Please use this identifier to cite or link to this item: http://repository.ipb.ac.id/handle/123456789/64110
Full metadata record
DC FieldValueLanguage
dc.contributor.advisorMushthofa
dc.contributor.authorSetiadipura, Chandra Wangsa
dc.date.accessioned2013-06-17T02:28:05Z
dc.date.available2013-06-17T02:28:05Z
dc.date.issued2013
dc.identifier.urihttp://repository.ipb.ac.id/handle/123456789/64110
dc.description.abstractAndroid is an operating system that is widely used in smartphone. The biggest threat in Android is the spread of malware that comes from Android application stores. Generally, malware use signature-based method which can be easily avoided by malware that has polymorphic capabilities. Thus, it requires more dynamic detection method. The purpose of this research is to see whether system calls can be used as features to detect Android malware and to test the accuracy of the Support Vector Machine (SVM) in classifying malware and non-malware applications using system call frequencies. The frequencies of system calls were obtained from the result of executing Android applications and unused system calls were excluded. After that, the Principal Component Analysis process was conducted to reduce the dimension and eliminate the irrelevant features. The use of Radial Basis Function kernel in SVM achieves 86.25% of malware classification while the polynomial kernel achieves 90% of malware classification.en
dc.subjectBogor Agricultural University (IPB)en
dc.subjectsystem callen
dc.subjectsvmen
dc.subjectmalwareen
dc.subjectandroiden
dc.titleDeteksi Malware Berbasis System Call dengan Klasifikasi Support Vector Machine pada Androiden
Appears in Collections:UT - Computer Science

Files in This Item:
File Description SizeFormat 
G13cws.pdf
  Restricted Access
full text3.39 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.