VISUALISASI SERANGAN TROJAN METASPLOIT PADA ANDROID DENGAN METODE K-MEANS

SETIAWAN, HAFIZD and Stiawan, Deris (2024) VISUALISASI SERANGAN TROJAN METASPLOIT PADA ANDROID DENGAN METODE K-MEANS. Undergraduate thesis, Sriwijaya University.

[thumbnail of RAMA_56201_09011182025004.pdf] Text
RAMA_56201_09011182025004.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (2MB) | Request a copy
[thumbnail of RAMA_56201_09011182025004_TURNITIN.pdf] Text
RAMA_56201_09011182025004_TURNITIN.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (2MB) | Request a copy
[thumbnail of RAMA_56201_09011182025004_0003047905_01_front_ref.pdf] Text
RAMA_56201_09011182025004_0003047905_01_front_ref.pdf - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (617kB)
[thumbnail of RAMA_56201_09011182025004_0003047905_02.pdf] Text
RAMA_56201_09011182025004_0003047905_02.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (201kB) | Request a copy
[thumbnail of RAMA_56201_09011182025004_0003047905_03.pdf] Text
RAMA_56201_09011182025004_0003047905_03.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (738kB) | Request a copy
[thumbnail of RAMA_56201_09011182025004_0003047905_04.pdf] Text
RAMA_56201_09011182025004_0003047905_04.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (582kB) | Request a copy
[thumbnail of RAMA_56201_09011182025004_0003047905_05.pdf] Text
RAMA_56201_09011182025004_0003047905_05.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (11kB) | Request a copy
[thumbnail of RAMA_56201_09011182025004_0003047905_06_ref.pdf] Text
RAMA_56201_09011182025004_0003047905_06_ref.pdf - Bibliography
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (82kB) | Request a copy
[thumbnail of RAMA_56201_09011182025004_0003047905_07_lamp.pdf] Text
RAMA_56201_09011182025004_0003047905_07_lamp.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (412kB) | Request a copy

Abstract

K-Means clustering is a tool used to determine the cluster structure of a dataset identified by its strong similarity to other clusters or its strong difference from other clusters. In another paper, it is stated that the working method of the K-Means algorithm requires the use of centroids as cluster prototypes and previous cluster results as its output. The dataset originates from the COMNETS research experiment. K-Means successfully clustered into 2 clusters with a silhouette score of 0.81, and the elbow method results indicated a significant drop at 2 clusters. The parallel coordinates visualization showed patterns of attacks from the Metasploit trojan. Validation using the Confusion Matrix showed that the model achieved an accuracy of 85.94%. Keyword : K-means Clustering, Cyber Attack, Metasploit, Silhouette Score.

Item Type: Thesis (Undergraduate)
Uncontrolled Keywords: Android malware,Metasploit,K-means clustering
Subjects: Q Science > Q Science (General) > Q300-390 Cybernetics > Q325.5 Machine learning
Q Science > Q Science (General) > Q334-342 Computer science. Artificial intelligence. Algorithms. Robotics. Automation.
T Technology > T Technology (General) > T1-995 Technology (General)
Divisions: 09-Faculty of Computer Science > 56201-Computer Systems (S1)
Depositing User: Hafizd Setiawan
Date Deposited: 10 Jun 2024 06:04
Last Modified: 10 Jun 2024 06:04
URI: http://repository.unsri.ac.id/id/eprint/146546

Actions (login required)

View Item View Item