KnE Social Sciences

ISSN: 2518-668X

The latest conference proceedings on humanities, arts and social sciences.

Detection Suspicious Activities on Network Package Traffic

Published date: May 26 2023

Journal Title: KnE Social Sciences

Issue title: International Conference on Advance & Scientific Innovation (ICASI)

Pages: 23–33

DOI: 10.18502/kss.v8i9.13316

Authors:

Nunu Kustian - kustiannunu@gmail.com

Anggit Ilham Tantowi

Herlinda .

Dudi Parulian

Erlin Windia Ambarsari

Abstract:

One problem of computer network security was that unauthorized people had access to websites on the internet—the way to interject malicious programs that aim to send viruses and even commit data theft. Therefore, it was critical to understand the types of attacks in the different forms of crime that can not only harm organizational infrastructure but also affect financially. Detection of criminal activities was carried out with the help of Wireshark Software to view data packets, which indicated criminal programs carried out by intruders secretly on the official website. The capture packets on the running network had suspicious packets as evidence that led to malware infections. Therefore, both the owner and website users needed security protection by planning strategies to overcome criminal activities that infect websites.

Keywords: malicious programs, malware, network package traffic, Wireshark

References:

[1] Furnell S, Collins E. Cyber security: What are we talking about? Comput Fraud Secur. 2021;2021(7):6–11.

[2] Sikos LF. Packet analysis for network forensics: A comprehensive survey. Forensic Sci Int Digit Investig. 2020;32:200892.

[3] Avasthi D. “Network forensic analysis with efficient preservation for SYN attack.” Int J Comput Appl. 2012;46(24):17–22. [Online]. Available: http: //scholar.google.com/scholar?hl=en&btnG=Search&q=intitle:Network+Forensic+ Analysis+with+Efficient+Preservation+for+SYN+Attack#0

[4] “Wireshark.” https://www.wireshark.org/

[5] Vancea CM, Dobrota V, Wireshark AP. “SNMP Agent for WLAN networks.” no. 216041, 1998.

[6] Sibi Chakkaravarthy S, Sangeetha D, Vaidehi V. A survey on malware analysis and mitigation techniques. Comput Sci Rev. 2019;32:1–23.

[7] Babu NM, Murali G. “Malware detection for multi cloud servers using intermediate monitoring server.” Int Conf Energy Commun Data Anal Soft Comput (ICECDS). 2017;3609–3612. 2018.

[8] Goli YD, Ambika R. “Network traffic classification techniques-A review.” Proc Int Conf Comput Tech Electron Mech Syst (CTEMS) 2018;219–222.

[9] Navabud P. “Analyzing thewebmail using Wireshark.” pp. 1237–1239.

[10] Sandhya S, Purkayastha S, Joshua E, Deep A. “Assessment of website security by penetration testing using Wireshark.” 2017 4th Int Conf Adv Comput Commun Syst (ICACCS) 2017;4–7. https://doi.org/10.1109/ICACCS.2017.8014711.

[11] Malecki F. Defending your business from exploit kits. Comput Fraud Secur. 2013;2013(6):19–20.

Download
HTML
Cite
Share
statistics

609 Abstract Views

173 PDF Downloads