ABSTRACT :
Tremendous amount of Malware attacking our daily activity needs brilliant and ideal techniques to identify and prevent them. Imagine a huge amount of big data containing Malware in it? The question is how to identify their presence and how to prevent them from attacking? Therefore, this project is to diagnose and identify the presence of malware in big data by using the correct tool and technique. Here, I'll be using the social media, Twitter to retrieve data. Big Data is something general, huge and large. The Big Data in Twitter consist of audio, video, textual data, URL, websites, etc. In my case, I'll be retrieving URL as the big data from the Twitter account. Converting the URL to obtain its IP Address is then done. This IP Address is important for SHODAN malware detection. Next is the most interesting part using the tool, SHODAN. SHODAN with Malware Hunter feature will identify Malware from the gained data. How? In order to do this, the IP Address of the URL play the rules. The feature of Malware Hunter in SHODAN will then process this IP Address based on the signature in the SODAN. This result is finalized after SHODAN process and compare the IP Address and the signature from the class alert .
INTRODUCTION:
This is a knowledge engineering studies which requires so much readings and researches. Malware is any piece of software that was written with the intent of doing harm to data or devices. Meanwhile Big Data refers to large-scale information management and analysis technologies that exceed the capability of traditional data processing technologies. This knowledge engineering project is entitled Identifying Malware by Leveraging Information from Big Data. First is to retrieve data from Big Data (Twitter) in the form of audio, video, URL, textual data etc. Then is to use Malware Hunter in SHODAN for Malware detection from the Big Data. Last is to identify the presence of malware from the signature in SHODAN's class alert. The feature of MALWARE HUNTER in SHODAN will identify if it is a malicious node or not.
This is a knowledge engineering studies which requires so much readings and researches. Malware is any piece of software that was written with the intent of doing harm to data or devices. Meanwhile Big Data refers to large-scale information management and analysis technologies that exceed the capability of traditional data processing technologies. This knowledge engineering project is entitled Identifying Malware by Leveraging Information from Big Data. First is to retrieve data from Big Data (Twitter) in the form of audio, video, URL, textual data etc. Then is to use Malware Hunter in SHODAN for Malware detection from the Big Data. Last is to identify the presence of malware from the signature in SHODAN's class alert. The feature of MALWARE HUNTER in SHODAN will identify if it is a malicious node or not.
OBJECTIVES :
|
The "LIVE" Story Telling ...
1) What is SHODAN?
2) What are the types of Big Data in the Twitter?
3) Malware is hunt/detected via the IP Address. How?
2) What are the types of Big Data in the Twitter?
3) Malware is hunt/detected via the IP Address. How?
Converting the URL from Twitter to obtain IP Address
The IP Address gained from the URL retrieved from Twitter
Result of Malware that is hunting the URL from Twitter. These are detected based on the IP Address of the URL.