ANALISIS MALICIOUS URL PADA FILE MENGGUNAKAN METODE K-MEANS CLUSTERING BERBASIS HOST-BASED FEATURE EXTRACTION

RAFI, MUHAMMAD IMAM and Heryanto, Ahmad (2023) ANALISIS MALICIOUS URL PADA FILE MENGGUNAKAN METODE K-MEANS CLUSTERING BERBASIS HOST-BASED FEATURE EXTRACTION. Undergraduate thesis, Sriwijaya University.

[thumbnail of RAMA_56201_09011281823065.pdf] Text
RAMA_56201_09011281823065.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (3MB) | Request a copy
[thumbnail of RAMA_56201_09011281823065_TURNITIN.pdf] Text
RAMA_56201_09011281823065_TURNITIN.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (7MB) | Request a copy
[thumbnail of RAMA_56201_09011281823065_0022018703_01_front_ref.pdf] Text
RAMA_56201_09011281823065_0022018703_01_front_ref.pdf - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (1MB)
[thumbnail of RAMA_56201_09011281823065_0022018703_02.pdf] Text
RAMA_56201_09011281823065_0022018703_02.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (628kB) | Request a copy
[thumbnail of RAMA_56201_09011281823065_0022018703_03.pdf] Text
RAMA_56201_09011281823065_0022018703_03.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (706kB) | Request a copy
[thumbnail of RAMA_56201_09011281823065_0022018703_04.pdf] Text
RAMA_56201_09011281823065_0022018703_04.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (1MB) | Request a copy
[thumbnail of RAMA_56201_09011281823065_0022018703_05.pdf] Text
RAMA_56201_09011281823065_0022018703_05.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (180kB) | Request a copy
[thumbnail of RAMA_56201_09011281823065_0022018703_06_ref.pdf] Text
RAMA_56201_09011281823065_0022018703_06_ref.pdf - Bibliography
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (134kB) | Request a copy
[thumbnail of RAMA_56201_09011281823065_0022018703_07_lamp.pdf] Text
RAMA_56201_09011281823065_0022018703_07_lamp.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (1MB) | Request a copy

Abstract

The attacks or threats faced by internet users today have various types of attacks. These attacks are attacks in the form of phishing, malware, spyware, and ransomware. One of the most effective means of cyber attack carried out by attackers is by using URLs. URL (Uniform Resource Locator) is an address used to find the location of a file on the Internet. This makes URLs used as a method for carrying out cyber attacks referred to as Malicious URLs. Malicious URLs or dangerous sites on the internet contain a lot of content in the form of spam, phishing, which is used to initiate attacks. In this study, generate a URL dataset with URL features in the form of DNS records from URLs that will be used as data in clustering with K - Means. And produce a visualization of data clustering results with K - Means using a value of k = 2, namely in the form of benign clusters and malicious URLs. And analyze the visualization results of clustering with K - Means using the clustering validation test using the Silhouette Score with a result of 72.62% for k=2. In this study, generate model validation by training the URL dataset on machine learning and applying Hypeparameter tuning so that the performance results for each cluster are benign (0) 85% precision, 97% Recall, 91% F1-Score, and malicious (1) precision clusters. 96%, Recall 83%, F1-score 89%, and the accuracy of the model used is 89.94%.

Item Type: Thesis (Undergraduate)
Uncontrolled Keywords: METODE K-MEANS CLUSTERING
Subjects: T Technology > T Technology (General) > T1-995 Technology (General)
T Technology > T Technology (General) > T57.6-57.97 Operations research. Systems analysis
Divisions: 09-Faculty of Computer Science > 56201-Computer Systems (S1)
Depositing User: Muhammad Imam Rafi
Date Deposited: 12 May 2023 05:06
Last Modified: 12 May 2023 05:06
URI: http://repository.unsri.ac.id/id/eprint/102406

Actions (login required)

View Item View Item