VISUALISASI SERANGAN MALWARE SPYWARE DENGAN MENGGUNAKAN METODE SUPPORT VECTOR MACHINE (SVM)

FITRIANI, ZARAH and Stiawan, Deris (2023) VISUALISASI SERANGAN MALWARE SPYWARE DENGAN MENGGUNAKAN METODE SUPPORT VECTOR MACHINE (SVM). Undergraduate thesis, Sriwijaya University.

[thumbnail of RAMA_56201_090113981924093.pdf] Text
RAMA_56201_090113981924093.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (4MB) | Request a copy
[thumbnail of RAMA_56201_090113981924093_TURNITIN.pdf] Text
RAMA_56201_090113981924093_TURNITIN.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (6MB) | Request a copy
[thumbnail of RAMA_56201_090113981924093_0003047905_01_front_ref.pdf] Text
RAMA_56201_090113981924093_0003047905_01_front_ref.pdf - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (914kB)
[thumbnail of RAMA_56201_090113981924093_0003047905_02.pdf] Text
RAMA_56201_090113981924093_0003047905_02.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (243kB) | Request a copy
[thumbnail of RAMA_56201_090113981924093_0003047905_03.pdf] Text
RAMA_56201_090113981924093_0003047905_03.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (408kB) | Request a copy
[thumbnail of RAMA_56201_090113981924093_0003047905_04.pdf] Text
RAMA_56201_090113981924093_0003047905_04.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (2MB) | Request a copy
[thumbnail of RAMA_56201_090113981924093_0003047905_05.pdf] Text
RAMA_56201_090113981924093_0003047905_05.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (124kB) | Request a copy
[thumbnail of RAMA_56201_090113981924093_0003047905_06_ref.pdf] Text
RAMA_56201_090113981924093_0003047905_06_ref.pdf - Bibliography
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (131kB) | Request a copy
[thumbnail of RAMA_56201_090113981924093_0003047905_07_lamp.pdf] Text
RAMA_56201_090113981924093_0003047905_07_lamp.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (730kB) | Request a copy

Abstract

Spyware malware attacks are a significant threat to computer hardware and user privacy. To analyze and make it easier to recognize such attacks effectively, visualization techniques can provide valuable insights into their patterns and characteristics. This research using a machine learning algorithm, Support Vector Machine (SVM). The dataset used in this study is from the CIC MalMem 2022 which is benign data and spyware Transponder. Feature selection was applied to this study to identify the features that were most relevant in distinguishing between normal data and attacks. The results obtained using the SVM model with 3 SVM kernels are Linear, Polynomial, and Radial Basis Function (RBF). Based on the validation of the classification process using the SVM kernel got quite high results, where the Linear kernel got the most superior accuracy results, for 8 features accuracy that is 99.53%, 15 features accuracy is 99.77% and 24 features accuracy is 99.96%. Keyword: Spyware, Visualization, Support Vector Machine (SVM), Confusion Matrix

Item Type: Thesis (Undergraduate)
Uncontrolled Keywords: Spyware, Visualisasi, Support Vector Machine (SVM), Confusion Matrix
Subjects: T Technology > T Technology (General) > T1-995 Technology (General)
Divisions: 09-Faculty of Computer Science > 56201-Computer Systems (S1)
Depositing User: Zarah Fitriani
Date Deposited: 19 Jun 2023 08:08
Last Modified: 19 Jun 2023 08:08
URI: http://repository.unsri.ac.id/id/eprint/112082

Actions (login required)

View Item View Item