysis of malware attack / Nur Khairani Kamarudin ... [et al.]
title_short The performance analysis of malware attack / Nur Khairani Kamarudin ... [et al.]
title_full The performance analysis of malware attack / Nur Khairani Kamarudin ... [et al.]
title_fullStr The performance analysis of malware attack / Nur Khairani Kamarudin ... [et al.]
title_full_unstemmed The performance analysis of malware attack / Nur Khairani Kamarudin ... [et al.]
title_sort performance analysis of malware attack / nur khairani kamarudin ... [et al.]
publisher UiTM Cawangan Perlis
publishDate 2018
url https://ir.uitm.edu.my/id/eprint/59587/1/59587.pdf
https://ir.uitm.edu.my/id/eprint/59587/
https://crinn.conferencehunter.com/
_version_ 1745565306155171840
score 13.209306