The Performance Analysis of Malware Attack
People in this new era of modernization nowadays take Internet as one of the vital thing for daily activities. Internet is not only for adults, it is also a needs for people of all ages. However, network vulnerabilities exist in all network that are connec ted to the Internet. The network mostly are...
Format: | Article |
---|---|
Language: | English |
Published: |
Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA Perlis
2018-11-01
|
Series: | Journal of Computing Research and Innovation |
Online Access: | http://repeater.my/index.php/jcrinn/article/view/72 |
_version_ | 1818403864147132416 |
---|---|
collection | DOAJ |
description | People in this new era of modernization nowadays take Internet as one of the vital thing for daily activities.
Internet is not only for adults, it is also a needs for people of all ages. However, network vulnerabilities
exist in all network that are connec
ted to the Internet. The network mostly are exposed to the malicious
software or mostly known as malware. In fact, this malware is growing rapidly and giving a bad impact to
the human intervention. The number of attack are increasing rapidly and it comes i
n various way just to
exploit the victims. There are various type of malware attack. For instance, viruses, worms, spyware,
rootkits, Trojan horse and botnet are considered as noteworthy threat for the computer network. Some
people giving full confidence on the security of data transmission to the network. However, other can access
the personal information without them realizing it. The objective of this paper is to detect malware attack
using honeypot Dionaea. Malicious file launched was detected by the honeypot and the file was analyzed
by using the sandbox tool, Virus Total. This paper found that honeypot Dionaea is helpful in detecting
various types of malware attack. |
first_indexed | 2024-12-14T08:31:02Z |
format | Article |
id | doaj.art-0b61e006b80d433699937e9f4df417f2 |
institution | Directory Open Access Journal |
issn | 2600-8793 |
language | English |
last_indexed | 2024-12-14T08:31:02Z |
publishDate | 2018-11-01 |
publisher | Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA Perlis |
record_format | Article |
series | Journal of Computing Research and Innovation |
spelling | doaj.art-0b61e006b80d433699937e9f4df417f22022-12-21T23:09:31ZengFaculty of Computer and Mathematical Sciences, Universiti Teknologi MARA PerlisJournal of Computing Research and Innovation2600-87932018-11-0134The Performance Analysis of Malware AttackPeople in this new era of modernization nowadays take Internet as one of the vital thing for daily activities. Internet is not only for adults, it is also a needs for people of all ages. However, network vulnerabilities exist in all network that are connec ted to the Internet. The network mostly are exposed to the malicious software or mostly known as malware. In fact, this malware is growing rapidly and giving a bad impact to the human intervention. The number of attack are increasing rapidly and it comes i n various way just to exploit the victims. There are various type of malware attack. For instance, viruses, worms, spyware, rootkits, Trojan horse and botnet are considered as noteworthy threat for the computer network. Some people giving full confidence on the security of data transmission to the network. However, other can access the personal information without them realizing it. The objective of this paper is to detect malware attack using honeypot Dionaea. Malicious file launched was detected by the honeypot and the file was analyzed by using the sandbox tool, Virus Total. This paper found that honeypot Dionaea is helpful in detecting various types of malware attack.http://repeater.my/index.php/jcrinn/article/view/72 |
spellingShingle | The Performance Analysis of Malware Attack Journal of Computing Research and Innovation |
title | The Performance Analysis of Malware Attack |
title_full | The Performance Analysis of Malware Attack |
title_fullStr | The Performance Analysis of Malware Attack |
title_full_unstemmed | The Performance Analysis of Malware Attack |
title_short | The Performance Analysis of Malware Attack |
title_sort | performance analysis of malware attack |
url | http://repeater.my/index.php/jcrinn/article/view/72 |