Gregorius Hendita Artha Kusuma
Program Studi Teknik Informatika, Fakultas Teknik Universitas Pancasila

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Implementasi Volatility dalam Mengalanalisa Malware pada Memory Dump Gregorius Hendita Artha Kusuma
Journal of Informatics and Advanced Computing (JIAC) Vol 4 No 1 (2023): Journal of Informatics and Advanced Computing (JIAC)
Publisher : Teknik Informatika Universitas Pancasila

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Malware infections on computer systems have become a significant threat to information security. In response to these challenges, memory analysis has proven to be an effective method for detecting and investigating malware activities. In this research, we utilize Volatility, a popular memory forensics tool, to analyze memory dumps from malware-infected systems. Our primary objective is to identify and uncover artifacts associated with malware infections within the memory dump. We leverage various widely-used Volatility plugins to extract critical information such as malicious processes, modified kernel modules, suspicious network traces, and other malicious entities. Through a series of analysis steps, we successfully detect the presence of malware infections with a high level of accuracy. We also determine the types and variants of malware involved in the attack. Furthermore, we perform behavioral analysis of the malware, enabling us to understand the objectives, propagation methods, and impact of the infection. The results of this research provide valuable insights for prevention and mitigation of malware attacks. By utilizing Volatility as a memory forensics analysis tool, researchers and security professionals can effectively identify and combat malware threats. We also outline recommendations for steps to strengthen system security and protect valuable data from future malware attacks.
Teknik Sniffing Jaringan Menggunakan Wireshark Richo Muhhamad Farhan; Gregorius Hendita Artha Kusuma
Journal of Informatics and Advanced Computing (JIAC) Vol 4 No 1 (2023): Journal of Informatics and Advanced Computing (JIAC)
Publisher : Teknik Informatika Universitas Pancasila

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Computer network security factor is an absolute thing in building a network. Basically, the security system owned by the operating system is not enough to secure computer networks. Therefore, to get a computer network security, we need a tool that can detect the existence of an attack mechanism from the network. Where the purpose of this attack is to make the computer that accesses it unable to run normally on a computer network. Wireshark is software that can analyze computer network activity so that it can help detect imminent attacks so users don't have to worry about these attacks.