Analyzing Image Malware with OSINTs after Steganography using Symmetric Key Algorithm

Authors

  • Anni Karimatul Fauziyyah Program Studi Sarjana Terapan Teknologi Rekayasa Internet, Departemen Teknik Elektro dan Informatika, Sekolah Vokasi Universitas Gadjah Mada
  • Ronald Adrian Program Studi Sarjana Terapan Teknologi Rekayasa Internet, Departemen Teknik Elektro dan Informatika, Sekolah Vokasi Universitas Gadjah Mada
  • Sahirul Alam Program Studi Sarjana Terapan Teknologi Rekayasa Internet, Departemen Teknik Elektro dan Informatika, Sekolah Vokasi Universitas Gadjah Mada

DOI:

10.33395/sinkron.v8i2.12266

Keywords:

OSINTs;asymmetric key; Steganography;Malware;Image

Abstract

Steganography is the practice of hiding a message or information
within another file, such as an image (Singh & Singla, 2022). OSINT (Open
Source Intelligence) involves using publicly available information for
intelligence gathering purposes. In this research, the asymmetric key
algorithm will be applied to the steganography method, using 10 images with
different sizes and dimensions. Images tested for steganography are in tiff,
gif, png, jpg, and bmp format. A combination of steganography and OSINT
could involve analyzing and decoding images found on publicly available
platforms, such as social media, to uncover hidden messages. On the other
hand, steganography within OSINT can also be used to protect sensitive
information from prying eyes. Overall, the combination of Symmetric Key
Algorithm steganography and OSINT can be a powerful tool for both
intelligence gathering and secure communication. Here in this work,
malware is developed, and using that malware the victim’s machine is
exploited. Later, an analysis is done via freely available OSINTs to find out
which is the best OSINT that gives the best results. OSINTs have been very
helpful in identifying whether the URLs and files are malicious or not. But
how binding an image with the malware makes it difficult for OSINTs to
identify they are malicious or not is being analyzed in this work. The analysis
shows that the best OSINT is VirusTotal which has a greater number of
engines that could detect the malware whereas others don’t have a variety of
engines to detect the malware. Also, when it comes to malware afore binding
it with an image is easier to detect whereas for an OSINT it was difficult to
identify and detect the malware after binding with an image

GS Cited Analysis

Downloads

Download data is not yet available.

References

MMurali, R., Ravi, A., & Agarwal, H. (2020). A Malware Variant Resistant To Traditional Analysis Techniques. 2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE). Vellore, India.

Liu, Y., Li, J., Liu, B., Xiaoling Gao College of Computer and Data Science, F. U., & Liu, X. (2021). Malware Identification Method Based on Image Analysis. Wuyishan, Fujian, China: IEEE.

Witte, T. N. (2020). Phantom Malware: Conceal Malicious Actions From Malware Detection Techniques by Imitating User Activity. IEEE Access, 8, 164428 - 164452.

Singh, J., & Singla, M. (2022). A Novel Method of high-Capacity Steganography Technique in Double Precision Images. Shillong, India: 2021 International Conference on Computational Performance Evaluation (ComPE).

Bryushinin, A. O., Dushkin, A. V., & Melshiyan, M. A. (2022). Automation of the Information Collection Process by Osint Methods for Penetration Testing During Information Security Audit. Saint Petersburg, Russian Federation: IEEE.

Kowta, A. S., Bhowmick, K., Kaur, J. R., & Jeyanthi, N. (2021). Analysis and Overview of Information Gathering & Tools for Pentesting. India: IEEE.

Demetrio, L., Biggio, B., Lagorio, G., Roli, F., & Armando, A. (2021). Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware. Published in: IEEE Transactions on Information Forensics and Security, 3469 - 3478.

Zhang, J., Zhao, X., He, X., & Zhang, H. (2022). Improving the Robustness of JPEG Steganography With Robustness Cost. IEEE Signal Processing Letters, 164 - 168.

Bogdanoski, M., Risteski, A., & Pejoski, S. (2013). Steganalysis — A way forward against cyber terrorism. 2012 20th Telecommunications Forum (TELFOR). Belgrade, Serbia: IEEE.

Gong, S., Cho, J., & Lee, C. (2018). A Reliability Comparison Method for OSINT Validity Analysis. IEEE Transactions on Industrial Informatics , 5428 - 5435.

Andi Marwan Elhanafi, T. R.-N. (2022). Cryptography Application on RGB Overlapping Block Based PVD Using AES. Sinkron : Jurnal dan Penelitian Teknik Informatika, 7.

Almazaydeh, W. I., & Sheshadri, H. S. (2018). Image Steganography Using a Dynamic Symmetric Key. 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI). India: IEEE.

Nurhayati, S. S. (2022). Steganography for Inserting Message on Digital Image Using Least Significant Bit and AES Cryptographic Algorithm. Informatics Engineering Department, Science and Technology Faculty Syarif Hidayatullah State Islamic University (UIN) Jakarta, Indonesia.

Downloads


Crossmark Updates

How to Cite

Fauziyyah, A. K. ., Adrian, R. ., & Alam, S. . (2023). Analyzing Image Malware with OSINTs after Steganography using Symmetric Key Algorithm. Sinkron : Jurnal Dan Penelitian Teknik Informatika, 7(2), 818-824. https://doi.org/10.33395/sinkron.v8i2.12266