Impact Analysis of Malware Based on Call Network API With Heuristic Detection Method

Authors

  • One Tika Suryati School of Industrial and System Engineering, Telkom University
  • Avon Budiono School of Industrial and System Engineering, Telkom University

DOI:

https://doi.org/10.25008/ijadis.v1i1.176

Keywords:

Malware, Malware analysis, Heuristic detection, Call network API

Abstract

Malware is a program that has a negative influence on computer systems that don't have user permissions. The purpose of making malware by hackers is to get profits in an illegal way. Therefore, we need a malware analysis. Malware analysis aims to determine the specifics of malware so that security can be built to protect computer devices. One method for analyzing malware is heuristic detection. Heuristic detection is an analytical method that allows finding new types of malware in a file or application. Many malwares are made to attack through the internet because of technological advancements. Based on these conditions, the malware analysis is carried out using the API call network with the heuristic detection method. This aims to identify the behavior of malware that attacks the network. The results of the analysis carried out are that most malware is spyware, which is lurking user activity and retrieving user data without the user's knowledge. In addition, there is also malware that is adware, which displays advertisements through pop-up windows on computer devices that interfaces with user activity. So that with these results, it can also be identified actions that can be taken by the user to protect his computer device, such as by installing antivirus or antimalware, not downloading unauthorized applications and not accessing unsafe websites.

 

Downloads

Download data is not yet available.

References

C. Donalds and K. Osei-Bryson, "Toward a cybercrime classification ontology: A knowledge-based approach", Computers in Human Behavior, vol. 92, pp. 403-418, 2018. Available: 10.1016/j.chb.2018.11.039.

L. Zeltser, "What Is Malware ?", Sans Institute, 2016.

Teknik Penyebaran Malware | Jul Ismail, Jul Ismail, 2016. [Online]. Available: https://julismail.staff.telkomuniversity.ac.id/teknik-penyebaran-malware/. [Accessed: 23- Sep- 2018].

E. Gandotra, D. Bansal and S. Sofat, "Malware Analysis and Classification: A Survey", Journal of Information Security, vol. 05, no. 02, pp. 56-64, 2014. Available: 10.4236/jis.2014.52006.

D. Uppal, V. Mehra and V. Verma, "Basic survey on Malware Analysis, Tools and Techniques", International Journal on Computational Science & Applications, vol. 4, no. 1, pp. 103-112, 2014. Available: 10.5121/ijcsa.2014.4110.

D. Deka, N. Sarma and N. Panicker, "Malware detection vectors and analysis techniques: A brief survey", 2016 International Conference on Accessibility to Digital World (ICADW), 2016. Available: 10.1109/icadw.2016.7942517 [Accessed 26 May 2019].

P. Shijo and A. Salim, "Integrated Static and Dynamic Analysis for Malware Detection", Procedia Computer Science, vol. 46, pp. 804-811, 2015. Available: 10.1016/j.procs.2015.02.149.

J. Raymond, "What is Malware and How Can We Prevent It?", Comodo Antivirus Blogs | Anti-Virus Software Updates, 2018. [Online]. Available: https://antivirus.comodo.com/blog/how-to/what-is-malware/. [Accessed: 09- Dec- 2018].

S. More and P. Gaikwad, "Trust-based Voting Method for Efficient Malware Detection", Procedia Computer Science, vol. 79, pp. 657-667, 2016. Available: 10.1016/j.procs.2016.03.084.

N. Zalavadiya and P. Sharman, "A Methodology of Malware Analysis, Tools and Technique for windows platform – RAT Analysis", International Journal of Innovative Research in Computer and Communication Engineering, vol. 5, no. 3, 2017.

R. Sihwail, K. Omar and K. Zainol Ariffin, "A Survey on Malware Analysis Techniques: Static, Dynamic, Hybrid and Memory Analysis", International Journal on Advanced Science, Engineering and Information Technology, vol. 8, no. 4-2, p. 1662, 2018. Available: 10.18517/ijaseit.8.4-2.6827.

Walkthrough: Calling Windows APIs (Visual Basic), Docs.microsoft.com, 2015. [Online]. Available: https://docs.microsoft.com/en-us/dotnet/visual-basic/programming-guide/com-interop/walkthrough-calling-windows-apis. [Accessed: 09- Dec- 2018].

Windows API Index - Windows applications, Docs.microsoft.com, 2018. [Online]. Available: https://docs.microsoft.com/en-us/windows/desktop/apiindex/windows-api-list. [Accessed: 09- Dec- 2018].

PUP.Optional.DriverPack - Malwarebytes Labs, Malwarebytes Labs, 2019. [Online]. Available: https://blog.malwarebytes.com/detections/pup-optional-driverpack/. [Accessed: 26- Apr- 2019].

PUP.Optional.DriverToolkit - Malwarebytes Labs, Malwarebytes Labs, 2019. [Online]. Available: https://blog.malwarebytes.com/detections/pup-optional-drivertoolkit/. [Accessed: 26- Apr- 2019].

]PUP.Optional.InstallCore - Malwarebytes Labs, Malwarebytes Labs. [Online]. Available: https://blog.malwarebytes.com/detections/pup-optional-installcore/. [Accessed: 26- Apr- 2019].

PUP.Optional.WinYahoo - Malwarebytes Labs, Malwarebytes Labs. [Online]. Available: https://blog.malwarebytes.com/detections/pup-optional-winyahoo. [Accessed: 26- Apr- 2019].

What is spyware? - Definition from WhatIs.com, SearchSecurity, 2019. [Online]. Available: https://searchsecurity.techtarget.com/definition/spyware. [Accessed: 28- Apr- 2019].

Malwarebytes for Windows - Antivirus Replacement for PCs, Malwarebytes. [Online]. Available: https://www.malwarebytes.com/premium/. [Accessed: 29- Apr- 2019].

What are Registry Keys? - Remove Spyware & Malware with SpyHunter - EnigmaSoft Ltd, Remove Spyware & Malware with SpyHunter - EnigmaSoft Ltd. [Online]. Available: https://www.enigmasoftware.com/what-are-windows-registry-keys/. [Accessed: 29- Apr- 2019].

T. Adi Cahyanto, V. Wahanggara and D. Ramadana, "Analisis dan Deteksi Malware Menggunakan Metode Malware Analisis Dinamis dan Malware Analisis Statis", Justindo, vol. 2, no. 1, 2017. [Accessed 26 May 2019].

A. F. Muhtadi and A. Almaarif, “Analysis of Malware Impact on Network Traffic using Behavior-based Detection Technique”, International Journal of Advances in Data and Information Systems, vol. 1, no. 1, pp. 17-25, Mar. 2020.

Downloads

Published

2020-04-01

How to Cite

Impact Analysis of Malware Based on Call Network API With Heuristic Detection Method (O. T. . Suryati & A. . Budiono , Trans.). (2020). International Journal of Advances in Data and Information Systems, 1(1), 1-8. https://doi.org/10.25008/ijadis.v1i1.176

Similar Articles

1-10 of 41

You may also start an advanced similarity search for this article.