Skripsi
DETEKSI SERANGAN MALWARE ANDROID REVERSE TCP PADA NETWORK TRAFFIC MENGGUNAKAN METODE EXTREME GRADIENT BOOSTING (XGBOOST)
The rapid advancement of Android technology makes this operating system vulnerable to malware attacks, one of which is the Reverse TCP Trojan, capable of establishing a back connection from the victim’s device to the attacker without being detected. This study aims to analyze the characteristics of Android Reverse TCP malware attacks on network traffic and develop a detection model using the Extreme Gradient Boosting (XGBoost) method. The analysis process utilizes Snort IDS to detect suspicious activities and produces a dataset consisting of 2,822 records with 84 features. The data then undergo preprocessing stages, including encoding, feature selection, data splitting, and class balancing using SMOTE. The XGBoost model is developed with the best parameter configuration. Evaluation results show that the model can detect Android Reverse TCP malware attacks with 98% accuracy, 98% precision, 98% recall, and 98% F1-score. This performance indicates that the XGBoost method has excellent capability in identifying malicious activities in network traffic and can be effectively applied to machine learning based malware detection systems.
| Inventory Code | Barcode | Call Number | Location | Status |
|---|---|---|---|---|
| 2507006196 | T185474 | T1854742025 | Central Library (Reference) | Available but not for loan - Not for Loan |