TelegramBot: Crawling Data Serangan Malware dengan Telegram

Faulinda Ely Nastiti, Dedy Hariyadi, Fazlurrahman Bima

Abstract


Ancaman serangan siber masih didominasi oleh malware. Beberapa penyedia telah menyediakan peta dan analisis serangan malware berbasis agen yang telah ditempatkan pada beberapa infrastruktur. Namun, ada pihak lain yang menyediakan data serangan Malware yang dapat diakses oleh publik,  disebut Sumber OSINT. Penelitian ini bertujuan untuk membangun sebuah perangkat lunak berbasis mobile yang dapat dimanfaatkan untuk melakukan Crawling data Malware tanpa harus melakukan pencarian manual melalui web side. Peneliti memanfaatkan teknologi TelegramBot dan OIST Source untuk melacak data serangan Malware di Indonesia.  Tidak hanya di Indonesia,  seluruh negara di dunia telah menyadari pentingnya malakukan pengumpulana Data serangan Malware agar tidak membahayakan data pemerintah.  Basis data serangan malware dapat digunakan untuk memprediksi  dan memproteksi data penting agar terhindar dari cybercrime bahkan cyberterrorism.

Keywords


OSINT, Malware, Cyber Threats, Crawling, Telegram, Security, Intelligence

Full Text:

PDF

References


S. Lee and T. Shon, “Open Source Intelligence Base Cyber Threat Inspection Framework for Critical Infrastructures,” FTC 2016 - Proc. Futur. Technol. Conf., no. December, pp. 1030–1033, 2017.

Indonesia Honeynet Project, “Indonesia Honeynet Project Conference.” [Online]. Available: http://ihpcon.id/. [Accessed: 18-Aug-2018].

F. A. Saputra, I. Winarno, and M. B. Muliawan, “Implementing Network Situational Awareness in Matagaruda,” in 2015 International Electronics Symposium (IES), 2015, pp. 268–273.

A. H. Muhammad, “Metode Klasifikasi dan Analisis Karakteristik Malware Menggunakan Konsep Ontologi,” Universitas Islam Indonesia, 2017.

Paolo Passeri, “January – September 2018 Cyber Attack Statistics,” 2018. [Online]. Available: https://www.hackmageddon.com/2018/10/15/january-september-2018-cyber-attack-statistics/. [Accessed: 17-Oct-2018].

S. M. Kim and Y. G. Ha, “Automated Discovery of Small Business Domain Knowledge using Web Crawling and Data Mining,” 2016 Int. Conf. Big Data Smart Comput. BigComp 2016, pp. 481–484, 2016.

World Wide Web Consortium, “RDF - Semantic Web Standards.” [Online]. Available: https://www.w3.org/RDF/. [Accessed: 27-Oct-2018].

World Wide Web Consortium, “OWL - Semantic Web Standards.” [Online]. Available: https://www.w3.org/OWL/. [Accessed: 27-Oct-2018].

U.S.A. Department of the Army, “Open-Source Intelligence ATP 2-22.9,” vol. 2–22.9, no. July, p. 91, 2012.

Telegram, “Bots: An introduction for developers.” [Online]. Available: https://core.telegram.org/bots. [Accessed: 30-Oct-2018].

Y. Shafranovich, “Common Format and MIME Type for Comma-Separated Values (CSV) Files,” Oct. 2005.

World Wide Web Consostium, “Standards - W3C.” [Online]. Available: https://www.w3.org/standards/. [Accessed: 18-Oct-2018].




DOI: https://doi.org/10.24114/cess.v4i1.11436

Article Metrics

Abstract view : 1112 times
PDF - 1032 times

Refbacks



Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

CESS (Journal of Computer Engineering, System and Science)

Creative Commons License
CESS (Journal of Computer Engineering, System and Science) is licensed under a Creative Commons Attribution 4.0 International License