 |
UPT. PERPUSTAKAAN
Universitas Esa Unggul
Kampus Emas UEU - Jakarta Barat
|
Phone |
: |
021-5674223, ext 282 |
Fax |
: |
|
E-mail |
: |
[email protected] |
Website |
: |
http://library.esaunggul.ac.id
|
Support (Customer Service) :
|
[email protected] |
|
|
Welcome..guys!
|
Have a problem with your access?
Please, contact our technical support below:
|
LIVE SUPPORT
 Astrid Chrisafi
|
! ATTENTION !
To facilitate the activation process, please fill out the member application form correctly and completely
Registration activation of our members will process up to max 24 hours (confirm by email). Please wait patiently
Still Confuse?
Please read our User Guide
|
|
UEU » Journal » Teknik Informatika Posted by [email protected] at 19/11/2014 17:31:56 • 1063 Views
ANALISIS MODIFIKASI KONFIGURASI ACCESS CONTROL LIST PADA USB FLASH DISK : STUDI KASUS PADA PENYEBARAN MALWARE TROJAN SHORTCUTCreated by :
Nugroho Budhisantosa ( none )
Subject: | FLASH DISK TROJAN | Alt. Subject : | MALWARE USB | Keyword: | root directory mencegah penyebaran access control list
|
Description:
Penelitian ini bertujuan untuk menemukan suatu cara pencegahan penyebaran malwaretrojan Shortcut melalui pengontrolan Access Control List (ACL) pada media
penyimpanan eksternal berupa USB Flash Disk (UFD). Trojan shortcut menginfeksi UFD
dengan cara menginjeksi file AutoRun.inf dan AntiSys.exe pada root directory UFD yangterhubung dengan computer yang terinfeksi. Ketika UFD yang terinfeski terhubuhng
dengan komputer yang tidak terlindungi, file AutoRun.inf akan berjalan mengeksekusi file
AntiSys.exe nya pada komputer korban dan muatan Trojan akan menguasai komputertersebut. Cara sederhana untuk mencegah penyebaran malware Trojan yang menginjeksifile AutoRun.inf pada root directory adalah dengan melindungi root directory UFD dari
upaya aktivitas penulisan, sebagai konsekuensinya beberapa sub-folder tanpa pembatasan
perlu dibuat di bawah root directory sehingga UFD tersebut dapat tetap digunakanselayaknya. Access Control List (ACL) adalah fitur keamanan Sistem Operasi Microsoft
Windows yang memungkinkan pengguna untuk melindungi folder dengan serangkaian
konfigurasi perijinan. Mengaplikasikan aturan ACL pada UFD diimplementasikan pada
penelitian ini dimana dua UFD dengan modifikasi ACL dan dengan kondisi standar
dibandingkan perilakunya terhadap infeksi Trojan Shortcut. Hasil penelitian
menunjukkan bahwa metode modifikasi ACL pada UFD secara efektif dapat mencegahpenyebaran malware trojan Shortcut, dimana Trojan Shortcut tidak lagi memilikikemampuan untuk menginfeksi UFD dengan ACL yang telah dikontrol pengkasessannya
Alt. Description
This research is conducted to find a solution to prevent the spreading the Shortcut Trojanmalware using the Access Control List modification method which is applied on USBFlash Disk (UFD) external storage. Shortcut Trojan infects UFD by injecting
AutoRun.inf and AntiSys.exe files in the root directory of UFD which is connected to
infected computers. Once the infected UFD is connected to another unprotected host, the
AutoRun.inf file in UFD will be run automatically executed its AntiSys.exe file in the
victim host and the Trojan�s payload will compromise the host. The simply method toprevent Trojan malware which is inject AutoRun.inf file to UFD root directory is to
protect the UFD root directory against the writing activities, as a consequence some subfolder
should
be created under
the
root
directory
with
no
restriction
so
that
the
UFD stillcan
be use
properly.
Access Control
List
(ACL)
is
a security
policy feature
provide
by
Microsoft
Windows
Operating System
which
is
allow
users
to
protect
folder
using
aseries
of permission
configuration.
Applying
ACL
policy
on UFD
is
implemented
in thisresearch
where
two
UFD
with ACL
modification
and
with
factory
standard
is compared
its
behavior
against
Shortcut
Trojan
infection.The
result
of
this
research
shown
that
the
Access
Control
List modification
method
on UFD
effectively
performed
its functions
inorder
to
prevent
the
spreading
of Shortcut
Trojan
where
the
Shortcut
Trojan
has
lost
itsability
to
infect
the
UFD which
was
modified
on
its ACL
Date Create | : | 19/11/2014 | Type | : | Text | Format | : | pdf | Language | : | Indonesian | Identifier | : | UEU-Journal-JK100914_BUD | Collection ID | : | JK100914_BUD |
Source : Jurnal Ilmu Komputer Volume 10 Nomor 2 September 2014
Relation Collection: Puspen Jurnal UEU
Coverage : Civitas Akademika Universitas Esa Unggul
Rights : copyright@2014 Puspen Jurnal UEU
Publication URL : https://digilib.esaunggul.ac.id/analisis-modifikasi-konfigurasi-access-control-list-pada-usb-flash-disk--studi-kasus-pada-penyebaran-malware-trojan-shortcut-3654.html
[ Free Download - Free for All ]
UEU-Journal-3654-nugroho-budhisantosa.pdf - 507 KB
[ FullText Content - Please, register first ]
...No Files...
10 Similar Document...
No similar subject found !
10 Related Document...
No related subject found !
|
POLLINGBagaimana pendapat Anda tentang repository kami ?

       
Visitors Today : 1
Total Visitor : 1970538
Hits Today : 35827
Total Hits : 182616755
Visitors Online: 1
Calculated since 16 May 2012
You are connected from 172.17.121.29 using Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; [email protected])
|