Research Article

The Spy Next Door: A Digital Computer Analysis Approach for Backdoor Trojan Attack

Number: 24 April 15, 2021
TR EN

The Spy Next Door: A Digital Computer Analysis Approach for Backdoor Trojan Attack

Abstract

Developments in internet-based technologies have some risks as well as their convenience. Attackers use the information they obtain by taking advantage of the user vulnerabilities and vulnerabilities in the information system for their interests. Although measures have been taken to prevent the number of victims of crimes committed in a cyber environment in recent years, the adequacy of the measures taken is still controversial. The attackers organize malware attacks especially to obtain users' secret information (social media password, banking information). Backdoor trojan malware is a type of cyber attack that tries to obtain unlimited authorization to obtain all user permissions in the system in which they infiltrate and delivers this information to the attacker. This study focused on the detection and analysis of the backdoor trojan malware. For this purpose real backdoor trojan malware case has been investigated in detail. The analysis results show that the information about the attacker is accessible.

Keywords

References

  1. Kara, I. (2019). A basic malware analysis method. Computer Fraud & Security, 2019(6), 11-19.
  2. Kara, I. (2020). Security Risks and Safeguard Measures in Social Media Usage. Avrupa Bilim ve Teknoloji Dergisi, 10-15.
  3. Anderson, B., Quist, D., Neil, J., Storlie, C., & Lane, T. (2011). Graph-based malware detection using dynamic analysis. Journal in computer Virology, 7(4), 247-258.
  4. Kara, I. (2015). Türkiye De Zararli Yazilimlarla Mücadelenin Uygulama Ve Hukuki Boyutunun Değerlendirilmesi. Akademik Bakış Uluslararası Hakemli Sosyal Bilimler Dergisi, (52), 87-98.
  5. Talukder, S., & Talukder, Z. (2020). A survey on malware detection and analysis tools. International Journal of Network Security & Its Applications, 12(2).
  6. Pandey, A., Tripathi, A., Alenezi, M., & Khan, A. K. (2020). Framework for producing effective efficient secure code through malware analysis. International Journal of Advanced Computer Science and Applications, 11(2), 497-503.
  7. Paul, K. I., & Moser, K. (2009). Unemployment impairs mental health: Meta-analyses. Journal of Vocational behavior, 74(3), 264-282.
  8. Bermejo Higuera, J., Abad Aramburu, C., Bermejo Higuera, J. R., Sicilia Urban, M. A., & Sicilia Montalvo, J. A. (2020). Systematic Approach to Malware Analysis (SAMA). Applied Sciences, 10(4), 1360.

Details

Primary Language

English

Subjects

Engineering

Journal Section

Research Article

Publication Date

April 15, 2021

Submission Date

March 16, 2021

Acceptance Date

April 5, 2021

Published in Issue

Year 2021 Number: 24

APA
Kara, İ. (2021). The Spy Next Door: A Digital Computer Analysis Approach for Backdoor Trojan Attack. Avrupa Bilim Ve Teknoloji Dergisi, 24, 125-129. https://doi.org/10.31590/ejosat.897799
AMA
1.Kara İ. The Spy Next Door: A Digital Computer Analysis Approach for Backdoor Trojan Attack. EJOSAT. 2021;(24):125-129. doi:10.31590/ejosat.897799
Chicago
Kara, İlker. 2021. “The Spy Next Door: A Digital Computer Analysis Approach for Backdoor Trojan Attack”. Avrupa Bilim Ve Teknoloji Dergisi, nos. 24: 125-29. https://doi.org/10.31590/ejosat.897799.
EndNote
Kara İ (April 1, 2021) The Spy Next Door: A Digital Computer Analysis Approach for Backdoor Trojan Attack. Avrupa Bilim ve Teknoloji Dergisi 24 125–129.
IEEE
[1]İ. Kara, “The Spy Next Door: A Digital Computer Analysis Approach for Backdoor Trojan Attack”, EJOSAT, no. 24, pp. 125–129, Apr. 2021, doi: 10.31590/ejosat.897799.
ISNAD
Kara, İlker. “The Spy Next Door: A Digital Computer Analysis Approach for Backdoor Trojan Attack”. Avrupa Bilim ve Teknoloji Dergisi. 24 (April 1, 2021): 125-129. https://doi.org/10.31590/ejosat.897799.
JAMA
1.Kara İ. The Spy Next Door: A Digital Computer Analysis Approach for Backdoor Trojan Attack. EJOSAT. 2021;:125–129.
MLA
Kara, İlker. “The Spy Next Door: A Digital Computer Analysis Approach for Backdoor Trojan Attack”. Avrupa Bilim Ve Teknoloji Dergisi, no. 24, Apr. 2021, pp. 125-9, doi:10.31590/ejosat.897799.
Vancouver
1.İlker Kara. The Spy Next Door: A Digital Computer Analysis Approach for Backdoor Trojan Attack. EJOSAT. 2021 Apr. 1;(24):125-9. doi:10.31590/ejosat.897799