The increasing use of Android devices has also led to the rise of security threats, one of which is the Reverse TCP attack technique that enables unauthorized remote access to victim devices. This …
Android malware threats using reverse TCP techniques are increasing and require effective detection methods. This study develops a detection systemusing the Naïve Bayes algorithm implemented on a …
This study aims to detect and classify Distributed Denial of Service (DDoS), Denial of Service (DoS), and Man in The Middle (MITM) attacks on smart home devices using the Naïve Bayes method. The r…
The rapid advancement of Android technology makes this operating system vulnerable to malware attacks, one of which is the Reverse TCP Trojan, capable of establishing a back connection from the vic…
The rapid development of the open-source Android operating system has made it vulnerable to various cyberattacks, including malware that utilizes the reverse TCP technique. This attack allows an at…
Trojan horse is a cyber attack that is carried out by disguising or infiltrating a system through programs or files that appear normal and harmless. Trojan horses can gain unauthorized access into …
Ransomware is a type of malware that encrypts the victim's data and demands a ransom to restore access, with WannaCry being one of the most notorious variants exploiting EternalBlue on the SMB prot…
As the most widely used mobile operating system, Android is increasingly becoming a prime target for malware attacks. The popularity of this operating system makes it attractive for cyber security …
Malware that can enter through PDF files that appear unsuspicious is one of the main factors in cyber security attacks. The GARUDA dataset was analyzed statically using VirusTotal and PDFiD to iden…
Spyware is one type of malware that threatens computer systems because it can steal users' personal information and sensitive data without their knowledge. Spyware can monitor user activities and s…
K-means clustering is a tool for determining the cluster structure of a data set identified by its strong similarity to other clusters or its strong differences from other clusters. Another article…
Malware is malicious software that refers to programs that deliberately exploit vulnerabilities in computing systems for malicious purposes, Deep Neural Network is an Artificial Neural Network with…
Spyware is a type of malware that aims to collect important information and data such as financial information and passwords without permission and send them to the attacker. Visualization techniqu…
Android is the most popular mobile software platform across the globe. The worldwide app downloads reached 352.9 billion in 2021. However, it still faces serious security threats due to its open-so…
This research focuses on the utilization of Deep Learning techniques for malware detection and classification. By representing malware samples as grayscale images, a Deep Learning model based on Co…
Garba Rujukan Digital (GARUDA) merupakan salah satu e-library akademisi Indonesia yang memakai PDF sebagai ekstensi file. Dataset yang digunakan dalam penelitian ini berasal dari portal GARUDA deng…
K-Means clustering is a method to grouping data based on the similarity of features and detect the hidden patterns in dataset. The dataset is from GARUDA Repository which contains raw data of PDF f…
The amount of Malware is constantly increasing. Most Malware is a modification of previous Malware data. The datasets used from CIC-MalMem-2022 are Benign and Spyware-CWS. This study used the Naïv…
In the security sector, malware that specifically attacks smartphones is growing faster and more sophisticated. Malware is becoming more and more powerful in carrying out criminal acts, such as ste…
Portable Document Format (PDF) is a document exchange media that is very vulnerable to malicious attacks, namely Malware PDF. One of the services that most often use PDF files as a medium is a scie…
The Portable Document Format (PDF) is one of the most commonly used document reader formats, the object structure in PDF is flexible and easy to use. Therefore, that hackers use PDFs to carry out t…
Virus, trojan, dan semua komplotannya meupakan program jahat yang selalu mempunyai tujuan untuk menghancurkan, merusak data serta sistem komputer dan Android yang kita miliki. Virus tidak pernah p…
The internet is a liaison between one electronic media and other electronic media quickly and accurately in acommunication network. Where the communication network sends information that is transmi…
Visualization is a method used to represent data in the form of an image to display hidden information. The visualization in this study uses malware data to be converted into a grayscale image. Thi…
The development of technology triggers the development of malicious files called malware. Malware is software that is explicitly designed with the aim of finding weaknesses or even damaging softwar…
Slow http dos attack is one of the DoS attack methods targeting HTTP servers. This method hampers the service by flooding it causing a pool of connections with slow and heavy requests to the web se…
Malware adalah sebuah perangkat lunak yang dibuat dengan tujuan memasuki dan terkadang merusak sistem komputer, jaringan, ataupun server tanpa diketahui oleh pemiliknya, Ransomware merupakan jenis …