Analisis Karakteristik Antivirus Berdasarkan Aktivitas Malware menggunakan Analisis Dinamis


  • Ma'arij Haritsah * Mail Telkom University, Bandung, Indonesia
  • Adityas Widjajarto Telkom University, Bandung, Indonesia
  • Ahmad Almaarif Telkom University, Bandung, Indonesia
  • (*) Corresponding Author
Keywords: Antivirus; Antivirus Characteristics; Antivirus Detection Rate; Dynamic Malware Analysis; Malware; Removable Drive Protection

Abstract

Malware, short for “Malicious Software”, is a program specifically designed to perform an activity that can harm software on a victim's device. Examples of commonly found malware include trojans, ransomware and downloaders. It is important for computer users to recognize and avoid malware when using computer devices. Therefore, computer users can overcome malware attacks by using protection software specifically for computer devices using Antivirus software designed to prevent, find, detect, and remove the types of malware that have been mentioned previously. In this study, the dynamic analysis method is used to determine malware activity by running it and monitoring the activity that occurs. This method is usually used to identify the actions that malware performs when it runs. The results showed that the higher the number of malware activities, the higher the metrics tested on the antivirus, such as CPU, memory, disk, and scan time. Regarding the removable drive protection feature, Avast antivirus is relatively more efficient compared to other antiviruses because it has an average CPU usage, low memory, a fairly high detection rate, and fast scan times. Kaspersky Antivirus is relatively the most effective in detecting malware samples with the highest detection rate of 100%. Meanwhile, the Windows Defender antivirus is relatively the weakest in terms of detection rate because it has the lowest detection rate.

Downloads

Download data is not yet available.

References

S. Kramer and J. C. Bradfield, “A general definition of malware,” Journal in Computer Virology, vol. 6, no. 2, pp. 105–114, May 2010, doi: 10.1007/s11416-009-0137-1.

M. Siddiqui, M. C. Wang, and J. Lee, “A survey of data mining techniques for malware detection using file features,” Proceedings of the 46th Annual Southeast Regional Conference on XX - ACM-SE 46, 2008, doi: 10.1145/1593105.1593239.

N. Kaur and A. Kumar, “A Complete Dynamic Malware Analysis,” Int J Comput Appl, vol. 135, no. 4, pp. 20–25, Feb. 2016, doi: 10.5120/ijca2016908283.

V. A. Manoppo, A. S. M. Lumenta, and S. D. S. Karouw, “Analisa Malware Menggunakan Metode Dynamic Analysis Pada Jaringan Universitas Sam Ratulangi,” Jurnal Teknik Elektro dan Komputer, vol. 9, pp. 181–188, Jan. 2020, doi: 10.35793/jtek.9.3.2020.29567.

O. Whitehouse, “Antivirus Software,” Engineering & Technology Reference, Jan. 2014, doi: 10.1049/etr.2014.0006.

A. Bastian, “Improving Antivirus Signature For Detection Ransomware Attacks With Machine Learning,” Smart Comp :Jurnalnya Orang Pintar Komputer, vol. 10, pp. 30–34, Jan. 2021, doi: 10.30591/smartcomp.v10i1.2190.

Kaspersky, “Apa itu Analisis Heuristik?” 2019. [Online]. Available: https://usa.kaspersky.com/resource-center/definitions/heuristic-analysis

L. Rosencrance, “What is antivirus software (antivirus program)?” Jan. 2017. [Online]. Available: https://www.techtarget.com/searchsecurity/definition/antivirus-software

Techslang, “What is Antivirus Software? — Definition by Techslang.” Jan. 2019. [Online]. Available: https://www.techslang.com/definition/what-is-antivirus-software/

J. Danandjaja, “Metode Penelitian Kepustakaan,” Antropologi Indonesia, vol. 0, no. 52, Jul. 2014, doi: 10.7454/ai.v0i52.3318.

A. A. Pradipta, Y. A. Prasetyo, and N. Ambarsari, “Pengembangan Web E-Commerce Bojana Sari Menggunakan Metode Prototype,” eProceedings of Engineering, vol. 2, Jan. 2015, [Online]. Available: https://openlibrarypublications.telkomuniversity.ac.id/index.php/engineering/article/view/2726

G. Wagener, A. Dulaunoy, and T. Engel, “An Instrumented Analysis of Unknown Software and Malware Driven by Free Libre Open Source Software.” pp. 597–605, Jan. 2008. doi: 10.1109/SITIS.2008.57.

M. Sikorski and A. Honig, Practical malware analysis : the hands-on guide to dissecting malicious software. San Francisco No Starch Press, 2012.

O. Aslan and R. Samet, “Investigation of possibilities to detect malware using existing tools,” in Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA, Mar. 2018, vol. 2017-October, pp. 1277–1284. doi: 10.1109/AICCSA.2017.24.

Kaspersky, “Removable drives scan.” Jan. 2022. [Online]. Available: https://support.kaspersky.com/KES4Linux/11/en-us/193947.htm

A. S. Tanenbaum and H. Bos, Modern operating systems, 4th ed. Pearson Education, 2015.

K. Shihab and H. Ramadhan, “Tuning of computer systems using heuristics and system performance tools,” Expert Syst Appl, vol. 36, pp. 5230–5239, Jan. 2009, doi: 10.1016/j.eswa.2008.06.139.

M. Egele, T. Scholte, E. Kirda, and C. Kruegel, “A Survey on Automated Dynamic Malware-analysis Techniques and Tools,” ACM Comput Surv, vol. 44, pp. 1–42, Jan. 2012, doi: 10.1145/2089125.2089126.

O. Or-Meir, N. Nissim, Y. Elovici, and L. Rokach, “Dynamic malware analysis in the modern era—A state of the art survey,” ACM Comput Surv, vol. 52, no. 5, Sep. 2019, doi: 10.1145/3329786.

P. Dash, Getting started with Oracle VM VirtualBox : build your own virtual enviroment from scratch using VirtualBox. Packt Pub, 2013.


Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Analisis Karakteristik Antivirus Berdasarkan Aktivitas Malware menggunakan Analisis Dinamis

Dimensions Badge
Article History
Submitted: 2023-01-11
Published: 2023-01-31
Abstract View: 1886 times
PDF Download: 1347 times
How to Cite
Haritsah, M., Widjajarto, A., & Almaarif, A. (2023). Analisis Karakteristik Antivirus Berdasarkan Aktivitas Malware menggunakan Analisis Dinamis. Journal of Information System Research (JOSH), 4(2), 693-700. https://doi.org/10.47065/josh.v4i2.2908
Section
Articles