Claim Missing Document
Check
Articles

Found 1 Documents
Search

Identifikasi Malware Pada Wireshark Tampubolon, Parlindungan; Putri, EE Lailatul; Zalianti, Nabila Reva; Raditya, Muhammad Reza
Jurnal Kajian Teknik Elektro Vol 9, No 1 (2024): JKTE VOL 9 NO 1 (MARET 2024)
Publisher : Universitas 17 Agustus 1945 Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52447/jkte.v9i1.8004

Abstract

This study aims to analyze the use of Wireshark in identifying the presence of malware. The primary objective is to identify suspicious communications conducted by malware, such as data transmission to Command and Control (C&C) servers, the use of unusual protocols, or other abnormal communication patterns. Wireshark is used to capture and analyze network traffic, focusing on suspicious communication patterns and protocols frequently used by malware, such as HTTP and DNS. The analyzed data is sourced from high-risk network environments, and the captured traffic is saved in .pcap format for further analysis. The findings of this study reveal that malware often uses HTTP and DNS protocols to communicate with remote servers and employs traffic patterns that are difficult to detect manually. The research successfully identified various traffic patterns indicating the presence of malware, which were subsequently validated using services such as VirusTotal. These findings provide significant contributions to understanding malware behavior and identifying preventive measures to enhance network security.