jurnal.fikom.umi.ac.id
Open in
urlscan Pro
103.133.36.110
Public Scan
Submitted URL: http://jurnal.fikom.umi.ac.id/index.php/ilkom/article/view/596/0.999114309914833
Effective URL: https://jurnal.fikom.umi.ac.id/index.php/ilkom/article/view/596/0.999114309914833
Submission: On May 08 via api from US — Scanned from DE
Effective URL: https://jurnal.fikom.umi.ac.id/index.php/ilkom/article/view/596/0.999114309914833
Submission: On May 08 via api from US — Scanned from DE
Form analysis
1 forms found in the DOMPOST https://jurnal.fikom.umi.ac.id/index.php/ILKOM/login/signIn
<form method="post" action="https://jurnal.fikom.umi.ac.id/index.php/ILKOM/login/signIn">
<table>
<tbody>
<tr>
<td><label for="sidebar-username">Username</label></td>
<td><input type="text" id="sidebar-username" name="username" value="" size="12" maxlength="32" class="textField"></td>
</tr>
<tr>
<td><label for="sidebar-password">Password</label></td>
<td><input type="password" id="sidebar-password" name="password" value="" size="12" class="textField"></td>
</tr>
<tr>
<td colspan="2"><input type="checkbox" id="remember" name="remember" value="1"> <label for="remember">Remember me</label></td>
</tr>
<tr>
<td colspan="2"><input type="submit" value="Login" class="button"></td>
</tr>
</tbody>
</table>
</form>
Text Content
User Username Password Remember me Article Tools Print this article Indexing metadata How to cite item Email this article (Login required) Email the author (Login required) QUICK MENU * Editorial Team * Reviewer * Review Process * Focus and Scope * Publication Ethics * Acceptance Rate * Author Guidelines * Open Access Policy * Screening for Plagiarism * Online Submission * Author Declaration Form * Journal Workflow * Author Fee * Contact TOOLS -------------------------------------------------------------------------------- TUTORIAL MENDELEY -------------------------------------------------------------------------------- CURRENT MEMBER SPONSORSHIP ISSN NUMBER TEMPLATE History Template * Template 2016 * Template 2017-2019 * Template 2020 * Template 2021 - now DOWNLOAD AWARD VISITOR -------------------------------------------------------------------------------- &amp;amp;amp;amp;amp;lt;a href="/" target="_blank"&amp;amp;amp;amp;amp;gt;&amp;amp;amp;amp;amp;lt;img src="//sstatic1.histats.com/0.gif?4229408&amp;amp;amp;amp;amp;amp;101" alt="free hit counter" border="0"&amp;amp;amp;amp;amp;gt;&amp;amp;amp;amp;amp;lt;/a&amp;amp;amp;amp;amp;gt; -------------------------------------------------------------------------------- &amp;amp;amp;amp;amp;amp;amp;amp;lt;div class="statcounter"&amp;amp;amp;amp;amp;amp;amp;amp;gt;&amp;amp;amp;amp;amp;amp;amp;amp;lt;a title="Web Analytics Made Easy - StatCounter" href="https://statcounter.com/" target="_blank"&amp;amp;amp;amp;amp;amp;amp;amp;gt;&amp;amp;amp;amp;amp;amp;amp;amp;lt;img class="statcounter" src="https://c.statcounter.com/11388474/0/7a71b81a/0/" alt="Web Analytics Made Easy - StatCounter"&amp;amp;amp;amp;amp;amp;amp;amp;gt;&amp;amp;amp;amp;amp;amp;amp;amp;lt;/a&amp;amp;amp;amp;amp;amp;amp;amp;gt;&amp;amp;amp;amp;amp;amp;amp;amp;lt;/div&amp;amp;amp;amp;amp;amp;amp;amp;gt; View Visitor -------------------------------------------------------------------------------- Keywords Android Arduino Uno Augmented Reality Classification Clustering Covid-19 Data Mining Decision Support System Deep Learning GLCM Information System K-Means K-NN K-Nearest Neighbor KNN Machine Learning Naive Bayes Naïve Bayes Random Forest Sentiment Analysis Support Vector Machine Current Issue * Home * About * Login * Register * Search * Current * Archives * Announcements * PUBLICATION FEES Home > Vol 12, No 2 (2020) > Sopaheluwakan ANTI-WEBSHELL PHP BACKDOOR SCANNER PADA LINUX SERVER Christian Ronaldo Sopaheluwakan(1*); Dian Widiyanto Chandra(2); (1) Universitas Kristen Satya Wacana (2) Universitas Kristen Satya Wacana (*) Corresponding Author ABSTRACT Backdoor or commonly also known as web shell is one of the malicious software that hackers use to maintain access systems that they have entered. Relatively few programs like Anti Web-Shell, PHP Backdoor Scanner circulating on the Internet, and can be obtained free of charge to deal with the issues above. But most of these programs have no actual database of signature behavior to deal with PHP backdoor / Shell nowadays. Then comes the contemporary Anti Web-Shell program that can deal with today's backdoor shell. This study uses an experimental method concerning previous similar studies and is implemented directly into the world of cyber security professional industries. By enriching the Regex dictionary signature and String Array Matching the actualized Anti Web-Shell program can detect more backdoor than similar programs that have existed in the past. The results of this study are in the form of a web application software in PHP extension. The application can minimize 100% of false positives and is twice as fast in scanning files because it is more specific in heuristic analysis scan. KEYWORDS Anti Web Shell; Backdoor Scanner; Backdoor Shell; Network Security; Linux Server FULL TEXT: PDF ARTICLE METRICS Abstract view: 3955 times PDF view: 852 times DIGITAL OBJECT IDENTIFIER https://doi.org/10.33096/ilkom.v12i2.596.143-153 CITE How to cite item REFERENCES T. S. Hartono, “Amankan Website Anda Dari ‘Defacement,’” 2011. https://tekno.kompas.com/read/2011/12/02/16352968/Amankan.Website.Anda.dari.Defacement?page=all#page2 (accessed Apr. 13, 2019). U. Ite and H. Pidana, “Kejahatan Defecting :,” vol. 3, pp. 143–159, 2015. C. Camilo, U. López, M. G. Peña, J. Luis, O. Quintero, and A. Estado, “Antidefacement - State of art,” vol. 14, pp. 9–27, 2016, doi: 10.18046/syt.v14i39.2341. B. Ghozali, M. Teknik, I. Universitas, and A. Yogyakarta, “Mendeteksi Kerentanan Keamanan Aplikasi Website Menggunakan Metode Owasp ( Open Web Application Security Project ) untuk Penilaian Risk Rating,” pp. 264–275. J. Javier, B. Andrade, and D. Gan, “A Forensics Investigation into Attacks on Linux Servers.” S. Kumar and D. Agarwal, “Hacking Attacks , Methods , Techniques And Their Protection Measures,” vol. 4, no. 4, 2018. P. H. P. W. Shell and G. Supriyatno, “Searching for Forensic Evidence in a Compromised Virtual Web Server against SQL Injection Attacks,” vol. 12, no. 12, pp. 1057–1063, 2018. T. A. Cahyanto, V. Wahanggara, and D. Ramadana, “Analisis dan Deteksi Malware Menggunakan Metode Malware Analisis Dinamis dan Malware Analisis Statis,” pp. 19–30. N. I. Widiastuti and M. Iqbal, “Basic Static Code Analysis Untuk Mendeteksi Backdoor Shell Pada Web Server,” J. INFOTEL, vol. 9, no. 2, p. 177, 2017, doi: 10.20895/infotel.v9i2.209. T. Wijayanto, A. Susilo, T. Wijayanto, and A. Susilo, “Implementasi Backdoor Scanner Tool Menggunakan Metode Carving File Pada Server Codepolitan,” pp. 141–148, 2017. O. W. Purbo, Keamanan Jaringan. Jakarta, 2011. M. Universitas, B. Darma, D. Universitas, B. Darma, J. A. Yani, and N. Plaju, “Analisis Pendeteksian dan Pencegahan Serangan Backdoor Pada Layanan,” no. 12, pp. 1–10. Ali Mahmudi, “Sistem keamanan jaringan mendeteksi backdooruntuk menemukan celah dan exploitspada web server menggunakan teknik IDS (Intrusion Detection System),” Simki-Techsin, vol. 01, no. 04, pp. 1–10, 2017, [Online]. Available: http://simki.unpkediri.ac.id/detail/13.1.03.02.0003. H. Alnabulsi, “Textual Manipulation for SQL Injection Attacks,” pp. 26–33, 2014, doi: 10.5815/ijcnis.2014.01.04. J. Komputasi, “Pembangunan Sistem Operasi Berbasis Linux Menggunakan Metode Linux From Scratch,” vol. 1, no. 2, pp. 30–37, 2014. T. M. Aji, D. E. Riyanto, and H. A. Wibawa, “Penerapan web services dan regular expression untuk verifikasi alamat berbasis hasil penelusuran,” vol. 1, no. 1, pp. 38–51, 2012. REFBACKS * There are currently no refbacks. Copyright (c) 2020 Christian Ronaldo Sopaheluwakan, Dian Widiyanto Chandra This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. ILKOM Jurnal Ilmiah indexed by ___________________________________________________________ ILKOM Jurnal Ilmiah ISSN 2548-7779 Published by Prodi Teknik Informatika FIK Universitas Muslim Indonesia W : https://fikom.umi.ac.id/ E : jurnal.ilkom@umi.ac.id This work is licensed under a Creative Commons Attribution-ShareAlike 4.0