RAFI, MUHAMMAD IMAM and Heryanto, Ahmad (2023) ANALISIS MALICIOUS URL PADA FILE MENGGUNAKAN METODE K-MEANS CLUSTERING BERBASIS HOST-BASED FEATURE EXTRACTION. Undergraduate thesis, Sriwijaya University.
Text
RAMA_56201_09011281823065.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (3MB) | Request a copy |
|
Text
RAMA_56201_09011281823065_TURNITIN.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (7MB) | Request a copy |
|
Text
RAMA_56201_09011281823065_0022018703_01_front_ref.pdf - Accepted Version Available under License Creative Commons Public Domain Dedication. Download (1MB) |
|
Text
RAMA_56201_09011281823065_0022018703_02.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (628kB) | Request a copy |
|
Text
RAMA_56201_09011281823065_0022018703_03.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (706kB) | Request a copy |
|
Text
RAMA_56201_09011281823065_0022018703_04.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (1MB) | Request a copy |
|
Text
RAMA_56201_09011281823065_0022018703_05.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (180kB) | Request a copy |
|
Text
RAMA_56201_09011281823065_0022018703_06_ref.pdf - Bibliography Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (134kB) | Request a copy |
|
Text
RAMA_56201_09011281823065_0022018703_07_lamp.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (1MB) | Request a copy |
Abstract
The attacks or threats faced by internet users today have various types of attacks. These attacks are attacks in the form of phishing, malware, spyware, and ransomware. One of the most effective means of cyber attack carried out by attackers is by using URLs. URL (Uniform Resource Locator) is an address used to find the location of a file on the Internet. This makes URLs used as a method for carrying out cyber attacks referred to as Malicious URLs. Malicious URLs or dangerous sites on the internet contain a lot of content in the form of spam, phishing, which is used to initiate attacks. In this study, generate a URL dataset with URL features in the form of DNS records from URLs that will be used as data in clustering with K - Means. And produce a visualization of data clustering results with K - Means using a value of k = 2, namely in the form of benign clusters and malicious URLs. And analyze the visualization results of clustering with K - Means using the clustering validation test using the Silhouette Score with a result of 72.62% for k=2. In this study, generate model validation by training the URL dataset on machine learning and applying Hypeparameter tuning so that the performance results for each cluster are benign (0) 85% precision, 97% Recall, 91% F1-Score, and malicious (1) precision clusters. 96%, Recall 83%, F1-score 89%, and the accuracy of the model used is 89.94%.
Item Type: | Thesis (Undergraduate) |
---|---|
Uncontrolled Keywords: | METODE K-MEANS CLUSTERING |
Subjects: | T Technology > T Technology (General) > T1-995 Technology (General) T Technology > T Technology (General) > T57.6-57.97 Operations research. Systems analysis |
Divisions: | 09-Faculty of Computer Science > 56201-Computer Systems (S1) |
Depositing User: | Muhammad Imam Rafi |
Date Deposited: | 12 May 2023 05:06 |
Last Modified: | 12 May 2023 05:06 |
URI: | http://repository.unsri.ac.id/id/eprint/102406 |
Actions (login required)
View Item |