Analisis Aktivitas dan Pola Jaringan Terhadap Eternal Blue & Wannacry Ransomware
Main Article Content
Abstract
Internet memainkan perananan sangat penting saat ini dalam kehidupan dengan pertumbuhan yang cepat harus pula di ikuti dengan meningkatkan kewaspadaan terhadap ancaman siber. Wannacry dan Eternal blue adalah salah satu ancaman kejahatan siber yang sangat besar karena banyak sekali dampak serta kerugian yang ditimbulkan. Penelitian ini diharapkan dapat membantu dalam mengetahui aktivitas dan pola serangan Eternal blue dan Wannacry Ransomware beraksi pada jaringan dan bagaimana Malware mengeksploitasi korban.
Article Details
How to Cite
Ferdiansyah, F. (2018). Analisis Aktivitas dan Pola Jaringan Terhadap Eternal Blue & Wannacry Ransomware. JUSIFO (Jurnal Sistem Informasi), 4(1), 37-48. https://doi.org/10.19109/jusifo.v4i1.2077
Section
Articles
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
How to Cite
Ferdiansyah, F. (2018). Analisis Aktivitas dan Pola Jaringan Terhadap Eternal Blue & Wannacry Ransomware. JUSIFO (Jurnal Sistem Informasi), 4(1), 37-48. https://doi.org/10.19109/jusifo.v4i1.2077
References
Adenansi, R., & Novarina, L. A. (2017). Malware dynamic. JoEICT (Journal of Education And ICT), 1(1).
Alder, R. (2004). Snort 2.1 intrusion detection. Syngress Publishing, Incorporated.
Cahyanto, T. A., Wahanggara, V., & Ramadana, D. (2017). Analisis dan Deteksi Malware Menggunakan Metode Malware Analisis Dinamis dan Malware Analisis Statis. JUSTINDO, 2(1), 19–30.
ID-SIRTII. (2017). Apa itu WannaCry? Retrieved from https://idsirtii.or.id/berita/baca/423/apa-itu-wannacry-.html[Diakses 10 May 2014].
NSA. (2016). ABOUT US. Retrieved from https://www.nsa.gov/about/
Patel, D. (2018). Mining Ransomware Signatures from Network Traffic.
Septiyanti, D. (2013). Retrieved from http://myrunds.com/sniffing-menggunakan-wireshark-2/[Diakses 10 May 2014].
Sikorski, M., & Honig, A. (2012). Pratical Malware Analysis. No starch press. https://doi.org/10.1017/CBO9781107415324.004
Snort.org. (2017). What is Snort? Retrieved from https://www.snort.org/faq/what-is-snort[Diakses 10 May 2014].
Stiawan, D. (2009). Intrusion Prevention System (IPS) dan Tantangan dalam Pengembangannya. Deris. Unsri. Ac. id.[Diakses 10 May 2014].
Stiawan, D., Abdullah, A. H., & Idris, M. Y. (2011). Characterizing Network Intrusion Prevention System. International Journal of Computer Applications, 14(1), 975–8887. https://doi.org/10.5120/1811-2439
Umar, H. (2000). Metodologi Penelitian. Gramedia Pustaka Umum, Jakarta.
Alder, R. (2004). Snort 2.1 intrusion detection. Syngress Publishing, Incorporated.
Cahyanto, T. A., Wahanggara, V., & Ramadana, D. (2017). Analisis dan Deteksi Malware Menggunakan Metode Malware Analisis Dinamis dan Malware Analisis Statis. JUSTINDO, 2(1), 19–30.
ID-SIRTII. (2017). Apa itu WannaCry? Retrieved from https://idsirtii.or.id/berita/baca/423/apa-itu-wannacry-.html[Diakses 10 May 2014].
NSA. (2016). ABOUT US. Retrieved from https://www.nsa.gov/about/
Patel, D. (2018). Mining Ransomware Signatures from Network Traffic.
Septiyanti, D. (2013). Retrieved from http://myrunds.com/sniffing-menggunakan-wireshark-2/[Diakses 10 May 2014].
Sikorski, M., & Honig, A. (2012). Pratical Malware Analysis. No starch press. https://doi.org/10.1017/CBO9781107415324.004
Snort.org. (2017). What is Snort? Retrieved from https://www.snort.org/faq/what-is-snort[Diakses 10 May 2014].
Stiawan, D. (2009). Intrusion Prevention System (IPS) dan Tantangan dalam Pengembangannya. Deris. Unsri. Ac. id.[Diakses 10 May 2014].
Stiawan, D., Abdullah, A. H., & Idris, M. Y. (2011). Characterizing Network Intrusion Prevention System. International Journal of Computer Applications, 14(1), 975–8887. https://doi.org/10.5120/1811-2439
Umar, H. (2000). Metodologi Penelitian. Gramedia Pustaka Umum, Jakarta.