KLASIFIKASI MALICIOUS URL PADA FILE BERBASIS HOST-BASED FEATURE EXTRACTION MENGGUNAKAN METODE LSTM

REALDI, MUHAMMAD and Heryanto, Ahmad (2025) KLASIFIKASI MALICIOUS URL PADA FILE BERBASIS HOST-BASED FEATURE EXTRACTION MENGGUNAKAN METODE LSTM. Undergraduate thesis, Sriwijaya University.

[thumbnail of RAMA_56201_09011281823070_cover.jpg] Image
RAMA_56201_09011281823070_cover.jpg - Cover Image
Available under License Creative Commons Public Domain Dedication.

Download (95kB)
[thumbnail of RAMA_56201_09011281823070.pdf] Text
RAMA_56201_09011281823070.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (4MB) | Request a copy
[thumbnail of RAMA_56201_09011281823070_TURNITIN.pdf] Text
RAMA_56201_09011281823070_TURNITIN.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (6MB) | Request a copy
[thumbnail of RAMA_56201_09011281823070_0022018703_01_front_ref.pdf] Text
RAMA_56201_09011281823070_0022018703_01_front_ref.pdf - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (1MB)
[thumbnail of RAMA_56201_09011281823070_0022018703_02.pdf] Text
RAMA_56201_09011281823070_0022018703_02.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (692kB) | Request a copy
[thumbnail of RAMA_56201_09011281823070_0022018703_03.pdf] Text
RAMA_56201_09011281823070_0022018703_03.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (585kB) | Request a copy
[thumbnail of RAMA_56201_09011281823070_0022018703_04.pdf] Text
RAMA_56201_09011281823070_0022018703_04.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (1MB) | Request a copy
[thumbnail of RAMA_56201_09011281823070_0022018703_05.pdf] Text
RAMA_56201_09011281823070_0022018703_05.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (5kB) | Request a copy
[thumbnail of RAMA_56201_09011281823070_0022018703_06_ref.pdf] Text
RAMA_56201_09011281823070_0022018703_06_ref.pdf - Bibliography
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (237kB) | Request a copy
[thumbnail of RAMA_56201_09011281823070_0022018703_07_lamp.pdf] Text
RAMA_56201_09011281823070_0022018703_07_lamp.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (1MB) | Request a copy

Abstract

Dangers on the internet can endanger users by malicious actors who attack them covertly. These attacks include phishing, malware, spyware, and ransomware. One very effective cyberattack tool carried out by attackers is using URLs. A URL (Uniform Resource Locator) is an address used to find the location of a file on the internet. This makes URLs used as one method for carrying out cyberattacks called Malicious URLs. Malicious URLs or dangerous sites on the internet contain a lot of content in the form of spam and phishing, which are used to launch attacks. In this study, a URL dataset was generated with URL features in the form of DNS records from URLs that will be used as data in conducting LSTM. And produced a visualization of the LSTM results data using epoch 100, namely benign URLs and malicious URLs. And conducting an analysis of the visualization results of LSTM using the validation test obtained with the results in this study, resulting in model validation by training the URL dataset on machine learning and applying Hypeparameter tuning so that the performance results of each test ratio are benign (0) precision 85%, Recall 97%, F1-Score 91%, and malicious cluster (1) precision 96%, Recall 92%, F1-score 94%, and the accuracy results of the model used are with a value of 94.6%.

Item Type: Thesis (Undergraduate)
Uncontrolled Keywords: Malicious URL, Long-Short Term Memory, Host-Based Feature Extraction
Subjects: T Technology > TA Engineering (General). Civil engineering (General) > TA1-2040 Engineering (General). Civil engineering (General) > TA158.7 Computer network resources Including the Internet
Z Bibliography. Library Science. Information Resources > ZA Information resources > ZA4150-4380 Computer network resources
Divisions: 09-Faculty of Computer Science > 56201-Computer Systems (S1)
Depositing User: Muhammad Realdi
Date Deposited: 12 Aug 2025 01:53
Last Modified: 12 Aug 2025 01:53
URI: http://repository.unsri.ac.id/id/eprint/182703

Actions (login required)

View Item View Item