Wannacry Identification For Computer Data Security
Identifikasi Wannacry untuk Keamanan Data Komputer
Abstract
The purpose of this study is, to find out the features of the wanscry ransomware that have not been run and extract the Windows computer data system from wannacry in the scope of an interconnection network. To find out the behavior of wannacry ransomware after running on a Windows computer system and knowing how to use the ransomware
The method used in this research is Surface Analysis, Static Analysis, Runtime Analysis, and Intrusion Detection System. The research was carried out in the umsida informatics laboratory, data collection information about wannacry through journals, ebooks, and the internet. Identification techniques are carried out before ransomware is run on the system Windows operation, and after running.
The conclusion of this study is to identify the characteristics of wannacry ransomware outside with software strings, graphics, and to identify in depth with the OllyDbg, IdaPro software, and to identify when the ransomware is run the software used by TcpView, Procmon, ProcessExplore. Determine the exploitation technique of wannacry spread on computer systems. Along with ways to prevent the spread of infections in computer systems and networks using microtics
References
https://habibahmadpurba.wordpress.com (2013), Jenis-jenis port untuk koneksi Data, email : habibahmadpurba@yahoo.co.id
Nisha, Farik (2017) a. “RSA Public Key Cryptography Algorithm –AReview”, Water Resources Research, VOLUME 6, ISSUE 07.
Bernardino Madaharsa Dito Adiwidya (2008), Algoritma AES (Advanced Encryption Standard) dan
Penggunaannya dalam Penyandian Pengompresian Data, Institut Teknologi Bandung, Bandung.
Karen Scarfone Dan Peter Mell (2007), Guide to Intrusion Detection and Prevention System (IDPS), National
Institute of Standards and Technology, USA.
http://ilmukomputer.org (2018), Pengenalan Dan Dasar Penggunaan Wireshark, Author: Annisa
Cahyaningtyas.
Aaron Zimba, Luckson Simukonda, Mumbi Chishimba (2017), “Demystifying Ransomware Attacks: Reverse Engineering and Dynamic Malware Analysis of WannaCry for Network and Information Security”, Water Resources Research, Vol. 1,No.1 hal. 35-40
Justin Jones, Narasimha Shashidhar (2017), “Ransomware Analysis and DefenseWannaCry and the Win32 environment”, Water Resource Research, Vol.6, No.4.
Suryadi Syamsu (2014), Modul Jaringan Komputer, BAB 4 Protokol Jaringan Komputer, STMIK AKBA.
Suryadi Syamsu, (2014), Modul Jaringan Komputer, BAB 1 Pengenalan Jaringan Komputer, STMIK AKBA.
Sean Dillon, Dylan Davis (2017), ETERNALBLUE Exploit Analysis and Port to Microsoft Windows 10, RiskSense, U.S. Department of Defense and U.S. Intelligence Community.
Computer Security Incident Response Team of Mauritius (2017), The Wannacry Ransomeware, CERT-MU, Port Louis.
Copyright (c) 2019 Alfan Hakim Wijaya, Arif Senja Fitrani
This work is licensed under a Creative Commons Attribution 4.0 International License.