The Performance Analysis of Malware Attack

People in this new era of modernization nowadays take Internet as one of the vital thing for daily activities. Internet is not only for adults, it is also a needs for people of all ages. However, network vulnerabilities exist in all network that are connec ted to the Internet. The network mostly are...

Descripción completa

Guardado en:
Detalles Bibliográficos
Formato: article
Lenguaje:EN
Publicado: Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA Perlis 2018
Materias:
T
Acceso en línea:https://doaj.org/article/0b61e006b80d433699937e9f4df417f2
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:0b61e006b80d433699937e9f4df417f2
record_format dspace
spelling oai:doaj.org-article:0b61e006b80d433699937e9f4df417f22021-11-06T02:26:05ZThe Performance Analysis of Malware Attack2600-8793https://doaj.org/article/0b61e006b80d433699937e9f4df417f22018-11-01T00:00:00Zhttp://repeater.my/index.php/jcrinn/article/view/72https://doaj.org/toc/2600-8793People in this new era of modernization nowadays take Internet as one of the vital thing for daily activities. Internet is not only for adults, it is also a needs for people of all ages. However, network vulnerabilities exist in all network that are connec ted to the Internet. The network mostly are exposed to the malicious software or mostly known as malware. In fact, this malware is growing rapidly and giving a bad impact to the human intervention. The number of attack are increasing rapidly and it comes i n various way just to exploit the victims. There are various type of malware attack. For instance, viruses, worms, spyware, rootkits, Trojan horse and botnet are considered as noteworthy threat for the computer network. Some people giving full confidence on the security of data transmission to the network. However, other can access the personal information without them realizing it. The objective of this paper is to detect malware attack using honeypot Dionaea. Malicious file launched was detected by the honeypot and the file was analyzed by using the sandbox tool, Virus Total. This paper found that honeypot Dionaea is helpful in detecting various types of malware attack.Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA PerlisarticleProbabilities. Mathematical statisticsQA273-280TechnologyTTechnology (General)T1-995ENJournal of Computing Research and Innovation, Vol 3, Iss 4 (2018)
institution DOAJ
collection DOAJ
language EN
topic Probabilities. Mathematical statistics
QA273-280
Technology
T
Technology (General)
T1-995
spellingShingle Probabilities. Mathematical statistics
QA273-280
Technology
T
Technology (General)
T1-995
The Performance Analysis of Malware Attack
description People in this new era of modernization nowadays take Internet as one of the vital thing for daily activities. Internet is not only for adults, it is also a needs for people of all ages. However, network vulnerabilities exist in all network that are connec ted to the Internet. The network mostly are exposed to the malicious software or mostly known as malware. In fact, this malware is growing rapidly and giving a bad impact to the human intervention. The number of attack are increasing rapidly and it comes i n various way just to exploit the victims. There are various type of malware attack. For instance, viruses, worms, spyware, rootkits, Trojan horse and botnet are considered as noteworthy threat for the computer network. Some people giving full confidence on the security of data transmission to the network. However, other can access the personal information without them realizing it. The objective of this paper is to detect malware attack using honeypot Dionaea. Malicious file launched was detected by the honeypot and the file was analyzed by using the sandbox tool, Virus Total. This paper found that honeypot Dionaea is helpful in detecting various types of malware attack.
format article
title The Performance Analysis of Malware Attack
title_short The Performance Analysis of Malware Attack
title_full The Performance Analysis of Malware Attack
title_fullStr The Performance Analysis of Malware Attack
title_full_unstemmed The Performance Analysis of Malware Attack
title_sort performance analysis of malware attack
publisher Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA Perlis
publishDate 2018
url https://doaj.org/article/0b61e006b80d433699937e9f4df417f2
_version_ 1718443960597217280