Studi Literatur Terhadap Evolusi Virus Komputer: Mekanisme Penyebaran, Investigasi Forensik, dan Strategi Deteksi Berbasis Kecerdasan Buatan

Authors

  • Muhammad Ausid Addari Universitas Malikussaleh, Indonesia Author
  • Ghanda Ramadhan Siregar Universitas Malikussaleh, Indonesia Author
  • Afriza Briliansyah Lubis Universitas Malikussaleh, Indonesia Author
  • Cut Intan Ariestia Universitas Malikussaleh, Indonesia Author
  • Zatalini Universitas Malikussaleh, Indonesia Author

DOI:

https://doi.org/10.62671/jikum.v2i1.145

Keywords:

Malware, Artificial Intelligence, Digital Forensics, Ransomware, Mitigation.

Abstract

The escalation of post-pandemic malware threats has surpassed the capacity of conventional defenses, as social engineering techniques and code manipulation have become primary infiltration instruments exploiting vulnerabilities in user behavior and system structures. This study aims to analyze the evolution of malware propagation techniques, evaluate the effectiveness of digital forensic investigations, and test the robustness of artificial intelligence-based detection methods. Employing a Systematic Literature Review (SLR) approach toward case studies and algorithmic experiments from the 2023–2025 period, this research synthesizes data from real-world attack investigations and machine learning model performances. The results indicate that while algorithms such as Decision Trees and Ensemble Learning offer high accuracy, their effectiveness is increasingly compromised by adversarial attacks capable of deceiving AI logic. Furthermore, forensic findings in ransomware cases confirm that aggressive encryption speeds necessitate a shift in mitigation strategies from post-incident analysis to proactive hybrid defenses. This study concludes that the integration of behavioral detection technology and systemic resilience through data backup management is the primary key to countering the mutation of contemporary cyber threats.

References

Adenansi, R., & A. Novarina, L. (2017). Malware Dynamic. Jurnal of Education and Information Communication Technology, 1, 37–43.

Aditya Pratama, R., & Murdiansyah, D. T. (2025). Sistem Deteksi Malware Menggunakan Information Gain dan Decision Tree. CESS (Journal of Computer Engineering, System and Science), 10(2), 656–665. https://doi.org/10.24114/cess.v10i2.67170

Andi Novianto. (2025). Deteksi Malware Adversarial pada Jaringan IoT: Tinjauan Sistematis Model AI dan Strategi Serangan. DutaCom, 18(2). https://doi.org/10.47701/dutacom.v18i2.5128

Aura Jelita, N. B., & Siregar, H. (2025). Systematic Literature Review: Evolusi Ancaman Siber Dan Metode Deteksi Malware Di Sistem Operasi Android (2020–2025). Jurnal Komputer Teknologi Informasi Sistem Informasi (JUKTISI), 4(1), 227–235. https://doi.org/10.62712/juktisi.v4i1.395

Azwar, M., Widyawati, L., Azhar, R., Kartarina, K., Tanwir, T., & Anas, A. S. (2025). Deteksi Malware pada Perangkat Android Menggunakan Ensemble Learning. JTIM : Jurnal Teknologi Informasi Dan Multimedia, 7(3), 408–419. https://doi.org/10.35746/jtim.v7i3.573

Hartinah, Wahyudi Paundu, A., & Ahmad Ilham, A. (2023). Deteksi Malware Ransomware berdasarkan Panggilan API dengan Metode Ekstraksi Fitur N-gram dan TF-IDF.

Karunia, W. A., Zahra, A. F., & Amrozi, Y. (2025). Evaluasi Ancaman Baru Dalam Keamanan Informasi: Systematic Literature Review Tentang Kerentanan Cyber Security Pasca-Pandemi. Cyber Security Dan Forensik Digital, 8(1), 10–16. https://doi.org/10.14421/csecurity.2025.8.1.4889

Kristian, A., Skavinsky Teddy, R., Meylani, V. P., & Kesuma, D. P. (2025). Strategi Mitigasi Ancaman Siber di Era Teknologi Berkembang: Systematic Literature Review. Jurnal Nasional Komputasi Dan Teknologi Informasi (JNKTI), 8(3).

Kusuma, R. S. (2023). Forensik Serangan Ransomware Ryuk pada Jaringan Cloud. MULTINETICS, 9(2), 99–107. https://doi.org/10.32722/multinetics.v9i2.5234

murwodo, sudeng. (2023). Mengenal lebih dalam tentang virus virus komputer dan perilakunya. Jurnal Ilmiah Infokam. https://doi.org/10.53845/infokam.v19i1.344

Na’im, M., Jum’ah, A., Wijaya, H., & Ismail, R. R. (2023). Implementasi Model Digital Forensik Proses (DFD) Untuk Sosial Media Investigation Dengan Tools Hunchly (Vol. 6, Issue 2). https://doi.org/10.14421/csecurity.2023.6.2.4265

Rizky, D. septani, Widiyasono, N., & Mubarok, H. (2016). Investigasi Serangan Malware Njrat Pada PC. Jurnal Edukasi Dan Penelitian Informatika (JEPIN), 2(2).

Sumarno, S. (2023). Analisis Cara Kerja Sistem Deteksi Infeksi Worm Pada Komputer. METIK JURNAL, 7(2), 93–100. https://doi.org/10.47002/metik.v7i2.636

Syahrial Athoriq Nadzar, M., & Servanda, Y. (2024). Optimalisasi Keamanan Windows: Implementasi Clamav Tools Untuk Proteksi Antivirus. Jurnal Sains Dan Teknologi (JSIT), 4(2), 168–174. https://doi.org/10.47233/jsit.v4i2.1829

Tiana, D., Supriyadi, O., Wahyudi, B., Rimbawa, D., Program, P., Rekayasa, S., Siber, P., & Pertahanan, U. (2025). Studi Pustaka: Optimalisasi Deteksi Malware melalui Integrasi Pembelajaran Mesin Heuristik dan Big Data untuk Keamanan Siber. 14(1), 2715–7849. https://doi.org/10.34010/komputa.v14i1

Wahyu Hidayat M, Muhammad Arqam Syahputra, Muh. Fadlan Amrullah, Lisdayanti Susanto, & Andi Shelma Putri. (2023). Analisis Upaya Meningkatkan Keamanan Komputer Terhadap Ancaman di Lingkup Mahasiswa. Indonesian Technology and Education Journal, 1(1), 29–36. https://doi.org/10.61255/itej.v1i1.44

Wijanarko, R. P., Moch Rezeki Setiawan, Siti Mukaromah, & Abdul Rezha Efrat Najaf. (2023). ANALISIS DAN SIMULASI SERANGAN RANSOMWARE TERHADAP DATABASE BANK SYARIAH INDONESIA. Prosiding Seminar Nasional Teknologi Dan Sistem Informasi, 3(1), 106–115. https://doi.org/10.33005/sitasi.v3i1.436

Downloads

Published

2026-01-02

How to Cite

Addari, M. A. ., Siregar , G. R. ., Lubis , A. B. ., Ariestia, C. I. ., & Zatalini, Z. (2026). Studi Literatur Terhadap Evolusi Virus Komputer: Mekanisme Penyebaran, Investigasi Forensik, dan Strategi Deteksi Berbasis Kecerdasan Buatan. JIKUM: Jurnal Ilmu Komputer, 2(1), 22-25. https://doi.org/10.62671/jikum.v2i1.145

How to Cite

Addari, M. A. ., Siregar , G. R. ., Lubis , A. B. ., Ariestia, C. I. ., & Zatalini, Z. (2026). Studi Literatur Terhadap Evolusi Virus Komputer: Mekanisme Penyebaran, Investigasi Forensik, dan Strategi Deteksi Berbasis Kecerdasan Buatan. JIKUM: Jurnal Ilmu Komputer, 2(1), 22-25. https://doi.org/10.62671/jikum.v2i1.145