Research Article
BibTex RIS Cite

Detection, Technical Analysis and Recommended Solutions of Trojan Horse Malware

Year 2019, , 28 - 33, 28.06.2019
https://doi.org/10.33721/by.542743

Abstract

As the use of technological devices increases,
malicious people develop and spread new types of malicious software every day
in order to harm these devices and their users. Although security measures are
taken against these widespread threats affecting individuals and institutions,
the vulnerabilities continue to exist. Many of the cyberattackers uses malware
to attack by exploiting existing security vulnerabilities. Trojans are
extremely dangerous kind of malicious software that infiltrates the victim
system by hiding themselves inside a seemingly harmless file extension. The
Remote Access Trojan Horse, however, provides remote access to the attacker
after infecting the victim system. In this way, the attacker can access the
files and passwords in the system, and convert the victim system into a slave
system that can perform regular, coordinated attacks. In this study, it is
aimed to define Remote Access Trojans, to explain their methods of infiltration
into the victim system and the measures that can be taken against this threat
and to raise user awareness.


References

  • Adachi, D., ve Omote, K. (2016). A host-based detection method of remote access trojan in the early stage. In International Conference on Information Security Practice and Experience (s. 110-121). Springer, Cham.
  • Barabosch, T., Bergmann, N., Dombeck, A., ve Padilla, E. (2017). Quincy: Detecting host-based code injection attacks in memory dumps. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (s. 209-229). Springer, Cham.
  • Chen, Z., Wei, P. ve Delis, A. (2008). Catching remote administration trojans (RATs). Software: Practice and Experience, 38(7), 667-703.
  • Emm, D., Garnaeva, M., Ivanov, A., Makrushin, D. ve Unuchek, R. (2015). IT threat evolution in Q2 2015. Moscow, 125212, Russian Federation: Kaspersky Lab HQ.
  • Jain, N., Stiller, B., Khan, I., Makarov, V., Marquardt, C. ve Leuchs, G. (2014). Risk analysis of Trojan-horse attacks on practical quantum key distribution systems. IEEE Journal of Selected Topics in Quantum Electronics, 21(3), 168-177.
  • Jiang, D. ve Omote, K. (2015, March). An approach to detect remote access trojan in the early stage of communication. In 2015 IEEE 29th International Conference on Advanced Information Networking and Applications (pp. 706-713). IEEE.
  • Kara, İ. (2018). Teslacrypt fidye yazilim virüsünün tespiti, teknik analizi ve çözümü. Uluslararası Yönetim Bilişim Sistemleri ve Bilgisayar Bilimleri Dergisi, 2(2), 87-94.
  • Kara, İ., ve Aydos, M. (2019). The ghost in the system: Techical analysis of remote access Trojan. International Journal on Information Technologies & Security, 11(1).
  • Kaur, R., Nagpal, E. S., ve Chamotra, S. (2015, December). Malicious traffic detection in a private organizational network using honeynet system. In 2015 Annual IEEE India Conference (INDICON) (s. 1-6). IEEE.
  • Ma, H. X., Bao, W. S., Li, H. W., ve Chou, C. (2016). Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack. Chinese Physics B. 25(8), 080309.
  • Öztürk, M. S. (2018). Siber saldırılar, siber güvenlik denetimleri ve bütüncül bir denetim modeli önerisi. Muhasebe ve Vergi Uygulamaları Dergisi, 208-232.
  • Saarinen, M. J. O. (2013, November). Developing a grey hat C2 and RAT for APT security training and assessment. In GreHack 2013 Hacking Conference (Vol. 15).
  • Smith-Ditizio, A. A. ve Smith, A. D. (2019). Computer fraud challenges and ıts legal ımplications. ın advanced methodologies and technologies in system security, Information Privacy, and Forensics (s. 152-165). IGI Global.
  • Thompson, R. (2005). Why spyware poses multiple threats to security. Communications of the ACM, 48(8), 41-43.
  • Villeneuve, N. (2011). Trends in targeted attacks. Trend Micro.(October).
  • Qamar, A., Karim, A., ve Chang, V. (2019). Mobile malware attacks: Review, taxonomy & future directions. Future Generation Computer Systems.
  • Vinay, S. E., ve Kok, P. (2018). Extended analysis of the Trojan-horse attack in quantum key distribution. Physical Review A. 97(4), 042335.
  • Wang, S. J., ve Kao, D. Y. (2007). Internet forensics on the basis of evidence gathering with Peep attacks. Computer Standards & Interfaces, 29(4), 423-429.
  • Wangen, G. (2015). The role of malware in reported cyber espionage: a review of the impact and mechanism. Information, 6(2), 183-211.

Truva Atı Zararlı Yazılımlarına Yaklaşım ve Çözüm Önerileri

Year 2019, , 28 - 33, 28.06.2019
https://doi.org/10.33721/by.542743

Abstract

Teknolojik cihazların kullanımı arttıkça kötü niyetli kişiler
de bu cihazlara ve kullanıcılarına zarar vermek amacıyla her geçen gün yeni tür
zararlı yazılımlar geliştirerek piyasaya sürmektedir. Kişi ve kurumları
etkileyen geniş çaplı bu saldırılara karşı tedbirler alınmaya çalışılsa da
güvenlik zafiyetleri halen devam etmektedir. Pek çok siber saldırgan, mevcut
güvenlik zafiyetlerinden faydalanarak saldırılarını gerçekleştirmek için
zararlı yazılımları kullanmaktadır. Kendisini zararsız bir dosya uzantısı
altına gizleyerek kurban sisteme sızan Truva Atları son derece tehlikeli bir
tür zararlı yazılımdır. Uzak Erişim Truva Atı ise, kurban sisteme sızdıktan
sonra saldırgana uzak erişim imkânı sağlamaktadır. Bu sayede saldırgan kurban
sistemdeki dosyalara ve kayıtlı şifreleri ulaşabilmekte, kurban sistem üzerine
düzenli, koordineli saldırılar yapabilen köle bir sisteme dönüştürebilmektedir.
Bu çalışmada, Uzak Erişim Truva Atlarını tanımlayarak, kurban sisteme sızma
yöntemleri ve bu tehditte karşı alınabilecek önlemleri açıklayıp kullanıcı
farkındalığı yaratması amaçlanmıştır.

References

  • Adachi, D., ve Omote, K. (2016). A host-based detection method of remote access trojan in the early stage. In International Conference on Information Security Practice and Experience (s. 110-121). Springer, Cham.
  • Barabosch, T., Bergmann, N., Dombeck, A., ve Padilla, E. (2017). Quincy: Detecting host-based code injection attacks in memory dumps. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (s. 209-229). Springer, Cham.
  • Chen, Z., Wei, P. ve Delis, A. (2008). Catching remote administration trojans (RATs). Software: Practice and Experience, 38(7), 667-703.
  • Emm, D., Garnaeva, M., Ivanov, A., Makrushin, D. ve Unuchek, R. (2015). IT threat evolution in Q2 2015. Moscow, 125212, Russian Federation: Kaspersky Lab HQ.
  • Jain, N., Stiller, B., Khan, I., Makarov, V., Marquardt, C. ve Leuchs, G. (2014). Risk analysis of Trojan-horse attacks on practical quantum key distribution systems. IEEE Journal of Selected Topics in Quantum Electronics, 21(3), 168-177.
  • Jiang, D. ve Omote, K. (2015, March). An approach to detect remote access trojan in the early stage of communication. In 2015 IEEE 29th International Conference on Advanced Information Networking and Applications (pp. 706-713). IEEE.
  • Kara, İ. (2018). Teslacrypt fidye yazilim virüsünün tespiti, teknik analizi ve çözümü. Uluslararası Yönetim Bilişim Sistemleri ve Bilgisayar Bilimleri Dergisi, 2(2), 87-94.
  • Kara, İ., ve Aydos, M. (2019). The ghost in the system: Techical analysis of remote access Trojan. International Journal on Information Technologies & Security, 11(1).
  • Kaur, R., Nagpal, E. S., ve Chamotra, S. (2015, December). Malicious traffic detection in a private organizational network using honeynet system. In 2015 Annual IEEE India Conference (INDICON) (s. 1-6). IEEE.
  • Ma, H. X., Bao, W. S., Li, H. W., ve Chou, C. (2016). Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack. Chinese Physics B. 25(8), 080309.
  • Öztürk, M. S. (2018). Siber saldırılar, siber güvenlik denetimleri ve bütüncül bir denetim modeli önerisi. Muhasebe ve Vergi Uygulamaları Dergisi, 208-232.
  • Saarinen, M. J. O. (2013, November). Developing a grey hat C2 and RAT for APT security training and assessment. In GreHack 2013 Hacking Conference (Vol. 15).
  • Smith-Ditizio, A. A. ve Smith, A. D. (2019). Computer fraud challenges and ıts legal ımplications. ın advanced methodologies and technologies in system security, Information Privacy, and Forensics (s. 152-165). IGI Global.
  • Thompson, R. (2005). Why spyware poses multiple threats to security. Communications of the ACM, 48(8), 41-43.
  • Villeneuve, N. (2011). Trends in targeted attacks. Trend Micro.(October).
  • Qamar, A., Karim, A., ve Chang, V. (2019). Mobile malware attacks: Review, taxonomy & future directions. Future Generation Computer Systems.
  • Vinay, S. E., ve Kok, P. (2018). Extended analysis of the Trojan-horse attack in quantum key distribution. Physical Review A. 97(4), 042335.
  • Wang, S. J., ve Kao, D. Y. (2007). Internet forensics on the basis of evidence gathering with Peep attacks. Computer Standards & Interfaces, 29(4), 423-429.
  • Wangen, G. (2015). The role of malware in reported cyber espionage: a review of the impact and mechanism. Information, 6(2), 183-211.
There are 19 citations in total.

Details

Primary Language Turkish
Subjects Computer Software
Journal Section Peer- Reviewed Articles
Authors

İlker Kara 0000-0003-3700-4825

Publication Date June 28, 2019
Submission Date March 21, 2019
Published in Issue Year 2019

Cite

APA Kara, İ. (2019). Truva Atı Zararlı Yazılımlarına Yaklaşım ve Çözüm Önerileri. Bilgi Yönetimi, 2(1), 28-33. https://doi.org/10.33721/by.542743

15529