Skripsi
DETEKSI TROJAN METASPLOIT REVERSE TCP PADA NETWORK TRAFFIC DENGAN METODE K-NEAREST NEIGHBOR
Android is one of the most widely used operating systems. Android devices store various personal and sensitive information, which poses significant security risks. One of the major threats is the metasploit trojan using the reverse TCP technique, which allows attackers to remotely control the device. This study aims to detect the metasploit reverse TCP trojan in network traffic. The research utilizes the K-Nearest Neighbor (KNN) method for classification by determining the optimal number of nearest neighbors (k). The KNeighborsClassifier is used to build and train the model to detect patterns in the data. The results show that the K-Nearest Neighbor (KNN) method combined with feature selection using Recursive Feature Elimination (RFE) is effective in identifying relevant features. The use of KNN with RFE achieved an accuracy of 97.29%, which is higher than the model without feature selection, which only reached 95.66%, thus demonstrating improved performance in detecting Metasploit trojans. Keywords: Android, Trojan, Metasploit, Reverse, K-Nearest Neighbor
Inventory Code | Barcode | Call Number | Location | Status |
---|---|---|---|---|
2507003607 | T176404 | T1764042025 | Central Library (Reference) | Available but not for loan - Not for Loan |
No other version available