DETEKSI TROJAN METASPLOIT REVERSE TCP PADA NETWORK TRAFFIC DENGAN METODE K-NEAREST NEIGHBOR

SINTIA, NABILA and Stiawan, Deris and Afifah, Nurul (2025) DETEKSI TROJAN METASPLOIT REVERSE TCP PADA NETWORK TRAFFIC DENGAN METODE K-NEAREST NEIGHBOR. Undergraduate thesis, Sriwijaya University.

[thumbnail of RAMA_56201_09011282126073_cover.jpg] Image
RAMA_56201_09011282126073_cover.jpg - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (165kB)
[thumbnail of RAMA_56201_09011282126073.pdf] Text
RAMA_56201_09011282126073.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (4MB) | Request a copy
[thumbnail of iRAMA_56201_09011282126073_TURNITIN.pdf] Text
iRAMA_56201_09011282126073_TURNITIN.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (6MB) | Request a copy
[thumbnail of RAMA_56201_09011282126073_0003047905_0010119206_01_front_ref.pdf] Text
RAMA_56201_09011282126073_0003047905_0010119206_01_front_ref.pdf - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (749kB)
[thumbnail of RAMA_56201_09011282126073_0003047905_0010119206_02.pdf] Text
RAMA_56201_09011282126073_0003047905_0010119206_02.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (482kB) | Request a copy
[thumbnail of RAMA_56201_09011282126073_0003047905_0010119206_03.pdf] Text
RAMA_56201_09011282126073_0003047905_0010119206_03.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (997kB) | Request a copy
[thumbnail of RAMA_56201_09011282126073_0003047905_0010119206_04.pdf] Text
RAMA_56201_09011282126073_0003047905_0010119206_04.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (1MB) | Request a copy
[thumbnail of RAMA_56201_09011282126073_0003047905_0010119206_05.pdf] Text
RAMA_56201_09011282126073_0003047905_0010119206_05.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (73kB) | Request a copy
[thumbnail of RAMA_56201_09011282126073_0003047905_0010119206_06_ref.pdf] Text
RAMA_56201_09011282126073_0003047905_0010119206_06_ref.pdf - Bibliography
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (131kB) | Request a copy
[thumbnail of RAMA_56201_09011282126073_0003047905_0010119206_07_lamp.pdf] Text
RAMA_56201_09011282126073_0003047905_0010119206_07_lamp.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (428kB) | Request a copy

Abstract

Android is one of the most widely used operating systems. Android devices store various personal and sensitive information, which poses significant security risks. One of the major threats is the metasploit trojan using the reverse TCP technique, which allows attackers to remotely control the device. This study aims to detect the metasploit reverse TCP trojan in network traffic. The research utilizes the K-Nearest Neighbor (KNN) method for classification by determining the optimal number of nearest neighbors (k). The KNeighborsClassifier is used to build and train the model to detect patterns in the data. The results show that the K-Nearest Neighbor (KNN) method combined with feature selection using Recursive Feature Elimination (RFE) is effective in identifying relevant features. The use of KNN with RFE achieved an accuracy of 97.29%, which is higher than the model without feature selection, which only reached 95.66%, thus demonstrating improved performance in detecting Metasploit trojans. Keywords: Android, Trojan, Metasploit, Reverse, K-Nearest Neighbor

Item Type: Thesis (Undergraduate)
Uncontrolled Keywords: Android, Trojan, Metasploit, Reverse, K-Nearest Neighbor
Subjects: Q Science > Q Science (General) > Q334-342 Computer science. Artificial intelligence. Algorithms. Robotics. Automation.
Divisions: 09-Faculty of Computer Science > 56201-Computer Systems (S1)
Depositing User: Nabila Sintia
Date Deposited: 02 Jul 2025 07:47
Last Modified: 02 Jul 2025 07:47
URI: http://repository.unsri.ac.id/id/eprint/176404

Actions (login required)

View Item View Item