Implementasi Fuzzy Hashing untuk Signature Malware

ULTIMA Computing

View Publication Info
 
 
Field Value
 
Title Implementasi Fuzzy Hashing untuk Signature Malware
 
Creator Rinaldi, Aditia
 
Description Cryptographic hash value has long been used as a database of signatures to identify malware. The most widely used is the MD5 and/or SHA256. In addition, there are fuzzy hashing that slightly different from the traditional hash: length hash value is not fixed and hash value can be used to calculate the degree of similarity of some malware that may still be a variant. This research use ssdeep tool to calculate fuzzy hash. Database signature with fuzzy hash is smaller than SHA256 and larger than MD5. The level of accuracy for the detection of script-based malware variants is greater than the executable-based malware variants.
 
Publisher Jurnal Sistem Komputer
ULTIMA Computing
 
Contributor
 
Date 2014-06-01
 
Type info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Artikel yang dipeer-review
 
Format application/pdf
 
Identifier http://ejournals.umn.ac.id/index.php/SK/article/view/293
 
Source Jurnal Sistem Komputer; Vol 6, No 1 (2014): Ultima Computing
ULTIMA Computing; Vol 6, No 1 (2014): Ultima Computing
2549-4007
2355-3286
 
Language ind
 
Relation http://ejournals.umn.ac.id/index.php/SK/article/view/293/259
 
Rights ##submission.copyrightStatement##
 

Contact Us

The PKP Index is an initiative of the Public Knowledge Project.

For PKP Publishing Services please use the PKP|PS contact form.

For support with PKP software we encourage users to consult our wiki for documentation and search our support forums.

For any other correspondence feel free to contact us using the PKP contact form.

Find Us

Twitter

Copyright © 2015-2018 Simon Fraser University Library