ANALISIS SERANGAN MALWARE DALAM PERBANKAN DAN PERENCANAAN SOLUSI KEAMANAN
DOI:
https://doi.org/10.23960/jitet.v11i3.3312Abstract Views: 1127 File Views: 2112
Abstract
Penelitian ini mengeksplorasi ancaman serangan malware perbankan yang terus meningkat dan solusi keamanan yang dapat diterapkan untuk mengurangi risikonya. Makalah ini dimulai dengan memberikan gambaran umum tentang berbagai serangan malware perbankan, termasuk metode penyebaran dan kerusakan yang dapat ditimbulkannya. Kemudian membahas berbagai langkah keamanan yang dapat diambil untuk mencegah dan mendeteksi serangan ini, seperti perlindungan titik akhir, segmentasi jaringan, dan edukasi pengguna. Makalah ini juga membahas tantangan dan keterbatasan dari solusi keamanan ini dan potensi perkembangan di masa depan di lapangan. Secara keseluruhan, makalah ini memberikan analisis komprehensif tentang serangan malware perbankan saat ini dan solusi keamanan yang dapat digunakan untuk melindungi dari serangan tersebut. Penelitian ini bertujuan untuk menganalisis secara komprehensif berbagai jenis serangan malware perbankan dan solusi keamanan yang dapat mengurangi risikonya. Dengan memahami sifat dari serangan-serangan ini dan efektivitas dari berbagai langkah keamanan, penelitian ini dapat membantu lembaga keuangan mengembangkan strategi yang lebih efektif untuk melindungi diri mereka sendiri dan pelanggan mereka dari ancaman siber.
Downloads
References
M. Carminati, M. Polino, A. Continella, A. Lanzi, F. Maggi, and S. Zanero, “Security Evaluation of a Banking Fraud Analysis System,” ACM Transactions on Privacy and Security (TOPS), vol. 21, pp. 1–31, 2018.
G. Lakshmi, S. E. Ovia, and A. D. Sre, “THE IMPACT OF CYBER CRIME AND SECURITY IN ONLINE BANKING TRANSACTION,” INTERNATIONAL JOURNAL OF MANAGEMENT AND SOCIAL SCIENCES, vol. 8, pp. 28–31, 2018.
K.-P. Grammatikakis, I. Koufos, N. Kolokotronis, C. Vassilakis, and S. Shiaeles, “Understanding and Mitigating Banking Trojans: From Zeus to Emotet,” CoRR, vol. abs/2109.01610, 2021, [Online]. Available: https://arxiv.org/abs/2109.01610
W. Hu and Y. Tan, “Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN,” CoRR, vol. abs/1702.05983, 2017, [Online]. Available: http://arxiv.org/abs/1702.05983
X. Qi, Y. Tang, H. Wang, T. Liu, and J. Jing, “Adversarial Example Attacks Against Intelligent Malware Detection: A Survey,” 2022 4th International Conference on Applied Machine Learning (ICAML), pp. 1–7, 2022.
T. Proffitt, “Indicators of compromise in memory forensics GIAC ( GCFA ) Gold Certification,” 2013.
S. Kiljan, K. Simoens, D. De Cock, M. C. J. D. van Eekelen, and H. P. E. Vranken, “A Survey of Authentication and Communications Security in Online Banking,” ACM Computing Surveys (CSUR), vol. 49, pp. 1–35, 2016.
S. Ghosh, A. Majumder, J. Goswami, A. Kumar, S. P. Mohanty, and B. K. Bhattacharyya, “Swing-Pay: One Card Meets All User Payment and Identity Needs: A Digital Card Module using NFC and Biometric Authentication for Peer-to-Peer Payment,” IEEE Consumer Electronics Magazine, vol. 6, no. 1, pp. 82–93, 2017, doi: 10.1109/MCE.2016.2614522.
T. S. Messerges, E. A. Dabbish, and R. H. Sloan, “Examining smart-card security under the threat of power analysis attacks,” IEEE Transactions on Computers, vol. 51, no. 5, pp. 541–552, 2002, doi: 10.1109/TC.2002.1004593.
I. Memon, I. Hussain, R. Akhtar, and G. Chen, “Enhanced Privacy and Authentication: An Efficient and Secure Anonymous Communication for Location Based Service Using Asymmetric Cryptography Scheme,” Wirel Pers Commun, vol. 84, no. 2, pp. 1487–1508, 2015, doi: 10.1007/s11277-015-2699-1.
H. Mun, K. Han, Y. S. Lee, C. Y. Yeun, and H. H. Choi, “Enhanced secure anonymous authentication scheme for roaming service in global mobility networks,” Math Comput Model, vol. 55, no. 1, pp. 214–222, 2012, doi: https://doi.org/10.1016/j.mcm.2011.04.036.
Q. Xie, B. Hu, X. Tan, M. Bao, and X. Yu, “Robust Anonymous Two-Factor Authentication Scheme for Roaming Service in Global Mobility Network,” Wirel Pers Commun, vol. 74, no. 2, pp. 601–614, 2014, doi: 10.1007/s11277-013-1309-3.
D. Zhao, H. Peng, L. Li, and Y. Yang, “A Secure and Effective Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks,” Wirel Pers Commun, vol. 78, no. 1, pp. 247–269, 2014, doi: 10.1007/s11277-014-1750-y.
D. He and D. Wang, “Robust Biometrics-Based Authentication Scheme for Multiserver Environment,” IEEE Syst J, vol. 9, no. 3, pp. 816–823, 2015, doi: 10.1109/JSYST.2014.2301517.
H. Lin, F. Wen, and C. Du, “An Improved Anonymous Multi-Server Authenticated Key Agreement Scheme Using Smart Cards and Biometrics,” Wirel Pers Commun, vol. 84, no. 4, pp. 2351–2362, 2015, doi: 10.1007/s11277-015-2708-4.
L. A. N. D. Y. X. A. N. D. Y. Y. Lu Yanrong AND Li, “Robust Biometrics Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards,” PLoS One, vol. 10, no. 5, pp. 1–13, Jul. 2015, doi: 10.1371/journal.pone.0126323.
X. A. N. D. Z. Z. Wang Chengqi AND Zhang, “Cryptanalysis and Improvement of a Biometric-Based Multi-Server Authentication and Key Agreement Scheme,” PLoS One, vol. 11, no. 2, pp. 1–25, Jul. 2016, doi: 10.1371/journal.pone.0149173.