IMPLEMENTASI METODE ADASYN DALAM DETEKSI URL BERBAHAYA MENGGUNAKAN MACHINE LEARNING: DEMI MENINGKATKAN KEAMANAN SIBER DI ERA DIGITAL
##plugins.themes.academic_pro.article.main##
Abstract
Cybercriminals exploit malicious URLs as a distribution channel to spread harmful software across the internet. They take advantage of vulnerabilities in browsers to install malicious software with the aim of gaining remote access to the victims' computers. Typically, this malicious software aims to gain access to networks, steal sensitive information, and silently monitor targeted computer systems. In this research, a data mining approach known as Classification Based on Association (CBA) is employed to detect malicious URLs using both the URL itself and the features of the presented web pages. The CBA algorithm utilizes a training dataset of URLs as historical data to discover association rules that can be used to create an accurate classifier. By detecting dangerous URLs and malicious software, this contribution can assist organizations and individual users in enhancing the security of their computer systems and networks, thereby protecting sensitive data and reducing the risk of security incidents. The experimental results demonstrate that CBA achieves performance on par with tested classification algorithms, achieving an accuracy of 99% and low rates of false positives and false negatives. Future research could expand its focus to detect malicious URLs and software on mobile devices and embedded systems, as they have become significant targets for cybercriminals.
##plugins.themes.academic_pro.article.details##
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
Similar Articles
- Ahmad Maulid Ridwan, Gilang Dwi Setyawan, PERBANDINGAN BERBAGAI MODEL MACHINE LEARNING UNTUK MENDETEKSI DIABETES , TEKNOKOM: Vol. 6 No. 2 (2023): TEKNOKOM
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Andrie Yuswanto, Budi Wibowo, A SYSTEMATIC REVIEW METHOD FOR SECURITY ANALYSIS OF INTERNET OF THINGS ON HONEYPOT DETECTION , TEKNOKOM: Vol. 4 No. 1 (2021): TEKNOKOM
- Safrizal Ahmad, Ahmad Maulid Ridwan, Gilang Dwi Setyawan, ANALISIS SENTIMEN PRODUCT TOOLS & HOME MENGGUNAKAN METODE CNN DAN LSTM , TEKNOKOM: Vol. 6 No. 2 (2023): TEKNOKOM
- Deny Danu Prasetia, Andrie Yuswanto, Budi Wibowo, DESIGN OF MACHINE LEARNING DETECTION MASK USING YOLO AND DARKNET ON NVIDIA JETSON NANO , TEKNOKOM: Vol. 5 No. 1 (2022): TEKNOKOM
- Ahmad Maulid Ridwan, Gilang Dwi Setyawan, PERBANDINGAN BERBAGAI MODEL MACHINE LEARNING UNTUK MENDETEKSI DIABETES , TEKNOKOM: Vol. 6 No. 2 (2023): TEKNOKOM
- Fyan Isra Wardanu, Budi Wibowo, Andrie Yuswanto, ANALYSIS AND APPLICATION OF CLOUD STORAGE SECURITY UTILIZATION BASED ON AS A SERVICE (IaaS) INFRASTRUCTURE SERVICE MODEL AS A DOCUMENT SHARING MEDIA DURING PANDEMI , TEKNOKOM: Vol. 5 No. 1 (2022): TEKNOKOM
- Rafli Permana, Andrie Yuswanto, Budi Wibowo, A NODEMCU INTERNET OF THINGS-BASED FIRE AUTOMATION DESIGN WITH BLYNK APPS NOTIFICATIONS , TEKNOKOM: Vol. 6 No. 1 (2023): TEKNOKOM