Implementasi Fuzzy Hashing untuk Signature Malware

ULTIMA Computing

View Publication Info
Field Value
Title Implementasi Fuzzy Hashing untuk Signature Malware
Creator Rinaldi, Aditia
Description Cryptographic hash value has long been used as a database of signatures to identify malware. The most widely used is the MD5 and/or SHA256. In addition, there are fuzzy hashing that slightly different from the traditional hash: length hash value is not fixed and hash value can be used to calculate the degree of similarity of some malware that may still be a variant. This research use ssdeep tool to calculate fuzzy hash. Database signature with fuzzy hash is smaller than SHA256 and larger than MD5. The level of accuracy for the detection of script-based malware variants is greater than the executable-based malware variants.
Publisher Jurnal Sistem Komputer
ULTIMA Computing
Date 2014-06-01
Type info:eu-repo/semantics/article
Artikel yang dipeer-review
Format application/pdf
Source Jurnal Sistem Komputer; Vol 6, No 1 (2014): Ultima Computing
ULTIMA Computing; Vol 6, No 1 (2014): Ultima Computing
Language ind
Rights ##submission.copyrightStatement##

Contact Us

The PKP Index is an initiative of the Public Knowledge Project.

For PKP Publishing Services please use the PKP|PS contact form.

For support with PKP software we encourage users to consult our wiki for documentation and search our support forums.

For any other correspondence feel free to contact us using the PKP contact form.

Find Us


Copyright © 2015-2018 Simon Fraser University Library