SINTIA, NABILA and Stiawan, Deris and Afifah, Nurul (2025) DETEKSI TROJAN METASPLOIT REVERSE TCP PADA NETWORK TRAFFIC DENGAN METODE K-NEAREST NEIGHBOR. Undergraduate thesis, Sriwijaya University.
![]() |
Image
RAMA_56201_09011282126073_cover.jpg - Accepted Version Available under License Creative Commons Public Domain Dedication. Download (165kB) |
![]() |
Text
RAMA_56201_09011282126073.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (4MB) | Request a copy |
![]() |
Text
iRAMA_56201_09011282126073_TURNITIN.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (6MB) | Request a copy |
![]() |
Text
RAMA_56201_09011282126073_0003047905_0010119206_01_front_ref.pdf - Accepted Version Available under License Creative Commons Public Domain Dedication. Download (749kB) |
![]() |
Text
RAMA_56201_09011282126073_0003047905_0010119206_02.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (482kB) | Request a copy |
![]() |
Text
RAMA_56201_09011282126073_0003047905_0010119206_03.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (997kB) | Request a copy |
![]() |
Text
RAMA_56201_09011282126073_0003047905_0010119206_04.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (1MB) | Request a copy |
![]() |
Text
RAMA_56201_09011282126073_0003047905_0010119206_05.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (73kB) | Request a copy |
![]() |
Text
RAMA_56201_09011282126073_0003047905_0010119206_06_ref.pdf - Bibliography Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (131kB) | Request a copy |
![]() |
Text
RAMA_56201_09011282126073_0003047905_0010119206_07_lamp.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (428kB) | Request a copy |
Abstract
Android is one of the most widely used operating systems. Android devices store various personal and sensitive information, which poses significant security risks. One of the major threats is the metasploit trojan using the reverse TCP technique, which allows attackers to remotely control the device. This study aims to detect the metasploit reverse TCP trojan in network traffic. The research utilizes the K-Nearest Neighbor (KNN) method for classification by determining the optimal number of nearest neighbors (k). The KNeighborsClassifier is used to build and train the model to detect patterns in the data. The results show that the K-Nearest Neighbor (KNN) method combined with feature selection using Recursive Feature Elimination (RFE) is effective in identifying relevant features. The use of KNN with RFE achieved an accuracy of 97.29%, which is higher than the model without feature selection, which only reached 95.66%, thus demonstrating improved performance in detecting Metasploit trojans. Keywords: Android, Trojan, Metasploit, Reverse, K-Nearest Neighbor
Item Type: | Thesis (Undergraduate) |
---|---|
Uncontrolled Keywords: | Android, Trojan, Metasploit, Reverse, K-Nearest Neighbor |
Subjects: | Q Science > Q Science (General) > Q334-342 Computer science. Artificial intelligence. Algorithms. Robotics. Automation. |
Divisions: | 09-Faculty of Computer Science > 56201-Computer Systems (S1) |
Depositing User: | Nabila Sintia |
Date Deposited: | 02 Jul 2025 07:47 |
Last Modified: | 02 Jul 2025 07:47 |
URI: | http://repository.unsri.ac.id/id/eprint/176404 |
Actions (login required)
![]() |
View Item |