• Login
    View Item 
    •   USU-IR Home
    • Faculty of Computer Science and Information Technology
    • Department of Information Technology
    • Undergraduate Theses
    • View Item
    •   USU-IR Home
    • Faculty of Computer Science and Information Technology
    • Department of Information Technology
    • Undergraduate Theses
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Identifikasi Serangan Injeksi pada Website Berdasarkan Data Log Menggunakan Algoritma Support Vector Machine

    Website Injection Attack Identification from Log Data Using Support Vector Machine Algorithm

    Thumbnail
    View/Open
    Cover (521.9Kb)
    Fulltext (2.036Mb)
    Date
    2025
    Author
    Tobing, Karina Angela
    Advisor(s)
    Zendrato, Niskarto
    Muchtar, Muhammad Anggia
    Metadata
    Show full item record
    Abstract
    Injection attacks on websites, such as SQL Injection (SQLi) and Cross-Site Scripting (XSS), are dangerous threats to website application security. These attacks exploit vulnerabilities in website applications to inject malicious code that steals data or damages the system. One of the main challenges in detecting these attacks is the identification process, which requires a long time and is often done manually. Therefore, an approach is needed that can detect injection attacks on websites accurately and quickly. The aim of this research is to identify injection attacks on websites, particularly SQLi and XSS, using the Support Vector Machine (SVM) algorithm based on website server log data. The data used in this research was obtained from attack simulations using tools like SQLMap and XSSer, which were then processed to identify attack patterns. The methodology used includes feature extraction from URIs, as well as data processing using TF-IDF for text representation. The results of the research and testing show that the SVM model, combined with feature extraction, can classify attacks with accuracy of 93.7%. The developed system is implemented as a Flask-based website application that allows users to upload log files and receive interactive attack classification results. With this approach, attack detection can be performed automatically with adequate accuracy, reducing reliance on rule-based systems and improving effectiveness in detecting new attacks.
    URI
    https://repositori.usu.ac.id/handle/123456789/107110
    Collections
    • Undergraduate Theses [858]

    Repositori Institusi Universitas Sumatera Utara - 2025

    Universitas Sumatera Utara

    Perpustakaan

    Resource Guide

    Katalog Perpustakaan

    Journal Elektronik Berlangganan

    Buku Elektronik Berlangganan

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV
     

     

    Browse

    All of USU-IRCommunities & CollectionsBy Issue DateTitlesAuthorsAdvisorsKeywordsTypesBy Submit DateThis CollectionBy Issue DateTitlesAuthorsAdvisorsKeywordsTypesBy Submit Date

    My Account

    LoginRegister

    Repositori Institusi Universitas Sumatera Utara - 2025

    Universitas Sumatera Utara

    Perpustakaan

    Resource Guide

    Katalog Perpustakaan

    Journal Elektronik Berlangganan

    Buku Elektronik Berlangganan

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV