Show simple item record

dc.contributor.advisorMushthofa
dc.contributor.authorSetiadipura, Chandra Wangsa
dc.date.accessioned2013-06-17T02:28:05Z
dc.date.available2013-06-17T02:28:05Z
dc.date.issued2013
dc.identifier.urihttp://repository.ipb.ac.id/handle/123456789/64110
dc.description.abstractAndroid is an operating system that is widely used in smartphone. The biggest threat in Android is the spread of malware that comes from Android application stores. Generally, malware use signature-based method which can be easily avoided by malware that has polymorphic capabilities. Thus, it requires more dynamic detection method. The purpose of this research is to see whether system calls can be used as features to detect Android malware and to test the accuracy of the Support Vector Machine (SVM) in classifying malware and non-malware applications using system call frequencies. The frequencies of system calls were obtained from the result of executing Android applications and unused system calls were excluded. After that, the Principal Component Analysis process was conducted to reduce the dimension and eliminate the irrelevant features. The use of Radial Basis Function kernel in SVM achieves 86.25% of malware classification while the polynomial kernel achieves 90% of malware classification.en
dc.subjectBogor Agricultural University (IPB)en
dc.subjectsystem callen
dc.subjectsvmen
dc.subjectmalwareen
dc.subjectandroiden
dc.titleDeteksi Malware Berbasis System Call dengan Klasifikasi Support Vector Machine pada Androiden


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record