Claim Missing Document
Check
Articles

Found 13 Documents
Search

Analysis and Implementation of Signature Based Method and Structure File Based Method for File Carving Afrizal, Anjar; Cahyani, Niken Dwi Wahyu; Jadied, Erwid Musthofa
Indonesian Journal on Computing (Indo-JC) Vol. 6 No. 1 (2021): April, 2021
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34818/INDOJC.2021.6.1.457

Abstract

File Carving is a data recovery technique based on file structure and content without relying on filesystem information or metadata. The problem in carving files is its high false positive value especially when the file is fragmented (either linear fragmented or non-linear fragmented). The aim of this study is to implement and analyze the performance of two file carving method (Signature Based and File Structure Based) as a solution to the problem of the carving process. By focusing on JPEG, GIF and PNG files, two datasets are used, namely: CFReDS Project (NIST Project) and Basic Data Carving Test (Nick Mikus Project). The analysis is based on the recovery performance (carving recall, supported recall, carving precision), execution time, and memory usage. From the recovery performance parameter, the File Structure Based method gets a higher overall value than the Signature Based method. However, based on the execution time performance parameter, the Signature Based method has better execution time and use fewer resources compared to the File Structure Based method.
An Impact Analysis of Damage Level caused by Malware with Dynamic Analysis Approach Anugerah, Christopher Arden; Jadied, Erwid Musthofa; Cahyani, Niken
International Journal on Information and Communication Technology (IJoICT) Vol. 10 No. 1 (2024): Vol. 10 No.1 June 2024
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21108/ijoict.v10i1.940

Abstract

Malware, short for malicious software, is software or code specifically designed to damage, disrupt computer systems, or gain unauthorized access to sensitive information. Based on type classification, one of the well-known types of malware is ransomware. Usually, ransomware will encrypt the files on a computer system and then demand a ransom from the owner of the computer system so that the owner can regain access to the encrypted files. Sometimes in some cases, ransomware is able to delete files without input from the computer system owner. This research includes the analysis process of three ransomware samples that are known for successfully causing losses to many computer systems throughout the world, namely WannaCry, Locky, and Jigsaw, using a dynamic approach and the use of tools to track the processes carried out by the ransomware. The purpose of this research is to determine which of the three samples has the highest to lowest level of damage based on metrics based on file access capabilities and file modification capabilities for various types of files such as system files, boot-related files, program files, etc. The findings of this research indicate that WannaCry has the highest impact followed by Locky and then Jigsaw.
Deteksi ARP Spoofing pada Jaringan Wireless Menggunakan Metode String Matching dengan Algoritma Boyer Moore dan Brute Force Anwar, Syafrullah; Karimah, Siti Amatullah; Jadied, Erwid Musthofa
eProceedings of Engineering Vol. 10 No. 3 (2023): Juni 2023
Publisher : eProceedings of Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstrak-Address Resolution Protocol (ARP) adalah protokol yang digunakan untuk menerjemahkan alamat Internet Protocol (IP) menjadi alamat Media Access Protocol (MAC) pada suatu jaringan. Sebuah ARP request secara broadcast untuk mendapatkan alamat perangkat MAC tujuan yang dimana berguna untuk komunikasi antar perangkat. Ketika host menerima alamat ARP request yang ditujukan kepadanya, perangkat penerima akan mengirimkan paket ARP reply kepada perangkat pengirim. Protokol ARP mempunyai celah keamanan yang membuat celah keamanan tersebut dapat diserang oleh spoofing. ARP spoofing adalah serangan yang mengirimkan ARP palsu yang sudah dimodifikasi untuk meracuni ARP cache table korban, serangan ini mendukung terjadinya serangan jaringan komputer lainnya seperti denial of service (DoS) attack, Man in the Middle Attack, dan lain-lain. Pada penelitian ini dilakukan deteksi terhadap ARP spoofing dengan mencari sebuah MAC Address yang telah diubah oleh Attacker menggunakan string matching dengan algoritma boyer moore dan brute force. Kata kunci-ARP, ARP spoofing, string matching, boyer moore, brute force