DETEKSI MALICIOUS URL PADA FILE BERBASIS FITUR LEKSIKAL MENGGUNAKAN METODE RANDOM FOREST

PUTRI, RACHMAWATI DWINANTI and Heryanto, Ahmad (2023) DETEKSI MALICIOUS URL PADA FILE BERBASIS FITUR LEKSIKAL MENGGUNAKAN METODE RANDOM FOREST. Undergraduate thesis, Sriwijaya University.

[thumbnail of RAMA_56201_09011281823064.pdf] Text
RAMA_56201_09011281823064.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (3MB) | Request a copy
[thumbnail of RAMA_56201_09011281823064_TURNITIN.pdf] Text
RAMA_56201_09011281823064_TURNITIN.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (7MB) | Request a copy
[thumbnail of RAMA_56201_09011281823064_0022018703_01_front_ref.pdf] Text
RAMA_56201_09011281823064_0022018703_01_front_ref.pdf - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (789kB)
[thumbnail of RAMA_56201_09011281823064_0022018703_02.pdf] Text
RAMA_56201_09011281823064_0022018703_02.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (389kB) | Request a copy
[thumbnail of RAMA_56201_09011281823064_0022018703_03.pdf] Text
RAMA_56201_09011281823064_0022018703_03.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (1MB) | Request a copy
[thumbnail of RAMA_56201_09011281823064_0022018703_04.pdf] Text
RAMA_56201_09011281823064_0022018703_04.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (813kB) | Request a copy
[thumbnail of RAMA_56201_09011281823064_0022018703_05.pdf] Text
RAMA_56201_09011281823064_0022018703_05.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (65kB) | Request a copy
[thumbnail of RAMA_56201_09011281823064_0022018703_06_ref.pdf] Text
RAMA_56201_09011281823064_0022018703_06_ref.pdf - Bibliography
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (150kB) | Request a copy
[thumbnail of RAMA_56201_09011281823064_0022018703_07_Llamp.pdf] Text
RAMA_56201_09011281823064_0022018703_07_Llamp.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (536kB) | Request a copy

Abstract

With the existence of attack models such as phishing and malware distribution, these actions begin by accessing a Uniform Resource Locator (URL) or files containing harmful links within them. A Uniform Resource Locator (URL) is a specific identifier used to locate resources through the internet. URLs can pose threats to availability, control, confidentiality, and data integrity, with one of the threats being malicious URLs. To differentiate between malicious URLs and normal URLs, feature extraction is employed to identify important characteristics of malicious URLs. The extraction features used are lexical features consisting of 18 attributes. After extraction, due to the imbalanced dataset, resampling is performed using oversampling with SMOTE. To classify the dataset, this research utilizes a machine learning algorithm known as random forest. Random Forest is an algorithm that constructs multiple decision trees. This algorithm can achieve high classification accuracy and provide good results. In this study, the evaluation yields results with an accuracy value of 90.97%, precision of 99.05%, recall of 85.39%, and an f1-score of 91.71%.

Item Type: Thesis (Undergraduate)
Uncontrolled Keywords: URL, Malicious URL, Fitur Leksikal, Synthetic Minority Over-sampling Technique (SMOTE), Random Forest, Machine Learning
Subjects: Q Science > Q Science (General) > Q300-390 Cybernetics > Q325.5 Machine learning
Q Science > Q Science (General) > Q334-342 Computer science. Artificial intelligence. Algorithms. Robotics. Automation.
Q Science > QA Mathematics > QA75-76.95 Calculating machines > QA76.9.A25 Computer security. Systems and Data Security.
T Technology > T Technology (General) > T1-995 Technology (General)
Divisions: 09-Faculty of Computer Science > 56201-Computer Systems (S1)
Depositing User: Rachmawati Dwinanti Putri
Date Deposited: 24 Aug 2023 06:19
Last Modified: 24 Aug 2023 06:19
URI: http://repository.unsri.ac.id/id/eprint/127806

Actions (login required)

View Item View Item