PUTRI, RACHMAWATI DWINANTI and Heryanto, Ahmad (2023) DETEKSI MALICIOUS URL PADA FILE BERBASIS FITUR LEKSIKAL MENGGUNAKAN METODE RANDOM FOREST. Undergraduate thesis, Sriwijaya University.
Text
RAMA_56201_09011281823064.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (3MB) | Request a copy |
|
Text
RAMA_56201_09011281823064_TURNITIN.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (7MB) | Request a copy |
|
Text
RAMA_56201_09011281823064_0022018703_01_front_ref.pdf - Accepted Version Available under License Creative Commons Public Domain Dedication. Download (789kB) |
|
Text
RAMA_56201_09011281823064_0022018703_02.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (389kB) | Request a copy |
|
Text
RAMA_56201_09011281823064_0022018703_03.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (1MB) | Request a copy |
|
Text
RAMA_56201_09011281823064_0022018703_04.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (813kB) | Request a copy |
|
Text
RAMA_56201_09011281823064_0022018703_05.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (65kB) | Request a copy |
|
Text
RAMA_56201_09011281823064_0022018703_06_ref.pdf - Bibliography Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (150kB) | Request a copy |
|
Text
RAMA_56201_09011281823064_0022018703_07_Llamp.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (536kB) | Request a copy |
Abstract
With the existence of attack models such as phishing and malware distribution, these actions begin by accessing a Uniform Resource Locator (URL) or files containing harmful links within them. A Uniform Resource Locator (URL) is a specific identifier used to locate resources through the internet. URLs can pose threats to availability, control, confidentiality, and data integrity, with one of the threats being malicious URLs. To differentiate between malicious URLs and normal URLs, feature extraction is employed to identify important characteristics of malicious URLs. The extraction features used are lexical features consisting of 18 attributes. After extraction, due to the imbalanced dataset, resampling is performed using oversampling with SMOTE. To classify the dataset, this research utilizes a machine learning algorithm known as random forest. Random Forest is an algorithm that constructs multiple decision trees. This algorithm can achieve high classification accuracy and provide good results. In this study, the evaluation yields results with an accuracy value of 90.97%, precision of 99.05%, recall of 85.39%, and an f1-score of 91.71%.
Item Type: | Thesis (Undergraduate) |
---|---|
Uncontrolled Keywords: | URL, Malicious URL, Fitur Leksikal, Synthetic Minority Over-sampling Technique (SMOTE), Random Forest, Machine Learning |
Subjects: | Q Science > Q Science (General) > Q300-390 Cybernetics > Q325.5 Machine learning Q Science > Q Science (General) > Q334-342 Computer science. Artificial intelligence. Algorithms. Robotics. Automation. Q Science > QA Mathematics > QA75-76.95 Calculating machines > QA76.9.A25 Computer security. Systems and Data Security. T Technology > T Technology (General) > T1-995 Technology (General) |
Divisions: | 09-Faculty of Computer Science > 56201-Computer Systems (S1) |
Depositing User: | Rachmawati Dwinanti Putri |
Date Deposited: | 24 Aug 2023 06:19 |
Last Modified: | 24 Aug 2023 06:19 |
URI: | http://repository.unsri.ac.id/id/eprint/127806 |
Actions (login required)
View Item |