Malware Detection on Local Network based on Honeypot and Yara

Nur Rohman Rosyid, Budi Bayu Murti, Brama Prayudha, Arul Ferian Ramadloni, Lukman Subekti
{"title":"Malware Detection on Local Network based on Honeypot and Yara","authors":"Nur Rohman Rosyid, Budi Bayu Murti, Brama Prayudha, Arul Ferian Ramadloni, Lukman Subekti","doi":"10.32520/stmsi.v12i1.2432","DOIUrl":null,"url":null,"abstract":"The malware threats have never subsided, even the trend shows an increase and varies along with the development of hardware and software technology. End user may not realize if their machine is compromised by malware. It could be the anti-malware mechanism is not working properly, such as the anti-virus is not updated or there is a zero-day attack. Therefore, it is necessary to detect the presence of malware on end-systems devices or the existence of zero-day attack in the local network. Implementation of honeypot as a security sensor that collects malware attack data in the form of malware files and malware hashes can be used as signatures for scanning and detecting malware. This research utilizes a honeypot as a security sensor to catching malware. The malware hash from the honeypot is used to scanning and detecting the presence of malware on the end-system in a local network such as a PC or server. Furthermore, Yara helps clarify the type of malware found by scanning suspected files. The results of scanning and detecting of malware by Yara will be reported to the appropriate authorities via Telegram application channles. This research contributes by providing early warning of potential security threats to the network and collecting hash code of recently malware attacking to the network. Keywords: Honeypot, Malware, Yara, Proactive Security .","PeriodicalId":32357,"journal":{"name":"Jurnal Sistem Informasi","volume":"103 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Jurnal Sistem Informasi","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.32520/stmsi.v12i1.2432","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The malware threats have never subsided, even the trend shows an increase and varies along with the development of hardware and software technology. End user may not realize if their machine is compromised by malware. It could be the anti-malware mechanism is not working properly, such as the anti-virus is not updated or there is a zero-day attack. Therefore, it is necessary to detect the presence of malware on end-systems devices or the existence of zero-day attack in the local network. Implementation of honeypot as a security sensor that collects malware attack data in the form of malware files and malware hashes can be used as signatures for scanning and detecting malware. This research utilizes a honeypot as a security sensor to catching malware. The malware hash from the honeypot is used to scanning and detecting the presence of malware on the end-system in a local network such as a PC or server. Furthermore, Yara helps clarify the type of malware found by scanning suspected files. The results of scanning and detecting of malware by Yara will be reported to the appropriate authorities via Telegram application channles. This research contributes by providing early warning of potential security threats to the network and collecting hash code of recently malware attacking to the network. Keywords: Honeypot, Malware, Yara, Proactive Security .
基于Honeypot和Yara的本地网络恶意软件检测
恶意软件的威胁从未消退,甚至随着硬件和软件技术的发展呈现出增加和变化的趋势。终端用户可能没有意识到他们的机器是否受到了恶意软件的侵害。它可能是反恶意软件机制不正常工作,例如反病毒没有更新或存在零日攻击。因此,有必要检测终端系统设备上是否存在恶意软件或本地网络中是否存在零日攻击。实现蜜罐作为安全传感器,以恶意软件文件和恶意软件哈希值的形式收集恶意软件攻击数据,并将其作为签名进行扫描和检测。本研究利用蜜罐作为安全传感器来捕获恶意软件。来自蜜罐的恶意软件散列用于扫描和检测本地网络中终端系统(如PC或服务器)上是否存在恶意软件。此外,Yara通过扫描可疑文件帮助澄清恶意软件的类型。Yara扫描和检测恶意软件的结果将通过Telegram应用程序渠道报告给有关当局。本研究通过对网络潜在安全威胁进行早期预警,并收集近期恶意软件攻击网络的哈希码。关键词:蜜罐,恶意软件,Yara,主动安全
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
12
审稿时长
12 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信