Enhancing Honeypot To Collect Client Side Attacks Behavior From Malicious URL

Hirawan, Jeffry and Lim, Charles and Galinium, Maulahikmah (2017) Enhancing Honeypot To Collect Client Side Attacks Behavior From Malicious URL. Bachelor thesis, Swiss German University.

[img]
Preview
Text
Jeffry Hirawan 11302021 TOC.pdf

Download (796kB) | Preview
[img] Text
Jeffry Hirawan 11302021 1.pdf
Restricted to Registered users only

Download (341kB)
[img] Text
Jeffry Hirawan 11302021 2.pdf
Restricted to Registered users only

Download (1MB)
[img] Text
Jeffry Hirawan 11302021 3.pdf
Restricted to Registered users only

Download (552kB)
[img] Text
Jeffry Hirawan 11302021 4.pdf
Restricted to Registered users only

Download (1MB)
[img] Text
Jeffry Hirawan 11302021 5.pdf
Restricted to Registered users only

Download (581kB)
[img]
Preview
Text
Jeffry Hirawan 11302021 Ref.pdf

Download (326kB) | Preview

Abstract

Users are in danger of getting hit by a client side attacks which can come from a malicious URL. This URL can contain trojan apps that disguise as a normal application or trigger a download and executing malware without the user’s concent. The research tackled the issue of malicious URL behaviors when interacting with user’s system. The Interaction is captured by using a combination of low interaction and high interaction honeypots. Low interaction honeypot will capture site behavior when visited, and capture their malicious payload, while high interaction honeypot collects state changes that occur in user’s system during site’s visitation. From this research, we can conclude that malicious site can distribute malware by disguising it as a normal application, and some site will behave differently to avoid being detected while being analyzed by the honeypots. We also added improvements to low interaction honeypot by adding the ability to crawl and process a large number of URL automatically. This improvement will improve the capability of the honeypot to gather a large amount of data in a shorter time than before. We have decreased the overall time of the process using this improvement up to 43%.

Item Type: Thesis (Bachelor)
Uncontrolled Keywords: Honeypot; Malicious URL Behavior; Client Site Attacks
Subjects: Q Science > QA Mathematics > QA76 Computer software >
Divisions: Faculty of Engineering and Information Technology > Department of Information Technology
Depositing User: Astuti Kusumaningrum
Date Deposited: 11 May 2020 06:34
Last Modified: 11 May 2020 06:34
URI: http://repository.sgu.ac.id/id/eprint/264

Actions (login required)

View Item View Item