MEMBANGUN TELEGRAMBOT UNTUK CRAWLING MALWARE OSINT MENGGUNAKAN RASPBERRY PI
DOI:
https://doi.org/10.21927/ijubi.v2i1.996Keywords:
Cyber Attack, Malware, OSINT, Single Board Computer, TelegramBotAbstract
Data serangan siber yang dirilis oleh Badan Siber dan Sandi Negara (BSSN) bersama Indonesia Honeynet Project (IHP) menunjukan bahwa terdapat serangan siber yang berasal dari Indonesia atau dalam negeri. Sumber informasi serangan siber yang dikategorikan sebagai Open Source Intelligent (OSINT) tersedia di Internet dengan berbagai format. Bahkan informasinya tersebar tergantung dari pihak penyedia. Pada penelitian ini diusulkan mengumpulkan berbagai serangan siber berbasis OSINT dengan metode crawling yang diakses melalui Instant Messenger. Telegram merupakan Instant Messenger yang telah menyediakan fitur otomatisasi menggunakan Robot. Aplikasi Robot ini tidak memerlukan baris kode yang banyak sehingga mudah dipasang pada Single Board Computer (SBC). Dengan bentuk Single Board Computer yang kecil memudahkan pemasangan dimana saja asalkan memiliki akses internet untuk memproses informasi. Melalui Instant Messenger Telegram mempermudah mengakses serangan siber berbasis OSINT tersebut dengan menggabungkan metode crawling dan TelegramBot.
References
Badan Siber dan Sandi Negara and Indonesia Honeynet Project, “Laporan Tahunan Honeynet Project,†Jakarta, 2018.
Badan Siber dan Sandi Negara, “Mengenali Serangan Siber Global dan Nasional Melalui Laporan Tahunan Honeynet Project BSSN-IHP Tahun 2018 | bssn.go.id,†2019. [Online]. Available: https://bssn.go.id/mengenali-serangan- siber-global-dan-nasional-melalui- laporan-tahunan-honeynet-project-bssn- ihp-tahun-2018/. [Accessed: 08-Feb-2019].
F. E. Nastiti, D. Hariyadi, and Fazlurrahman, “TelegramBot : Crawling Data Serangan Malware dengan Telegram,†J. Comput. Eng. Syst. Sci., vol. 4, no. 1, 2019.
P. Jovanović, M. Mileusnic, B. Pavić, and B. Mišković, “Applications of the Single Board Computers in the Software Defined Radio Systems,†no. June 2016, pp. 882–886, 2014.
Raspberry Pi Foundation, “Raspberry Pi Foundation Annual Review 2017,†2017.
Core Electronics, “Raspberry Pi Boards Compared - Tutorial Australia.†[Online]. Available: https://core-electronics.com.au/tutorials/compare- raspberry-pi-boards.html. [Accessed: 01- Feb-2019].
G. Halfacree, “The Official Raspberry Pi Beginner ’s Guide,†Raspberry Pi PRESS, 2018.
TIOBE, “February Headline: Groovy re- enters the TIOBE index top 20.†[Online]. Available: https://www.tiobe.com/tiobe- index/. [Accessed: 15-Feb-2019].
Python, “Beginners Guide.†[Online]. Available: https://wiki.python.org/moin/Beginners Guide/Overview. [Accessed: 21-Sep-2018].
W3Schools, “Python Tuples.†[Online]. Available: https://www.w3schools.com/python/py thon_tuples.asp. [Accessed: 21-Sep-2018].
Telegram, “Bots: An introduction for developers.†[Online]. Available: https://core.telegram.org/bots. [Accessed: 30-Oct-2018].
Bots for Telegram, “The Bot Father.â€[Online]. Available: https://botsfortelegram.com/project/the-bot-father/. [Accessed: 15-Oct-2018].
Y. Shafranovich, “Common Format and MIME Type for Comma-Separated Values (CSV) Files,†Oct. 2005.
C. S. Johnson, M. L. Badger, D. A. Waltermire, J. Snyder, and C. Skorupka, “Guide to Cyber Threat Information Sharing,†2016.
Downloads
Additional Files
Published
Issue
Section
License
COPYRIGHT TRANSFER FORM
The copyright to this article is transferred to Alma Ata University Press if and when the article is accepted for publication. The undersigned hereby transfers any and all rights in and to the paper including without limitation all copyrights to AAU Press. The undersigned hereby represents and warrants that the paper is original and that he/she is the author of the paper, except for material that is clearly identified as to its original source, with permission notices from the copyright owners where required. The undersigned represents that he/she has the power and authority to make and execute this assignment.
We declare that:
1. This paper has not been published in the same form elsewhere.
2. It will not be submitted anywhere else for publication prior to acceptance/rejection by this Journal.
3. A copyright permission is obtained for materials published elsewhere and which require this permission for reproduction.
Furthermore, I/We hereby transfer the unlimited rights of publication of the above mentioned paper in whole to AAU Press. The copyright transfer covers the exclusive right to reproduce and distribute the article, including reprints, translations, photographic reproductions, microform, electronic form (offline, online) or any other reproductions of similar nature.
The corresponding author signs for and accepts responsibility for releasing this material on behalf of any and all co-authors. This agreement is to be signed by at least one of the authors who have obtained the assent of the co-author(s) where applicable. After submission of this agreement signed by the corresponding author, changes of authorship or in the order of the authors listed will not be accepted.
Retained Rights/Terms and Conditions
Â
1. Authors retain all proprietary rights in any process, procedure, or article of manufacture described in the Work.
2. Authors may reproduce or authorize others to reproduce the Work or derivative works for the authors personal use or for company use, provided that the source and the AAU Press copyright notice are indicated, the copies are not used in any way that implies AAU Press endorsement of a product or service of any employer, and the copies themselves are not offered for sale.
3. Although authors are permitted to re-use all or portions of the Work in other works, this does not include granting third-party requests for reprinting, republishing, or other types of re-use.