Komparasi Algoritma Neural Network dan K-Nearest Neighbor Dalam Mendeteksi Malware Android
Abstract
The report from the State Cyber and Cryptography Agency (BSSN) recorded approximately 100 million cases of cyber attacks in Indonesia until April 2022, with ransomware and malware being the most commonly detected types of attacks. In this context, the increasingly sophisticated and hard-to-detect Android malware poses a serious threat, especially with successful penetrations into the Google Play Store. Therefore, early detection of Android malware is crucial. This research aims to compare the performance of two machine learning algorithms, Neural Network and K-Nearest Neighbors (KNN), in detecting malware on the Android platform. The dataset has been processed and divided into training and testing data. Both algorithms are trained using the training data, and their results are validated and evaluated. The research findings show that Neural Network achieves the best performance with an accuracy of 97%, precision of 97%, recall of 97%, and F1-score of 97%. Meanwhile, KNN performs slightly lower with an accuracy of 95%, precision of 96%, recall of 95%, and F1-score of 95%. In conclusion, Neural Network outperforms KNN in detecting Android malware based on accuracy and classification consistency. Further research suggestions involve the use of other algorithms, broader and more representative datasets, as well as the addition of features and parameter optimization. This research contributes to the development of accurate and effective solutions for detecting and identifying potentially harmful Android applications
Downloads
References
R. B. Hadiprakoso, W. R. Aditya, F. N. Pramitha, and P. Siber, “Analisis Statis Deteksi Malware Android Menggunakan Algoritma Supervised Machine Learning,” vol. 5, no. 1, pp. 1–5, 2022.
S. Mardiyati and L. Ariyani, “Perancangan Aplikasi Security Lock Berbasis Android,” JUST IT J. Sist. Informasi, Teknol. Inf. dan Komput., vol. 11, no. 2, p. 18, 2021, doi: 10.24853/justit.11.2.18-24.
B. Prasetyo, V. Suryani, and D. R. Anbiya, “Analisis Deteksi Malware pada Aplikasi Android Fintech berdasarkan Permissions dengan menggunakan Naive Bayes dan Random Forest,” vol. 8, no. 5, pp. 9885–9897, 2021.
CNN INDONESIA, “BSSN Ungkap Ransomware Dominasi Serangan Siber di Indonesia,” 2023. https://www.cnnindonesia.com/teknologi/20230220152846-192-915441/bssn-ungkap-ransomware-dominasi-serangan-siber-di-indonesia (accessed Apr. 09, 2023).
C. Chazar and B. Erawan, “Machine Learning Diagnosis Kanker Payudara Menggunakan Algoritma Support Vector Machine,” Inf. (Jurnal Inform. dan Sist. Informasi), vol. 12, no. 1, pp. 67–80, 2020, doi: 10.37424/informasi.v12i1.48.
A. Roihan, P. A. Sunarya, and A. S. Rafika, “Pemanfaatan Machine Learning dalam Berbagai Bidang: Review paper,” IJCIT (Indonesian J. Comput. Inf. Technol., vol. 5, no. 1, pp. 75–82, 2020, doi: 10.31294/ijcit.v5i1.7951.
R. K. Mariette Awad, Efficient Learning Machines. Apress Berkeley, CA, 2015.
M. K. Alzaylaee, S. Y. Yerima, and S. Sezer, “DL-Droid: Deep learning based android malware detection using real devices,” Comput. Secur., vol. 89, 2020, doi: 10.1016/j.cose.2019.101663.
D. Diana, R. E. Indrajit, and E. Dazki, “Komparasi Algoritma Naïve Bayes, Logistic Regression Dan Support Vector Machine pada Klasifikasi File Application Package Kit Android Malware,” Jutisi J. Ilm. Tek. Inform. dan Sist. Inf., vol. 11, no. 1, p. 109, 2022, doi: 10.35889/jutisi.v11i1.815.
R. B. Hadiprakoso, N. Qomariasih, and R. N. Yasa, “Identifikasi Malware Android Menggunakan Pendekatan Analisis Hibrid Dengan Deep Learning,” J. Teknol. Inf. Univ. Lambung Mangkurat, vol. 6, no. 2, pp. 77–84, 2021, doi: 10.20527/jtiulm.v6i2.82.
Y. W. Sitorus, P. Sukarno, and S. Mandala, “Analisis Deteksi Malware Android menggunakan metode Support Vector Machine & Random Forest,” e-Proceeding Eng., vol. 8, no. 6, pp. 12500–12518, 2021.
Nursobah, S. Lailiyah, B. Harpad, and M. Fahmi, “Penerapan Data Mining Untuk Prediksi Perkiraan Hujan dengan Menggunakan Algoritma K-Nearest Neighbor,” Build. Informatics, Technol. Sci., vol. 4, no. 3, pp. 1395–1400, 2022, doi: 10.47065/bits.v4i3.2564.
A. Mahindru, “Android permissions dataset,” Data Mendeley, 2020. https://data.mendeley.com/datasets/b4mxg7ydb7/2 (accessed Apr. 04, 2023).
N. Hadianto, H. B. Novitasari, and A. Rahmawati, “Klasifikasi Peminjaman Nasabah Bank Menggunakan Metode Neural Network,” J. Pilar Nusa Mandiri, vol. 15, no. 2, pp. 163–170, 2019, doi: 10.33480/pilar.v15i2.658.
B. Mehlig, Machine Learning with Neural Networks. https://arxiv.org/abs/1901.05639, 2021.
P. A. Nugroho, I. Fenriana, and R. Arijanto, “Implementasi Deep Learning Menggunakan Convolutional Neural Network ( Cnn ) Pada Ekspresi Manusia,” Algor, vol. 2, no. 1, pp. 12–21, 2020.
A. Antoni, T. Rohana, and A. R. Pratama, “Implementasi Algoritma Convolutional Neural Network Untuk Klasifikasi Citra Kemasan Kardus Defect dan No Defect,” vol. 4, no. 4, pp. 1941–1950, 2023, doi: 10.47065/bits.v4i4.3270.
F. P. Rachman, “Perbandingan Model Deep Learning untuk Klasifikasi Sentiment Analysis dengan Teknik Natural Languange Processing,” J. Teknol. dan Manaj. Inform., vol. 7, no. 2, pp. 113–121, 2021, doi: 10.26905/jtmi.v7i2.6506.
V. Alvian, D. Hidayatullah, A. Nilogiri, H. Azizah, and A. Faruq, “Klasifikasi Siswa Berprestasi Menggunakan Metode K-Nearest Neighbor (KNN) Pada SMA Negeri 2 Situbondo Classification Of Achieving Students Using K-Nearest Neighbor (KNN) Method At SMA Negeri 2 Situbondo,” J. Smart Teknol., vol. 3, no. 6, pp. 2774–1702, 2022, [Online]. Available: http://jurnal.unmuhjember.ac.id/index.php/JST.
A. R. Yogaswara, “Klasifikasi Malware Family menggunakan Metode k-Nearest Neighbor (k-NN),” J. Repos., vol. 3, no. 3, pp. 319–323, 2021, doi: 10.22219/repositor.v2i3.1313.
P. Putra, A. M. H. Pardede, and S. Syahputra, “Analisis Metode K-Nearest Neighbour (Knn) Dalam Klasifikasi Data Iris Bunga,” J. Tek. Inform. Kaputama, vol. 6, no. 1, pp. 297–305, 2022.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Komparasi Algoritma Neural Network dan K-Nearest Neighbor Dalam Mendeteksi Malware Android
Pages: 191−199
Copyright (c) 2023 Andi Ramadhan, Lindawati, Martinus Mujur Rose

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).





















