DEEP PACKET INSPECTION IMPLEMENTATION ON IPTABLES AS WANNACRY INFECTION PREVENTION

After 18 months after first infection, Kryptos Logic reports on December 2018, there at least 500.000 host infected WannaCry. Alcatel-Lucent survey found host-based antivirus is not effective to protect host from malware. 81% host with host-based antivirus installed is infected by malware. Furthe...

Full description

Saved in:
Bibliographic Details
Main Author: Kholilul Islam, Ibrohim
Format: Final Project
Language:Indonesia
Online Access:https://digilib.itb.ac.id/gdl/view/37047
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Institut Teknologi Bandung
Language: Indonesia
id id-itb.:37047
spelling id-itb.:370472019-03-18T14:07:19ZDEEP PACKET INSPECTION IMPLEMENTATION ON IPTABLES AS WANNACRY INFECTION PREVENTION Kholilul Islam, Ibrohim Indonesia Final Project network-based malware detection, firewall, wannacry i INSTITUT TEKNOLOGI BANDUNG https://digilib.itb.ac.id/gdl/view/37047 After 18 months after first infection, Kryptos Logic reports on December 2018, there at least 500.000 host infected WannaCry. Alcatel-Lucent survey found host-based antivirus is not effective to protect host from malware. 81% host with host-based antivirus installed is infected by malware. Furthermore, with increasing Internet user, there is more host to spread malware over Internet. Currently, open-source firewall cannot detect malware attack. Firewall in this added with module to detect malware infection over network. IN this project focused on WannaCry. Module implementation use dynamic signature-based approach to detect malware infection. This approach choosen because theoritically have lowwer false-negative. Futhermore, implementation use state machine to represent WannaCry infection behavior. Validation experiment for this implementation is using transparent-firewall in a subnet. The result is DPI implementation as firewall module can drop infection based on 83 trials. But, current implementation cause drop 4% of bandwidth and increasing 8202% of packet retry. text
institution Institut Teknologi Bandung
building Institut Teknologi Bandung Library
continent Asia
country Indonesia
Indonesia
content_provider Institut Teknologi Bandung
collection Digital ITB
language Indonesia
description After 18 months after first infection, Kryptos Logic reports on December 2018, there at least 500.000 host infected WannaCry. Alcatel-Lucent survey found host-based antivirus is not effective to protect host from malware. 81% host with host-based antivirus installed is infected by malware. Furthermore, with increasing Internet user, there is more host to spread malware over Internet. Currently, open-source firewall cannot detect malware attack. Firewall in this added with module to detect malware infection over network. IN this project focused on WannaCry. Module implementation use dynamic signature-based approach to detect malware infection. This approach choosen because theoritically have lowwer false-negative. Futhermore, implementation use state machine to represent WannaCry infection behavior. Validation experiment for this implementation is using transparent-firewall in a subnet. The result is DPI implementation as firewall module can drop infection based on 83 trials. But, current implementation cause drop 4% of bandwidth and increasing 8202% of packet retry.
format Final Project
author Kholilul Islam, Ibrohim
spellingShingle Kholilul Islam, Ibrohim
DEEP PACKET INSPECTION IMPLEMENTATION ON IPTABLES AS WANNACRY INFECTION PREVENTION
author_facet Kholilul Islam, Ibrohim
author_sort Kholilul Islam, Ibrohim
title DEEP PACKET INSPECTION IMPLEMENTATION ON IPTABLES AS WANNACRY INFECTION PREVENTION
title_short DEEP PACKET INSPECTION IMPLEMENTATION ON IPTABLES AS WANNACRY INFECTION PREVENTION
title_full DEEP PACKET INSPECTION IMPLEMENTATION ON IPTABLES AS WANNACRY INFECTION PREVENTION
title_fullStr DEEP PACKET INSPECTION IMPLEMENTATION ON IPTABLES AS WANNACRY INFECTION PREVENTION
title_full_unstemmed DEEP PACKET INSPECTION IMPLEMENTATION ON IPTABLES AS WANNACRY INFECTION PREVENTION
title_sort deep packet inspection implementation on iptables as wannacry infection prevention
url https://digilib.itb.ac.id/gdl/view/37047
_version_ 1822924802316304384