Analisis Cara Kerja Sistem Deteksi Infeksi Worm Pada Komputer

  • Sumarno Sumarno UIN Sultan Aji Muhammad Idris
Keywords: worm, virus, vandalism

Abstract

Worms are a type of malware that has the ability to develop and spread automatically to other computers on a network without human interaction. This fast and undetectable infection capability makes worms a serious threat in the world of computer security. This research aims to explore the mechanisms and behavior of worm infection systems on computers. This study involves an in-depth analysis of the functions and methods used by worms to enter, infect, and exploit target computers. This researchalso explain how worms can cause damage to computer systems, steal confidential information, or even create botnet networks to carry out large-scale attacks. Research methods include collecting data from existing worm detection systems, analyzing system logs that occur, as well as simulations to understand how worms work in various scenarios. In addition, this research also consider protection and prevention techniques that can be used to protect computers and networks from worm attacks. Based on observations and experiments, the results of this research can be concluded that the worm infection system spreads through computers connected to the network or through other media on the network and does not require a certain moment to be a trigger to infect the target. It is hoped that the results of this research provide an in-depth understanding of worm infection systems on computers, allowing researchers and computer security practitioners to develop more effective protection strategies. Prevention and early detection efforts will be key in dealing with the growing threat from worms and similar types ofmalware.

References

C. P. Seth Fogie, “Windows Internet Security :Protecting Your Critical Data,” Prentice Hall PTR, Up. Saddle River, New Jersey, vol. 222,2002.

Rastri Prathivi and Vensy Vydia, “Analisa Pendeteksian Worm dan Trojan Pada Jaringan Internet Universitas Semarang Menggunakan Metode Kalifikasi Pada Data Mining C45 dan Bayesian Network,” J. Transform., vol. 14, no. 2, pp. 77–81,2017.

Voaindonesia, “Virus Komputer Petya Menyebar dari Ukraina untuk hambat bisnis dunia,” Voaindonesia, 2017. [Online]. Available: https://www.voaindonesia.com/a/virus- komputer-petya-menyebar-dari-ukraina- untuk-hambat-bisnis-dunia/3920788.html

M. Miller and NetLibrary Inc., Absolute PC security and privacy.2002.

P. Mell, K. Kent, and J. Nusbaum, “Special Publication 800-83 Sponsored by the Department of Homeland Security Guide to Malware Incident Prevention and Handling Recommendations of the National Institute of Standards and Technology,” 2015.

Y. A. Adi, “Model Epidemik Pada Penyebaran Virus Komputer,” Semin. Nas. Mat. Dan Pendidik. Mat. 2006, 2006.

Y.IlhamdiandY.N.Kunang,“Analisis Malware Pada Sistem Operasi Windows Menggunakan Teknik Forensik,” Bina Darma Conf. Comput. Sci., vol. 3, no. 1, pp. 256–264, 2021, [Online]. Available: https://conference.binadarma.ac.id/index. php/BDCCS/article/view/2124

S. Murdowo, “Mengenal Lebih Dalam Tentang Virus-Virus Komputer dan Perilakunya,” J. Ilm. Infokam, vol. 19, no. 1, pp. 74–84, 2023, doi: 10.53845/infokam.v19i1.344.

M. A. M. Fitrah, M.Pd & Dr. Luthfiyah, Metodologi Penelitian : Penelitian Kualitatif, Tindakan Kelas & Studi Kasus. Sukabumi, Jawa Barat: CV. Jejak,2017.

D. Assyakurrohim, D. Ikhram, R. A. Sirodj, and M. W. Afgani, “Metode Studi Kasus dalam Penelitian Kualitatif,” J. Pendidik. Sains dan Komput., vol. 3, no. 01, pp. 1–9, 2022, doi: 10.47709/jpsk.v3i01.1951.

Harjono, “Deteksi Malware Dalam Jaringan Menggunakan Dionaea,” Techno, ISSN 1410 - 8607, vol. 14, no. 2, pp. 64–69,2013.

Kompas.id, “Kisah Perang Siber Iran, Menguak Strategi Teheran Menandingi Serangan Israel-AS,” www.Kompas.id. [Online]. Available:

https://www.kompas.id/baca/internasional/2021/04/19/kisah-perang-siber-iran- menguak-strategi-teheran-menandingi- serangan-israel-as

Kominfo.go.id, “FAQ Wannacryptor Ransomware,”Kominfo.go.id.

K. P. Dkk, “SolarWinds Hack Adalah Karya ‘Setidaknya 1.000 Insinyur’, Para Eksekutif Teknologi Memberitahu Senat",” Guardian, 2021.

M. Robert and C. Aiba, “Virus atau Worm,” vol. 2020, no. 1, pp. 1–7,2020.

P. D. A. Pamungkas, “Analisis Cara Kerja Sistem Infeksi Virus Komputer,” Bina Insa. ICT J., vol. 1, no. 1, pp. 15–40, 2018.

F. Panjaitan, H. Yudiastuti, and M. Ulfa, “Analisis Malware dengan metode Surface dan Runtime Analysis,” J. Ilm. Matrik, vol. 23, no. 1, pp. 1–11, 2021, doi:10.33557/jurnalmatrik.v23i1.1148.

J. Na, A. M. Universitas, P. Indonesia, Y. Padang, and S. Barat, “Metoda Pertahan Diri Program Virus,” J. Ilm. Process., vol. 8, no. 2, 2013, [Online]. Available: http://processor.stikom- db.ac.id/index.php/processor/article/view/ 71

P. P. Pemungkas, S. Sutrisno, and S. Sunarsih, “Pengembangan Model Epidemik Sira Untuk Penyebaran Virus Pada Jaringan Komputer,” J. Fundam. Math. Appl., vol. 2, no. 1, p. 13, 2019, doi:10.14710/jfma.v2i1.26.

Published
2023-12-30
Section
Articles