EMAIL: PASSWORD:
Front Office
UPT. PERPUSTAKAAN
Universitas Esa Unggul


Kampus Emas UEU - Jakarta Barat

Phone : 021-5674223, ext 282
Fax :
E-mail : [email protected]
Website : http://library.esaunggul.ac.id

Support (Customer Service) :
[email protected]








Welcome..guys!

Have a problem with your access?
Please, contact our technical support below:
LIVE SUPPORT


Astrid Chrisafi




! ATTENTION !

To facilitate the activation process, please fill out the member application form correctly and completely
Registration activation of our members will process up to max 24 hours (confirm by email). Please wait patiently

Still Confuse?
Please read our User Guide

Keyword
Mode
Expanded Search (for Free text search only)
 

UEU » Journal » Teknik Informatika
Posted by [email protected] at 19/11/2014 17:31:56  •  1063 Views


ANALISIS MODIFIKASI KONFIGURASI ACCESS CONTROL LIST PADA USB FLASH DISK : STUDI KASUS PADA PENYEBARAN MALWARE TROJAN SHORTCUT

Created by :
Nugroho Budhisantosa ( none )



SubjectFLASH DISK
TROJAN
Alt. Subject MALWARE
USB
Keywordroot directory
mencegah penyebaran
access control list

Description:

Penelitian ini bertujuan untuk menemukan suatu cara pencegahan penyebaran malwaretrojan Shortcut melalui pengontrolan Access Control List (ACL) pada media penyimpanan eksternal berupa USB Flash Disk (UFD). Trojan shortcut menginfeksi UFD dengan cara menginjeksi file AutoRun.inf dan AntiSys.exe pada root directory UFD yangterhubung dengan computer yang terinfeksi. Ketika UFD yang terinfeski terhubuhng dengan komputer yang tidak terlindungi, file AutoRun.inf akan berjalan mengeksekusi file AntiSys.exe nya pada komputer korban dan muatan Trojan akan menguasai komputertersebut. Cara sederhana untuk mencegah penyebaran malware Trojan yang menginjeksifile AutoRun.inf pada root directory adalah dengan melindungi root directory UFD dari upaya aktivitas penulisan, sebagai konsekuensinya beberapa sub-folder tanpa pembatasan perlu dibuat di bawah root directory sehingga UFD tersebut dapat tetap digunakanselayaknya. Access Control List (ACL) adalah fitur keamanan Sistem Operasi Microsoft Windows yang memungkinkan pengguna untuk melindungi folder dengan serangkaian konfigurasi perijinan. Mengaplikasikan aturan ACL pada UFD diimplementasikan pada penelitian ini dimana dua UFD dengan modifikasi ACL dan dengan kondisi standar dibandingkan perilakunya terhadap infeksi Trojan Shortcut. Hasil penelitian menunjukkan bahwa metode modifikasi ACL pada UFD secara efektif dapat mencegahpenyebaran malware trojan Shortcut, dimana Trojan Shortcut tidak lagi memilikikemampuan untuk menginfeksi UFD dengan ACL yang telah dikontrol pengkasessannya


Alt. Description

This research is conducted to find a solution to prevent the spreading the Shortcut Trojanmalware using the Access Control List modification method which is applied on USBFlash Disk (UFD) external storage. Shortcut Trojan infects UFD by injecting AutoRun.inf and AntiSys.exe files in the root directory of UFD which is connected to infected computers. Once the infected UFD is connected to another unprotected host, the AutoRun.inf file in UFD will be run automatically executed its AntiSys.exe file in the victim host and the Trojan�s payload will compromise the host. The simply method toprevent Trojan malware which is inject AutoRun.inf file to UFD root directory is to protect the UFD root directory against the writing activities, as a consequence some subfolder should be created under the root directory with no restriction so that the UFD stillcan be use properly. Access Control List (ACL) is a security policy feature provide by Microsoft Windows Operating System which is allow users to protect folder using aseries of permission configuration. Applying ACL policy on UFD is implemented in thisresearch where two UFD with ACL modification and with factory standard is compared its behavior against Shortcut Trojan infection.The result of this research shown that the Access Control List modification method on UFD effectively performed its functions inorder to prevent the spreading of Shortcut Trojan where the Shortcut Trojan has lost itsability to infect the UFD which was modified on its ACL

Date Create:19/11/2014
Type:Text
Format:pdf
Language:Indonesian
Identifier:UEU-Journal-JK100914_BUD
Collection ID:JK100914_BUD


Source :
Jurnal Ilmu Komputer Volume 10 Nomor 2 September 2014

Relation Collection:
Puspen Jurnal UEU

Coverage :
Civitas Akademika Universitas Esa Unggul

Rights :
copyright@2014 Puspen Jurnal UEU


Publication URL :
https://digilib.esaunggul.ac.id/analisis-modifikasi-konfigurasi-access-control-list-pada-usb-flash-disk--studi-kasus-pada-penyebaran-malware-trojan-shortcut-3654.html




[ Free Download - Free for All ]

  1.  UEU-Journal-3654-nugroho-budhisantosa.pdf - 507 KB

[ FullText Content - Please, register first ]

...No Files...

 10 Similar Document...

     No similar subject found !

 10 Related Document...

     No related subject found !




HELP US !
You can help us to define the exact keyword for this document by clicking the link below :

access , access control list , control , directory , list , mencegah , mencegah penyebaran , penyebaran , root , root directory



POLLING

Bagaimana pendapat Anda tentang repository kami ?

Bagus Sekali
Baik
Biasa
Jelek
Mengecewakan




182616755


Visitors Today : 1
Total Visitor : 1970538

Hits Today : 35827
Total Hits : 182616755

Visitors Online: 1


Calculated since
16 May 2012

You are connected from 172.17.121.29
using Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; [email protected])


UEU Digital Repository Feeds


Copyright © UEU Library 2012 - 2025 - All rights reserved.
Dublin Core Metadata Initiative and OpenArchives Compatible
Developed by Hassan