Wannacry Identification For Computer Data Security Identifikasi Wannacry untuk Keamanan Data Komputer

Main Article Content

Alfan Hakim Wijaya
Arif Senja

Abstract

The purpose of this study is, to find out the features of the wanscry ransomware that have not been run and extract the Windows computer data system from wannacry in the scope of an interconnection network. To find out the behavior of wannacry ransomware after running on a Windows computer system and knowing how to use the ransomware


The method used in this research is Surface Analysis, Static Analysis, Runtime Analysis, and Intrusion Detection System. The research was carried out in the umsida informatics laboratory, data collection information about wannacry  through  journals,  ebooks,  and  the  internet.  Identification   techniques  are  carried  out  before ransomware is run on the system Windows operation, and after running.


The conclusion of this study is to identify the characteristics  of wannacry ransomware outside with software strings,  graphics,  and  to  identify  in  depth  with  the  OllyDbg,  IdaPro  software,  and  to  identify  when  the ransomware  is  run  the  software  used  by  TcpView,  Procmon,  ProcessExplore.  Determine  the  exploitation technique  of wannacry  spread on computer systems.  Along with ways to prevent the spread of infections in computer systems and networks using microtics

Article Details

Section
Articles

References

[1] https://habibahmadpurba.wordpress.com (2013), Jenis-jenis port untuk koneksi Data, email : habibahmadpurba@yahoo.co.id
[2] Nisha, Farik (2017) a. “RSA Public Key Cryptography Algorithm –AReview”, Water Resources Research, VOLUME 6, ISSUE 07.
[3] Bernardino Madaharsa Dito Adiwidya (2008), Algoritma AES (Advanced Encryption Standard) dan
Penggunaannya dalam Penyandian Pengompresian Data, Institut Teknologi Bandung, Bandung.
[4] Karen Scarfone Dan Peter Mell (2007), Guide to Intrusion Detection and Prevention System (IDPS), National
Institute of Standards and Technology, USA.
[5] http://ilmukomputer.org (2018), Pengenalan Dan Dasar Penggunaan Wireshark, Author: Annisa
Cahyaningtyas.

[6] Aaron Zimba, Luckson Simukonda, Mumbi Chishimba (2017), “Demystifying Ransomware Attacks: Reverse Engineering and Dynamic Malware Analysis of WannaCry for Network and Information Security”, Water Resources Research, Vol. 1,No.1 hal. 35-40
[7] Justin Jones, Narasimha Shashidhar (2017), “Ransomware Analysis and DefenseWannaCry and the Win32 environment”, Water Resource Research, Vol.6, No.4.
[8] Suryadi Syamsu (2014), Modul Jaringan Komputer, BAB 4 Protokol Jaringan Komputer, STMIK AKBA.
[9] Suryadi Syamsu, (2014), Modul Jaringan Komputer, BAB 1 Pengenalan Jaringan Komputer, STMIK AKBA.
[10] Sean Dillon, Dylan Davis (2017), ETERNALBLUE Exploit Analysis and Port to Microsoft Windows 10, RiskSense, U.S. Department of Defense and U.S. Intelligence Community.
[11] Computer Security Incident Response Team of Mauritius (2017), The Wannacry Ransomeware, CERT-MU, Port Louis.