Trojan horse is a cyber attack that is carried out by disguising or infiltrating a system through programs or files that appear normal and harmless. Trojan horses can gain unauthorized access into …
Ransomware is a type of malware that encrypts the victim's data and demands a ransom to restore access, with WannaCry being one of the most notorious variants exploiting EternalBlue on the SMB prot…
As the most widely used mobile operating system, Android is increasingly becoming a prime target for malware attacks. The popularity of this operating system makes it attractive for cyber security …
Malware that can enter through PDF files that appear unsuspicious is one of the main factors in cyber security attacks. The GARUDA dataset was analyzed statically using VirusTotal and PDFiD to iden…
Spyware is one type of malware that threatens computer systems because it can steal users' personal information and sensitive data without their knowledge. Spyware can monitor user activities and s…
K-means clustering is a tool for determining the cluster structure of a data set identified by its strong similarity to other clusters or its strong differences from other clusters. Another article…
Malware is malicious software that refers to programs that deliberately exploit vulnerabilities in computing systems for malicious purposes, Deep Neural Network is an Artificial Neural Network with…
Spyware is a type of malware that aims to collect important information and data such as financial information and passwords without permission and send them to the attacker. Visualization techniqu…
Android is the most popular mobile software platform across the globe. The worldwide app downloads reached 352.9 billion in 2021. However, it still faces serious security threats due to its open-so…
This research focuses on the utilization of Deep Learning techniques for malware detection and classification. By representing malware samples as grayscale images, a Deep Learning model based on Co…
Garba Rujukan Digital (GARUDA) merupakan salah satu e-library akademisi Indonesia yang memakai PDF sebagai ekstensi file. Dataset yang digunakan dalam penelitian ini berasal dari portal GARUDA deng…
K-Means clustering is a method to grouping data based on the similarity of features and detect the hidden patterns in dataset. The dataset is from GARUDA Repository which contains raw data of PDF f…
The amount of Malware is constantly increasing. Most Malware is a modification of previous Malware data. The datasets used from CIC-MalMem-2022 are Benign and Spyware-CWS. This study used the Naïv…
In the security sector, malware that specifically attacks smartphones is growing faster and more sophisticated. Malware is becoming more and more powerful in carrying out criminal acts, such as ste…
Portable Document Format (PDF) is a document exchange media that is very vulnerable to malicious attacks, namely Malware PDF. One of the services that most often use PDF files as a medium is a scie…
The Portable Document Format (PDF) is one of the most commonly used document reader formats, the object structure in PDF is flexible and easy to use. Therefore, that hackers use PDFs to carry out t…
Virus, trojan, dan semua komplotannya meupakan program jahat yang selalu mempunyai tujuan untuk menghancurkan, merusak data serta sistem komputer dan Android yang kita miliki. Virus tidak pernah p…
The internet is a liaison between one electronic media and other electronic media quickly and accurately in acommunication network. Where the communication network sends information that is transmi…
Visualization is a method used to represent data in the form of an image to display hidden information. The visualization in this study uses malware data to be converted into a grayscale image. Thi…
The development of technology triggers the development of malicious files called malware. Malware is software that is explicitly designed with the aim of finding weaknesses or even damaging softwar…
Slow http dos attack is one of the DoS attack methods targeting HTTP servers. This method hampers the service by flooding it causing a pool of connections with slow and heavy requests to the web se…
Malware adalah sebuah perangkat lunak yang dibuat dengan tujuan memasuki dan terkadang merusak sistem komputer, jaringan, ataupun server tanpa diketahui oleh pemiliknya, Ransomware merupakan jenis …
Serangan SQL Injection dan XSS adalah salah satu contoh serangan kerentanan yang ada di aplikasi web. Serangan SQL Injection adalah salah satu dari lima teratas dalam semua risiko keamanan aplikasi…
Distributed Denial of Service (DDoS) merupakan serangan yang dapat mengganggu lalu lintas sebuah jaringan dengan memanfaatkan mesin zombie yang dikendalikan oleh penyerang. Serangan HTTP Flood dila…
Reduksi dimensi sudah banyak dipakai berbagai penelitian didunia karena fungsinya yang baik dalam memperkecil data tanpa menghilangkan karakteristik dari data trsebut. Pada penelitian ini ingin mel…
RAMA repository merupakan tempat penyimpanan paparan hasil penelitian nasional baik berbentuk tugas akhir proyek mahasiswa (Diploma), skripsi (S1), tesis (S2), disertasi (S3) maupun laporan penelit…
Denial of Service (DoS) adalah teknik serangan yang sering dilakukan oleh attacker yang bertujuan untuk melumpuhkan kemampuan sistem. Serangan dari Denial of Service (DoS) merupakan ancaman yang se…
Pada beberapa tahun terakhir penelitian mengenai botnet telah banyak dilakukan, botnet merupakan salah satu jenis malware yang menyerang dengan cara mengambil alih sistem komputer yang terhubung ke…