jurnal.fikom.umi.ac.id Open in urlscan Pro
103.133.36.110  Public Scan

Submitted URL: http://jurnal.fikom.umi.ac.id/index.php/ilkom/article/view/596/0.999114309914833
Effective URL: https://jurnal.fikom.umi.ac.id/index.php/ilkom/article/view/596/0.999114309914833
Submission: On May 08 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

POST https://jurnal.fikom.umi.ac.id/index.php/ILKOM/login/signIn

<form method="post" action="https://jurnal.fikom.umi.ac.id/index.php/ILKOM/login/signIn">
  <table>
    <tbody>
      <tr>
        <td><label for="sidebar-username">Username</label></td>
        <td><input type="text" id="sidebar-username" name="username" value="" size="12" maxlength="32" class="textField"></td>
      </tr>
      <tr>
        <td><label for="sidebar-password">Password</label></td>
        <td><input type="password" id="sidebar-password" name="password" value="" size="12" class="textField"></td>
      </tr>
      <tr>
        <td colspan="2"><input type="checkbox" id="remember" name="remember" value="1"> <label for="remember">Remember me</label></td>
      </tr>
      <tr>
        <td colspan="2"><input type="submit" value="Login" class="button"></td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

User

Username Password Remember me

Article Tools
Print this article
Indexing metadata

How to cite item

Email this article (Login required)
Email the author (Login required)

QUICK MENU

   
 * Editorial Team 
 * Reviewer
 * Review Process
 * Focus and Scope
 * Publication Ethics
 * Acceptance Rate
 * Author Guidelines
 * Open Access Policy
 * Screening for Plagiarism
 * Online Submission
 * Author Declaration Form
 * Journal Workflow
 * Author Fee
 * Contact

 

TOOLS







--------------------------------------------------------------------------------

TUTORIAL MENDELEY

--------------------------------------------------------------------------------

CURRENT MEMBER



 

SPONSORSHIP



ISSN NUMBER



TEMPLATE



History Template

 * Template 2016
 * Template 2017-2019
 * Template 2020
 * Template 2021 - now 

DOWNLOAD AWARD



VISITOR

--------------------------------------------------------------------------------

 

&amp;amp;amp;amp;amp;amp;lt;a href="/"
target="_blank"&amp;amp;amp;amp;amp;amp;gt;&amp;amp;amp;amp;amp;amp;lt;img
src="//sstatic1.histats.com/0.gif?4229408&amp;amp;amp;amp;amp;amp;amp;101"
alt="free hit counter"
border="0"&amp;amp;amp;amp;amp;amp;gt;&amp;amp;amp;amp;amp;amp;lt;/a&amp;amp;amp;amp;amp;amp;gt;

--------------------------------------------------------------------------------

&amp;amp;amp;amp;amp;amp;amp;amp;amp;lt;div
class="statcounter"&amp;amp;amp;amp;amp;amp;amp;amp;amp;gt;&amp;amp;amp;amp;amp;amp;amp;amp;amp;lt;a
title="Web Analytics Made Easy - StatCounter" href="https://statcounter.com/"
target="_blank"&amp;amp;amp;amp;amp;amp;amp;amp;amp;gt;&amp;amp;amp;amp;amp;amp;amp;amp;amp;lt;img
class="statcounter" src="https://c.statcounter.com/11388474/0/7a71b81a/0/"
alt="Web Analytics Made Easy -
StatCounter"&amp;amp;amp;amp;amp;amp;amp;amp;amp;gt;&amp;amp;amp;amp;amp;amp;amp;amp;amp;lt;/a&amp;amp;amp;amp;amp;amp;amp;amp;amp;gt;&amp;amp;amp;amp;amp;amp;amp;amp;amp;lt;/div&amp;amp;amp;amp;amp;amp;amp;amp;amp;gt;

View Visitor

--------------------------------------------------------------------------------

 

Keywords Android Arduino Uno Augmented Reality Classification Clustering
Covid-19 Data Mining Decision Support System Deep Learning GLCM Information
System K-Means K-NN K-Nearest Neighbor KNN Machine Learning Naive Bayes Naïve
Bayes Random Forest Sentiment Analysis Support Vector Machine
Current Issue


 * Home
 * About
 * Login
 * Register
 * Search
 * Current
 * Archives
 * Announcements
 * PUBLICATION FEES

Home > Vol 12, No 2 (2020) > Sopaheluwakan


ANTI-WEBSHELL PHP BACKDOOR SCANNER PADA LINUX SERVER


Christian Ronaldo Sopaheluwakan(1*); Dian Widiyanto Chandra(2);

(1) Universitas Kristen Satya Wacana
(2) Universitas Kristen Satya Wacana
(*) Corresponding Author



  

ABSTRACT


Backdoor or commonly also known as web shell is one of the malicious software
that hackers use to maintain access systems that they have entered. Relatively
few programs like Anti Web-Shell, PHP Backdoor Scanner circulating on the
Internet, and can be obtained free of charge to deal with the issues above. But
most of these programs have no actual database of signature behavior to deal
with PHP backdoor / Shell nowadays. Then comes the contemporary Anti Web-Shell
program that can deal with today's backdoor shell. This study uses an
experimental method concerning previous similar studies and is implemented
directly into the world of cyber security professional industries. By enriching
the Regex dictionary signature and String Array Matching the actualized Anti
Web-Shell program can detect more backdoor than similar programs that have
existed in the past. The results of this study are in the form of a web
application software in PHP extension. The application can minimize 100% of
false positives and is twice as fast in scanning files because it is more
specific in heuristic analysis scan.


KEYWORDS


Anti Web Shell; Backdoor Scanner; Backdoor Shell; Network Security; Linux Server

  

  

FULL TEXT:

PDF
  


ARTICLE METRICS

Abstract view: 3955 times
PDF view: 852 times      

DIGITAL OBJECT IDENTIFIER

  https://doi.org/10.33096/ilkom.v12i2.596.143-153   

CITE

How to cite item


REFERENCES


T. S. Hartono, “Amankan Website Anda Dari ‘Defacement,’” 2011.
https://tekno.kompas.com/read/2011/12/02/16352968/Amankan.Website.Anda.dari.Defacement?page=all#page2
(accessed Apr. 13, 2019).

U. Ite and H. Pidana, “Kejahatan Defecting :,” vol. 3, pp. 143–159, 2015.

C. Camilo, U. López, M. G. Peña, J. Luis, O. Quintero, and A. Estado,
“Antidefacement - State of art,” vol. 14, pp. 9–27, 2016, doi:
10.18046/syt.v14i39.2341.

B. Ghozali, M. Teknik, I. Universitas, and A. Yogyakarta, “Mendeteksi Kerentanan
Keamanan Aplikasi Website Menggunakan Metode Owasp ( Open Web Application
Security Project ) untuk Penilaian Risk Rating,” pp. 264–275.

J. Javier, B. Andrade, and D. Gan, “A Forensics Investigation into Attacks on
Linux Servers.”

S. Kumar and D. Agarwal, “Hacking Attacks , Methods , Techniques And Their
Protection Measures,” vol. 4, no. 4, 2018.

P. H. P. W. Shell and G. Supriyatno, “Searching for Forensic Evidence in a
Compromised Virtual Web Server against SQL Injection Attacks,” vol. 12, no. 12,
pp. 1057–1063, 2018.

T. A. Cahyanto, V. Wahanggara, and D. Ramadana, “Analisis dan Deteksi Malware
Menggunakan Metode Malware Analisis Dinamis dan Malware Analisis Statis,” pp.
19–30.

N. I. Widiastuti and M. Iqbal, “Basic Static Code Analysis Untuk Mendeteksi
Backdoor Shell Pada Web Server,” J. INFOTEL, vol. 9, no. 2, p. 177, 2017, doi:
10.20895/infotel.v9i2.209.

T. Wijayanto, A. Susilo, T. Wijayanto, and A. Susilo, “Implementasi Backdoor
Scanner Tool Menggunakan Metode Carving File Pada Server Codepolitan,” pp.
141–148, 2017.

O. W. Purbo, Keamanan Jaringan. Jakarta, 2011.

M. Universitas, B. Darma, D. Universitas, B. Darma, J. A. Yani, and N. Plaju,
“Analisis Pendeteksian dan Pencegahan Serangan Backdoor Pada Layanan,” no. 12,
pp. 1–10.

Ali Mahmudi, “Sistem keamanan jaringan mendeteksi backdooruntuk menemukan celah
dan exploitspada web server menggunakan teknik IDS (Intrusion Detection
System),” Simki-Techsin, vol. 01, no. 04, pp. 1–10, 2017, [Online]. Available:
http://simki.unpkediri.ac.id/detail/13.1.03.02.0003.

H. Alnabulsi, “Textual Manipulation for SQL Injection Attacks,” pp. 26–33, 2014,
doi: 10.5815/ijcnis.2014.01.04.

J. Komputasi, “Pembangunan Sistem Operasi Berbasis Linux Menggunakan Metode
Linux From Scratch,” vol. 1, no. 2, pp. 30–37, 2014.

T. M. Aji, D. E. Riyanto, and H. A. Wibawa, “Penerapan web services dan regular
expression untuk verifikasi alamat berbasis hasil penelusuran,” vol. 1, no. 1,
pp. 38–51, 2012.





REFBACKS

 * There are currently no refbacks.



Copyright (c) 2020 Christian Ronaldo Sopaheluwakan, Dian Widiyanto Chandra


This work is licensed under a Creative Commons Attribution-ShareAlike 4.0
International License.



ILKOM Jurnal Ilmiah indexed by

___________________________________________________________
ILKOM Jurnal Ilmiah
ISSN 2548-7779
Published by Prodi Teknik Informatika FIK Universitas Muslim Indonesia
W : https://fikom.umi.ac.id/
E : jurnal.ilkom@umi.ac.id

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0