Jurnal ULTIMA Computing
Vol 6 No 1 (2014): Ultima Computing : Jurnal Sistem Komputer

Implementasi Fuzzy Hashing untuk Signature Malware

Aditia Rinaldi (Unknown)



Article Info

Publish Date
01 Jun 2014

Abstract

Cryptographic hash value has long been used as a database of signatures to identify malware. The most widely used is the MD5 and/or SHA256. In addition, there are fuzzy hashing that slightly different from the traditional hash: length hash value is not fixed and hash value can be used to calculate the degree of similarity of some malware that may still be a variant. This research use ssdeep tool to calculate fuzzy hash. Database signature with fuzzy hash is smaller than SHA256 and larger than MD5. The level of accuracy for the detection of script-based malware variants is greater than the executable-based malware variants. Index Terms—file signature, fuzzy hashing, malware signature, rolling hashing, sha

Copyrights © 2014






Journal Info

Abbrev

SK

Publisher

Subject

Computer Science & IT Control & Systems Engineering Engineering

Description

urnal ULTIMA Computing merupakan Jurnal Program Studi Sistem Komputer Universitas Multimedia Nusantara yang menyajikan artikel-artikel penelitian ilmiah dalam bidang Sistem Komputer serta isu-isu teoritis dan praktis yang terkini, mencakup komputasi, organisasi dan arsitektur komputer, programming, ...