SETIAWAN, HAFIZD and Stiawan, Deris (2024) VISUALISASI SERANGAN TROJAN METASPLOIT PADA ANDROID DENGAN METODE K-MEANS. Undergraduate thesis, Sriwijaya University.
Text
RAMA_56201_09011182025004.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (2MB) | Request a copy |
|
Text
RAMA_56201_09011182025004_TURNITIN.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (2MB) | Request a copy |
|
Text
RAMA_56201_09011182025004_0003047905_01_front_ref.pdf - Accepted Version Available under License Creative Commons Public Domain Dedication. Download (617kB) |
|
Text
RAMA_56201_09011182025004_0003047905_02.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (201kB) | Request a copy |
|
Text
RAMA_56201_09011182025004_0003047905_03.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (738kB) | Request a copy |
|
Text
RAMA_56201_09011182025004_0003047905_04.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (582kB) | Request a copy |
|
Text
RAMA_56201_09011182025004_0003047905_05.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (11kB) | Request a copy |
|
Text
RAMA_56201_09011182025004_0003047905_06_ref.pdf - Bibliography Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (82kB) | Request a copy |
|
Text
RAMA_56201_09011182025004_0003047905_07_lamp.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (412kB) | Request a copy |
Abstract
K-Means clustering is a tool used to determine the cluster structure of a dataset identified by its strong similarity to other clusters or its strong difference from other clusters. In another paper, it is stated that the working method of the K-Means algorithm requires the use of centroids as cluster prototypes and previous cluster results as its output. The dataset originates from the COMNETS research experiment. K-Means successfully clustered into 2 clusters with a silhouette score of 0.81, and the elbow method results indicated a significant drop at 2 clusters. The parallel coordinates visualization showed patterns of attacks from the Metasploit trojan. Validation using the Confusion Matrix showed that the model achieved an accuracy of 85.94%. Keyword : K-means Clustering, Cyber Attack, Metasploit, Silhouette Score.
Item Type: | Thesis (Undergraduate) |
---|---|
Uncontrolled Keywords: | Android malware,Metasploit,K-means clustering |
Subjects: | Q Science > Q Science (General) > Q300-390 Cybernetics > Q325.5 Machine learning Q Science > Q Science (General) > Q334-342 Computer science. Artificial intelligence. Algorithms. Robotics. Automation. T Technology > T Technology (General) > T1-995 Technology (General) |
Divisions: | 09-Faculty of Computer Science > 56201-Computer Systems (S1) |
Depositing User: | Hafizd Setiawan |
Date Deposited: | 10 Jun 2024 06:04 |
Last Modified: | 10 Jun 2024 06:04 |
URI: | http://repository.unsri.ac.id/id/eprint/146546 |
Actions (login required)
View Item |