Claim Missing Document
Check
Articles

Found 1 Documents
Search

Implementasi Fuzzy Hashing untuk Signature Malware Aditia Rinaldi
Ultima Computing : Jurnal Sistem Komputer Vol 6 No 1 (2014): Ultima Computing : Jurnal Sistem Komputer
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (625.12 KB) | DOI: 10.31937/sk.v6i1.293

Abstract

Cryptographic hash value has long been used as a database of signatures to identify malware. The most widely used is the MD5 and/or SHA256. In addition, there are fuzzy hashing that slightly different from the traditional hash: length hash value is not fixed and hash value can be used to calculate the degree of similarity of some malware that may still be a variant. This research use ssdeep tool to calculate fuzzy hash. Database signature with fuzzy hash is smaller than SHA256 and larger than MD5. The level of accuracy for the detection of script-based malware variants is greater than the executable-based malware variants. Index Terms—file signature, fuzzy hashing, malware signature, rolling hashing, sha