Journal of Computing Research and Innovation (Nov 2018)

Performance Analysis of Malware Attack

  • Nur Khairani Kamarudin,
  • Nur Nazifa Md Hasani,
  • Rafiza Ruslan,
  • Rashidah Ramle,
  • Nurul Hidayah Ahmad Zukri

Journal volume & issue
Vol. 3, no. 4
pp. 19 – 24

Abstract

Read online

People in this new era of modernization nowadays take Internet as one of the vital thing for daily activities. Internet is not only for adults, it is also a needs for people of all ages. However, network vulnerabilities exist in all network that are connected to the Internet. The network mostly are exposed to the malicious software or mostly known as malware. In fact, this malware is growing rapidly and giving a bad impact to the human intervention. The number of attack are increasing rapidly and it comes in various way just to exploit the victims. There are various type of malware attack. For instance, viruses, worms, spyware, rootkits, Trojan horse and botnet are considered as noteworthy threat for the computer network. Some people giving full confidence on the security of data transmission to the network. However, other can access the personal information without them realizing it. In this project, the connection in the network was analyzed by using the honeypot as the fake server. The platform used in the project were Kali Linux. The platform was connected to the Internet. The honeypot was activated in the platform. Same goes to the attack. The attack was also launched in the Kali Linux operating system. Before the attack was launched, the memory usage of the operating system was monitored. Then, the malicious file launched was detected by the honeypot and the file was analyzed by using the sandbox tool, Virus Total. The information about the malware inside the malicious file was reported. Hence, studying and collecting malware information is important to provide a better defense.

Keywords