MAFAZA, RIZKI VALEN and Heryanto, Ahmad (2023) KLASIFIKASI MALICIOUS URL PADA FILE MENGGUNAKAN METODE K-NEAREST NEIGHBOR BERDASARKAN LEXICAL FEATURE EXTRACTION. Undergraduate thesis, Sriwijaya University.
Text
RAMA_56201_09011281823134.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (2MB) | Request a copy |
|
Text
RAMA_56201_09011281823134_TURNITIN.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (9MB) | Request a copy |
|
Text
RAMA_56201_09011281823134_0022018703_01_front_ref.pdf - Accepted Version Available under License Creative Commons Public Domain Dedication. Download (703kB) |
|
Text
RAMA_56201_09011281823134_0022018703_02.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (235kB) | Request a copy |
|
Text
RAMA_56201_09011281823134_0022018703_03.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (820kB) | Request a copy |
|
Text
RAMA_56201_09011281823134_0022018703_04.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (836kB) | Request a copy |
|
Text
RAMA_56201_09011281823134_0022018703_05.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (17kB) | Request a copy |
|
Text
RAMA_56201_09011281823134_0022018703_06_ref.pdf - Bibliography Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (89kB) | Request a copy |
|
Text
RAMA_56201_09011281823134_0022018703_07_lamp.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (361kB) | Request a copy |
Abstract
Various forms of attack models ranging from hosting, spreading malware and phishing websites, these actions can start from accessing the Uniform Resource Locator (URL) or files that contain malicious links in them. A Uniform Resource Locator (URL) is a special identifier used to find resources over the internet. Malicious URLs can be a threat using various types of attacks, usually malicious URLs are disguised so they are easy to miss. What needs to be done to differentiate between malicious URLs and normal URLs is to use feature extraction to identify various important characteristics of malicious URLs. The extraction feature used is a lexical feature which consists of 18 features. After extraction, the results of the unbalanced dataset will be resampled using oversampling with SMOTE. This research uses the k-nearest neighbor machine learning algorithm to classify the dataset. K-Nearest Neighbor is a different characteristic classification algorithm that determines the class to which unlabeled data belongs using distance to calculate the nearest neighbors. This algorithm is able to achieve high classification accuracy and provide the best results. This research obtained evaluation results with the highest accuracy value of 98.78%, precision 98.785%, recall 98.795% and f1-score 98.79%.
Item Type: | Thesis (Undergraduate) |
---|---|
Uncontrolled Keywords: | Uniform Resource Locator, Malicious URL, Lexical Features, Synthetic Minority Over-sampling Technique (SMOTE), K-Nearest Neighbor, Machine Learning |
Subjects: | T Technology > T Technology (General) > T1-995 Technology (General) |
Divisions: | 09-Faculty of Computer Science > 56201-Computer Systems (S1) |
Depositing User: | Rizki Valen Mafaza |
Date Deposited: | 31 Oct 2023 01:03 |
Last Modified: | 31 Oct 2023 01:03 |
URI: | http://repository.unsri.ac.id/id/eprint/130126 |
Actions (login required)
View Item |