Hirawan, Jeffry and Lim, Charles and Galinium, Maulahikmah (2017) Enhancing Honeypot To Collect Client Side Attacks Behavior From Malicious URL. Bachelor thesis, Swiss German University.
|
Text
Jeffry Hirawan 11302021 TOC.pdf Download (796kB) | Preview |
|
Text
Jeffry Hirawan 11302021 1.pdf Restricted to Registered users only Download (341kB) |
||
Text
Jeffry Hirawan 11302021 2.pdf Restricted to Registered users only Download (1MB) |
||
Text
Jeffry Hirawan 11302021 3.pdf Restricted to Registered users only Download (552kB) |
||
Text
Jeffry Hirawan 11302021 4.pdf Restricted to Registered users only Download (1MB) |
||
Text
Jeffry Hirawan 11302021 5.pdf Restricted to Registered users only Download (581kB) |
||
|
Text
Jeffry Hirawan 11302021 Ref.pdf Download (326kB) | Preview |
Abstract
Users are in danger of getting hit by a client side attacks which can come from a malicious URL. This URL can contain trojan apps that disguise as a normal application or trigger a download and executing malware without the user’s concent. The research tackled the issue of malicious URL behaviors when interacting with user’s system. The Interaction is captured by using a combination of low interaction and high interaction honeypots. Low interaction honeypot will capture site behavior when visited, and capture their malicious payload, while high interaction honeypot collects state changes that occur in user’s system during site’s visitation. From this research, we can conclude that malicious site can distribute malware by disguising it as a normal application, and some site will behave differently to avoid being detected while being analyzed by the honeypots. We also added improvements to low interaction honeypot by adding the ability to crawl and process a large number of URL automatically. This improvement will improve the capability of the honeypot to gather a large amount of data in a shorter time than before. We have decreased the overall time of the process using this improvement up to 43%.
Item Type: | Thesis (Bachelor) |
---|---|
Uncontrolled Keywords: | Honeypot; Malicious URL Behavior; Client Site Attacks |
Subjects: | Q Science > QA Mathematics > QA76 Computer software > |
Divisions: | Faculty of Engineering and Information Technology > Department of Information Technology |
Depositing User: | Astuti Kusumaningrum |
Date Deposited: | 11 May 2020 06:34 |
Last Modified: | 11 May 2020 06:34 |
URI: | http://repository.sgu.ac.id/id/eprint/264 |
Actions (login required)
View Item |