Deteksi Malware Android Menggunakan Pengklasifikasi Pembelajaran Mesin Paralel

Authors

  • Mukhamad Rafi Galih Saputro Telkom University
  • Setyorini Setyorini Telkom University
  • Siti Amatullah Karimah Telkom University

Abstract

Abstrak — Perkembangan android semakin pesat, sehingga mendorong pertumbuhan malware android. Data malware android memiliki dimensi tinggi, dibutuhkan algoritme untuk melakukan deteksi. Support Vector Machine (SVM) adalah algoritme pembelajaran mesin yang cocok untuk data malware android. Namun SVM memiliki keterbatasan dari segi waktu komputasi untuk data dalam jumlah besar, karena membutuhkan solusi dari masalah pengoptimalan Quadratic Programming (QP). Penelitian ini mengusulkan Parallel Support Vector Machine (PSVM) dengan metode dekomposisi Sequential Minimal Optimization (SMO) untuk melakukan deteksi atau klasifikasi malware android menggunakan dataset DREBIN. algoritme SMO yang dijamin memecahkan QP, dengan menggunakan teknik dekomposisi yaitu mendistribusikan tugas ke beberapa prosesor untuk dieksekusi secara paralel. Evaluasi berdasarkan kinerja perbandingan model Parallel SVM-SMO 4 dekomposisi dan Non-Parallel SVM-SMO dengan analisis fitur menggunakan Correlation Coefficient. Pada pengujian metrik performa dan akurasi fitur paling optimal 14 fitur dengan rata-rata akurasi 78%. Pada pengujian kinerja model, fitur paling optimal 27 fitur dengan rata-rata percepatan 9.58 dan efisiensi 2.39 pada kernel linier.

Kata Kunci— DREBIN, SVM, PSVM, SMO, Dekomposisi, Koefisien Korelasi

References

REFERENSI

A. Haleem, M. Javaid, R. Singh, S. Rab, and R. Suman,

0 Era: A Review based Framework,= Industrial Robot,

vol. ahead-of-print, Dec. 2022, doi: 10.1108/IR-10-2021-

Statcounter Global Stats.= https://gs.statcounter.com/osmarket-share/mobile/worldwide/#monthly-202112-202212

(accessed Dec. 23, 2022).

S. Y. Yerima and S. Sezer,

Multilevel Classifier Fusion Approach for Android

Malware Detection,= IEEE Trans Cybern, vol. 49, no. 2,

pp. 453-466, Jan. 2018, doi: 10.1109/tcyb.2017.2777960.

S. Tavara,

A survey,= ACM Computing Surveys, vol. 51, no. 6.

Association for Computing Machinery, Jan. 01, 2019. doi:

1145/3280989.

L. Zanni, S. T. It, and G. Z. It,

Training Large Scale Support Vector Machines on

Multiprocessor Systems * Thomas Serafini Gaetano

Zanghirati,= 2006. [Online]. Available:

http://www.dm.unife/gpdt.

M. O. Stitson, J. A. E. Weston, A. Gammerman, V. Vovk,

and V. Vapnik,

D. A. Pisner and D. M. Schnyer,

machine,= in Machine Learning: Methods and Applications

to Brain Disorders, Elsevier, 2019, pp. 101-121. doi:

1016/B978-0-12-815739-8.00006-7.

H. Han, S. Lim, K. Suh, S. Park, S. J. Cho, and M. Park,

machine learning approach,= in Proceedings - 2020 IEEE

International Conference on Big Data and Smart

Computing, BigComp 2020, Feb. 2020, pp. 75-81. doi:

1109/BigComp48618.2020.00-96.

A. Muzaffar, H. Ragab Hassen, M. A. Lones, and H.

Zantout,

Android malware detection,= Computers and Security, vol.

Elsevier Ltd, Oct. 01, 2022. doi:

1016/j.cose.2022.102833.

J. Khalilzadeh and A. D. A. Tasci,

significance level, and the effect size: Solutions to perils of

using big data for academic research,= Tour Manag, vol.

, pp. 89-96, Oct. 2017, doi:

1016/j.tourman.2017.03.026.

J. C. Platt,

Algorithm for Training Support Vector Machines,= 1998.

E. A. Carmona and M. D. Rice,

PARALLEL PERFORMANCE.=

N. Shehab, M. Badawy, and H. A. Ali,

selection in big data preprocessing based on hybrid cloud

based model,= Journal of Supercomputing, vol. 78, no. 3,

pp. 3226-3265, Feb. 2022, doi: 10.1007/s11227-021-

-7.

F. Idrees, M. Rajarajan, M. Conti, T. M. Chen, and Y.

Rahulamathavan,

detection system using ensemble learning methods,=

Comput Secur, vol. 68, pp. 36-46, Jul. 2017, doi:

1016/j.cose.2017.03.011.

K. Deepa, G. Radhamani, and P. Vinod,

feature selection methods for android malware analysis,= in

Procedia Computer Science, 2015, vol. 46, pp. 841-848.

doi: 10.1016/j.procs.2015.02.153.

P.-H. Chen, R.-E. Fan, and C.-J. Lin,

Machines,= 2006.

R. R. Prasojoe and S. Setyorini,

Test with SMO Decomposition on Cancer Microarray

Dataset,= in 2021 9th International Conference on

Information and Communication Technology (ICoICT),

, pp. 467-471. doi:

1109/ICoICT52021.2021.9527411.

S. Y. Vali and J. M. Sudha,

IJARET_11_11_157 Android Application In

Smartphones,= International Journal of Advanced

Research in Engineering and Technology (IJARET), vol.

, no. 11, pp. 1678-1693, 2020, doi:

34218/IJARET.11.11.2020.157.

Ken. Dunham, Mobile malware attacks and defense.

Syngress/Elsevier, 2009.

B. Scholkopf and A. J. Smola, Learning with kernels:

support vector machines, regularization, optimization, and

beyond. MIT press, 2018.

G. R. Andrews, Foundations of multithreaded, parallel,

and distributed programming. Addison-Wesley, 2020.

S. S. Keerthi, S. K. Shevade, C. Bhattacharyya, and K. R.

K. Murthy,

SVM Classifier Design.=

S. Visa, B. Ramsay, A. Ralescu, and E. van der Knaap,

Y. Sasaki and R. Fellow,

V. Kouliaridis, G. Kambourakis, and T. Peng,

importance in Android malware detection=, doi:

1109/TrustCom50675.2020.00195/20/$31.00.

A. N. Ulfah, M. Khairul Anam, N. Yona, S. Munti, S.

Yaakub, and M. B. Firdaus,

Convict Assimilation Program on Handling Covid-19,=

http://research.microsoft.com/

Downloads

Published

2023-11-01

Issue

Section

Program Studi S1 Informatika