Analisis Karakteristik Antivirus Berdasarkan Aktivitas Malware menggunakan Analisis Dinamis
Abstract
Malware, short for “Malicious Software”, is a program specifically designed to perform an activity that can harm software on a victim's device. Examples of commonly found malware include trojans, ransomware and downloaders. It is important for computer users to recognize and avoid malware when using computer devices. Therefore, computer users can overcome malware attacks by using protection software specifically for computer devices using Antivirus software designed to prevent, find, detect, and remove the types of malware that have been mentioned previously. In this study, the dynamic analysis method is used to determine malware activity by running it and monitoring the activity that occurs. This method is usually used to identify the actions that malware performs when it runs. The results showed that the higher the number of malware activities, the higher the metrics tested on the antivirus, such as CPU, memory, disk, and scan time. Regarding the removable drive protection feature, Avast antivirus is relatively more efficient compared to other antiviruses because it has an average CPU usage, low memory, a fairly high detection rate, and fast scan times. Kaspersky Antivirus is relatively the most effective in detecting malware samples with the highest detection rate of 100%. Meanwhile, the Windows Defender antivirus is relatively the weakest in terms of detection rate because it has the lowest detection rate.
Downloads
References
S. Kramer and J. C. Bradfield, “A general definition of malware,” Journal in Computer Virology, vol. 6, no. 2, pp. 105–114, May 2010, doi: 10.1007/s11416-009-0137-1.
M. Siddiqui, M. C. Wang, and J. Lee, “A survey of data mining techniques for malware detection using file features,” Proceedings of the 46th Annual Southeast Regional Conference on XX - ACM-SE 46, 2008, doi: 10.1145/1593105.1593239.
N. Kaur and A. Kumar, “A Complete Dynamic Malware Analysis,” Int J Comput Appl, vol. 135, no. 4, pp. 20–25, Feb. 2016, doi: 10.5120/ijca2016908283.
V. A. Manoppo, A. S. M. Lumenta, and S. D. S. Karouw, “Analisa Malware Menggunakan Metode Dynamic Analysis Pada Jaringan Universitas Sam Ratulangi,” Jurnal Teknik Elektro dan Komputer, vol. 9, pp. 181–188, Jan. 2020, doi: 10.35793/jtek.9.3.2020.29567.
O. Whitehouse, “Antivirus Software,” Engineering & Technology Reference, Jan. 2014, doi: 10.1049/etr.2014.0006.
A. Bastian, “Improving Antivirus Signature For Detection Ransomware Attacks With Machine Learning,” Smart Comp :Jurnalnya Orang Pintar Komputer, vol. 10, pp. 30–34, Jan. 2021, doi: 10.30591/smartcomp.v10i1.2190.
Kaspersky, “Apa itu Analisis Heuristik?” 2019. [Online]. Available: https://usa.kaspersky.com/resource-center/definitions/heuristic-analysis
L. Rosencrance, “What is antivirus software (antivirus program)?” Jan. 2017. [Online]. Available: https://www.techtarget.com/searchsecurity/definition/antivirus-software
Techslang, “What is Antivirus Software? — Definition by Techslang.” Jan. 2019. [Online]. Available: https://www.techslang.com/definition/what-is-antivirus-software/
J. Danandjaja, “Metode Penelitian Kepustakaan,” Antropologi Indonesia, vol. 0, no. 52, Jul. 2014, doi: 10.7454/ai.v0i52.3318.
A. A. Pradipta, Y. A. Prasetyo, and N. Ambarsari, “Pengembangan Web E-Commerce Bojana Sari Menggunakan Metode Prototype,” eProceedings of Engineering, vol. 2, Jan. 2015, [Online]. Available: https://openlibrarypublications.telkomuniversity.ac.id/index.php/engineering/article/view/2726
G. Wagener, A. Dulaunoy, and T. Engel, “An Instrumented Analysis of Unknown Software and Malware Driven by Free Libre Open Source Software.” pp. 597–605, Jan. 2008. doi: 10.1109/SITIS.2008.57.
M. Sikorski and A. Honig, Practical malware analysis : the hands-on guide to dissecting malicious software. San Francisco No Starch Press, 2012.
O. Aslan and R. Samet, “Investigation of possibilities to detect malware using existing tools,” in Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA, Mar. 2018, vol. 2017-October, pp. 1277–1284. doi: 10.1109/AICCSA.2017.24.
Kaspersky, “Removable drives scan.” Jan. 2022. [Online]. Available: https://support.kaspersky.com/KES4Linux/11/en-us/193947.htm
A. S. Tanenbaum and H. Bos, Modern operating systems, 4th ed. Pearson Education, 2015.
K. Shihab and H. Ramadhan, “Tuning of computer systems using heuristics and system performance tools,” Expert Syst Appl, vol. 36, pp. 5230–5239, Jan. 2009, doi: 10.1016/j.eswa.2008.06.139.
M. Egele, T. Scholte, E. Kirda, and C. Kruegel, “A Survey on Automated Dynamic Malware-analysis Techniques and Tools,” ACM Comput Surv, vol. 44, pp. 1–42, Jan. 2012, doi: 10.1145/2089125.2089126.
O. Or-Meir, N. Nissim, Y. Elovici, and L. Rokach, “Dynamic malware analysis in the modern era—A state of the art survey,” ACM Comput Surv, vol. 52, no. 5, Sep. 2019, doi: 10.1145/3329786.
P. Dash, Getting started with Oracle VM VirtualBox : build your own virtual enviroment from scratch using VirtualBox. Packt Pub, 2013.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Analisis Karakteristik Antivirus Berdasarkan Aktivitas Malware menggunakan Analisis Dinamis
Pages: 693-700
Copyright (c) 2023 Ma'arij Haritsah, Adityas Widjajarto, Ahmad Almaarif

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).






















