{"id":1098,"date":"2025-04-29T08:52:36","date_gmt":"2025-04-29T08:52:36","guid":{"rendered":"https:\/\/online.binus.ac.id\/computer-science\/?p=1098"},"modified":"2025-04-30T07:26:26","modified_gmt":"2025-04-30T07:26:26","slug":"melindungi-dunia-digital-klasifikasi-malware-dengan-machine-learning","status":"publish","type":"post","link":"https:\/\/online.binus.ac.id\/computer-science\/2025\/04\/29\/melindungi-dunia-digital-klasifikasi-malware-dengan-machine-learning\/","title":{"rendered":"Melindungi Dunia Digital: Klasifikasi Malware dengan Machine Learning"},"content":{"rendered":"<p class=\"\" data-start=\"219\" data-end=\"272\">Oleh: <strong data-start=\"228\" data-end=\"272\">Muhammad Fitra Kacamarga, S.Kom., M.T.I. (Faculty Member PJJ CS)<\/strong><\/p>\n<p class=\"\" data-start=\"279\" data-end=\"547\">Serangan malware kini bukan lagi ancaman kecil\u2014dampaknya bisa melumpuhkan perusahaan, mencuri data, hingga membahayakan keamanan pribadi. Metode tradisional untuk mendeteksi malware sering kali lambat dan kurang efektif untuk menghadapi serangan yang semakin canggih.<\/p>\n<p data-start=\"279\" data-end=\"547\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1101\" src=\"https:\/\/online.binus.ac.id\/computer-science\/wp-content\/uploads\/sites\/4\/2025\/04\/Fitra-3Poster-scaled.jpg\" alt=\"\" width=\"1920\" height=\"2716\" srcset=\"https:\/\/online.binus.ac.id\/computer-science\/wp-content\/uploads\/sites\/4\/2025\/04\/Fitra-3Poster-scaled.jpg 1920w, https:\/\/online.binus.ac.id\/computer-science\/wp-content\/uploads\/sites\/4\/2025\/04\/Fitra-3Poster-212x300.jpg 212w, https:\/\/online.binus.ac.id\/computer-science\/wp-content\/uploads\/sites\/4\/2025\/04\/Fitra-3Poster-724x1024.jpg 724w, https:\/\/online.binus.ac.id\/computer-science\/wp-content\/uploads\/sites\/4\/2025\/04\/Fitra-3Poster-768x1086.jpg 768w, https:\/\/online.binus.ac.id\/computer-science\/wp-content\/uploads\/sites\/4\/2025\/04\/Fitra-3Poster-1086x1536.jpg 1086w, https:\/\/online.binus.ac.id\/computer-science\/wp-content\/uploads\/sites\/4\/2025\/04\/Fitra-3Poster-1448x2048.jpg 1448w, https:\/\/online.binus.ac.id\/computer-science\/wp-content\/uploads\/sites\/4\/2025\/04\/Fitra-3Poster-480x679.jpg 480w, https:\/\/online.binus.ac.id\/computer-science\/wp-content\/uploads\/sites\/4\/2025\/04\/Fitra-3Poster-1024x1448.jpg 1024w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\" \/><\/p>\n<p class=\"\" data-start=\"549\" data-end=\"618\">Lalu bagaimana caranya melawan malware dengan lebih cepat dan akurat?<\/p>\n<p class=\"\" data-start=\"620\" data-end=\"685\">Jawabannya: <strong data-start=\"632\" data-end=\"685\">menggunakan kecerdasan buatan (machine learning).<\/strong><\/p>\n<h3 class=\"\" data-start=\"692\" data-end=\"761\">\ud83e\udd16 Riset Inovatif: Mengenal ANN dan XGBoost untuk Deteksi Malware<\/h3>\n<p class=\"\" data-start=\"763\" data-end=\"879\">Dalam riset ini, kami mengembangkan sistem klasifikasi malware berbasis machine learning menggunakan dua pendekatan:<\/p>\n<ul data-start=\"881\" data-end=\"962\">\n<li class=\"\" data-start=\"881\" data-end=\"920\">\n<p class=\"\" data-start=\"883\" data-end=\"920\"><strong data-start=\"883\" data-end=\"918\">Artificial Neural Network (ANN)<\/strong><\/p>\n<\/li>\n<li class=\"\" data-start=\"921\" data-end=\"962\">\n<p class=\"\" data-start=\"923\" data-end=\"962\"><strong data-start=\"923\" data-end=\"962\">XGBoost (Extreme Gradient Boosting)<\/strong><\/p>\n<\/li>\n<\/ul>\n<p class=\"\" data-start=\"964\" data-end=\"1099\">Tujuan utamanya adalah membangun sistem yang <strong data-start=\"1009\" data-end=\"1020\">efisien<\/strong>, <strong data-start=\"1022\" data-end=\"1032\">akurat<\/strong>, dan <strong data-start=\"1038\" data-end=\"1066\">dapat mendeteksi malware<\/strong> hanya dari data memori komputer.<\/p>\n<h3 class=\"\" data-start=\"1106\" data-end=\"1148\">\ud83d\udcc2 Bagaimana Penelitian Ini Dilakukan?<\/h3>\n<ol data-start=\"1150\" data-end=\"1631\">\n<li class=\"\" data-start=\"1150\" data-end=\"1297\">\n<p class=\"\" data-start=\"1153\" data-end=\"1297\"><strong data-start=\"1153\" data-end=\"1174\">Data Preparation:<\/strong><br data-start=\"1174\" data-end=\"1177\" \/>Dataset diambil dari CIC-MalMem-2022, berisi berbagai jenis malware seperti Trojan Horse, Spyware, hingga Ransomware.<\/p>\n<\/li>\n<li class=\"\" data-start=\"1299\" data-end=\"1463\">\n<p class=\"\" data-start=\"1302\" data-end=\"1463\"><strong data-start=\"1302\" data-end=\"1320\">Preprocessing:<\/strong><br data-start=\"1320\" data-end=\"1323\" \/>Data dibersihkan menggunakan Python untuk menghapus data kosong, mengkategorikan label, dan menyeimbangkan jumlah malware vs data normal.<\/p>\n<\/li>\n<li class=\"\" data-start=\"1465\" data-end=\"1631\">\n<p class=\"\" data-start=\"1468\" data-end=\"1631\"><strong data-start=\"1468\" data-end=\"1487\">Model Training:<\/strong><br data-start=\"1487\" data-end=\"1490\" \/>Data dibagi menjadi data latih dan data uji. Model ANN dan XGBoost dilatih menggunakan berbagai proporsi data untuk mencari hasil terbaik.<\/p>\n<\/li>\n<\/ol>\n<h3 class=\"\" data-start=\"1638\" data-end=\"1667\">\ud83d\udcca Hasil yang Mengejutkan<\/h3>\n<ul data-start=\"1669\" data-end=\"1990\">\n<li class=\"\" data-start=\"1669\" data-end=\"1767\">\n<p class=\"\" data-start=\"1671\" data-end=\"1767\"><strong data-start=\"1671\" data-end=\"1684\">Model ANN<\/strong> mencapai akurasi hingga <strong data-start=\"1709\" data-end=\"1719\">99,49%<\/strong> untuk data latih dan <strong data-start=\"1741\" data-end=\"1751\">99,58%<\/strong> untuk data uji.<\/p>\n<\/li>\n<li class=\"\" data-start=\"1768\" data-end=\"1883\">\n<p class=\"\" data-start=\"1770\" data-end=\"1883\"><strong data-start=\"1770\" data-end=\"1787\">Model XGBoost<\/strong> sedikit lebih unggul, dengan akurasi <strong data-start=\"1825\" data-end=\"1835\">99,63%<\/strong> untuk data latih dan <strong data-start=\"1857\" data-end=\"1867\">99,68%<\/strong> untuk data uji.<\/p>\n<\/li>\n<li class=\"\" data-start=\"1884\" data-end=\"1990\">\n<p class=\"\" data-start=\"1886\" data-end=\"1990\">Kedua model ini mampu <strong data-start=\"1908\" data-end=\"1957\">mendeteksi malware dengan presisi hingga 100%<\/strong> pada kondisi pengujian tertentu.<\/p>\n<\/li>\n<\/ul>\n<p class=\"\" data-start=\"1992\" data-end=\"2156\">Hasil ini membuktikan bahwa penerapan machine learning dapat menjadi senjata ampuh untuk mengidentifikasi malware lebih cepat dan akurat dibandingkan metode manual.<\/p>\n<h3 class=\"\" data-start=\"2163\" data-end=\"2180\">\ud83d\udd25 Kesimpulan<\/h3>\n<p class=\"\" data-start=\"2182\" data-end=\"2472\">Dengan meningkatnya serangan malware setiap tahun, penggunaan machine learning menjadi <strong data-start=\"2269\" data-end=\"2290\">solusi masa depan<\/strong> untuk pertahanan dunia digital.<br data-start=\"2322\" data-end=\"2325\" \/>Penelitian ini menunjukkan bahwa baik ANN maupun XGBoost mampu meminimalkan kesalahan deteksi dan memaksimalkan kecepatan dalam mendeteksi ancaman.<\/p>\n<p class=\"\" data-start=\"2479\" data-end=\"2636\">\ud83d\udccc <em data-start=\"2482\" data-end=\"2636\">Dengan teknologi ini, langkah-langkah pencegahan serangan siber bisa dilakukan lebih proaktif, melindungi data dan sistem yang kita gunakan setiap hari.<\/em><\/p>\n<div>\n<p>Sumber: Penelitian Dosen dan Mahasiswa PJJ CS<\/p>\n<p>Editor: Pandu Dwi Luhur Pambudi, S.Kom., M.Kom., M.I.M<\/p>\n<\/div>\n<h3>#BINUSRESEARCHPOINT #TEKNIKINFORMATIKA #COMPUTERSCIENCE #BINUS #BINUSUNIVERSITY<\/h3>\n","protected":false},"excerpt":{"rendered":"<p>Oleh: Muhammad Fitra Kacamarga, S.Kom., M.T.I. (Faculty Member PJJ CS) Serangan malware kini bukan lagi ancaman kecil\u2014dampaknya bisa melumpuhkan perusahaan, mencuri data, hingga membahayakan keamanan pribadi. Metode tradisional untuk mendeteksi malware sering kali lambat dan kurang efektif untuk menghadapi serangan yang semakin canggih. Lalu bagaimana caranya melawan malware dengan lebih cepat dan akurat? Jawabannya: menggunakan [&hellip;]<\/p>\n","protected":false},"author":702,"featured_media":1101,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[16],"class_list":["post-1098","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-article","tag-binusresearchpoint-teknikinformatika-computerscience-binus-binusuniversity"],"_links":{"self":[{"href":"https:\/\/online.binus.ac.id\/computer-science\/wp-json\/wp\/v2\/posts\/1098","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/online.binus.ac.id\/computer-science\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/online.binus.ac.id\/computer-science\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/online.binus.ac.id\/computer-science\/wp-json\/wp\/v2\/users\/702"}],"replies":[{"embeddable":true,"href":"https:\/\/online.binus.ac.id\/computer-science\/wp-json\/wp\/v2\/comments?post=1098"}],"version-history":[{"count":3,"href":"https:\/\/online.binus.ac.id\/computer-science\/wp-json\/wp\/v2\/posts\/1098\/revisions"}],"predecessor-version":[{"id":1106,"href":"https:\/\/online.binus.ac.id\/computer-science\/wp-json\/wp\/v2\/posts\/1098\/revisions\/1106"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/online.binus.ac.id\/computer-science\/wp-json\/wp\/v2\/media\/1101"}],"wp:attachment":[{"href":"https:\/\/online.binus.ac.id\/computer-science\/wp-json\/wp\/v2\/media?parent=1098"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/online.binus.ac.id\/computer-science\/wp-json\/wp\/v2\/categories?post=1098"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/online.binus.ac.id\/computer-science\/wp-json\/wp\/v2\/tags?post=1098"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}