Analisis tren cyber attack pada media sosial twitter menggunakan k-means clustering

Yuslianto, Kevin (2022) Analisis tren cyber attack pada media sosial twitter menggunakan k-means clustering. Bachelor thesis, Universitas Pelita Harapan.

[img]
Preview
Text (Title)
Title.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (35kB) | Preview
[img]
Preview
Text (Abstract)
Abstract.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (111kB) | Preview
[img]
Preview
Text (ToC)
ToC.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (311kB) | Preview
[img]
Preview
Text (Chapter1)
Chapter1.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (165kB) | Preview
[img] Text (Chapter2)
Chapter2.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (1MB)
[img] Text (Chapter3)
Chapter3.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (1MB)
[img] Text (Chapter4)
Chapter4.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (1MB)
[img] Text (Chapter5)
Chapter5.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (110kB)
[img]
Preview
Text (Bibliography)
Bibliography.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (137kB) | Preview
[img] Text (Appendices)
Appendices.pdf
Restricted to Repository staff only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (494kB)

Abstract

Information about cyber attacks can be found on social media such as Twitter. This information can be analyzed to determine trends in cyber attacks. Due to the large quantity of information on Twitter, manual analysis takes time and effort. To perform the analysis, a program was built using web scraping techniques and the K-Means Clustering algorithm. The program is able to perform web scraping with an average speed of 1300 tweets per second. The results of web scraping were analyzed using the program and produced three topics that could be determined as trends. Total of 161.115 tweet were obtained using this techniques. The data was taken in the time period between 1 September 2021 and 30 November 2021 with the tags cyberattack, cyberattacks, and cybernews./ Informasi mengenai serangan siber dapat ditemukan pada sosial media seperti Twitter. Informasi tersebut dapat dianalisis untuk menentukan tren serangan siber. Karena banyaknya kuantitas informasi pada Twitter, analisis secara manual membutuhkan waktu dan usaha. Untuk melakukan analisis, sebuah program dibangun dengan memanfaatkan teknik web scraping dan algoritme K-Means Clustering. Program tersebut dapat melakukan web scraping dengan kecepatan rata-rata 1300 tweet per detik. Hasil web scraping dianalisis menggunakan program dan menghasilkan tiga topik yang dapat ditentukan sebagai tren. Tweet yang didapatkan menggunakan web scraping adalah 161.115 tweet. Data tersebut diambil pada periode waktu 1 September 2021 - 30 November 2021 dengan tag “cyberattack”, “cyberattacks”, dan “cybernews”.

Item Type: Thesis (Bachelor)
Creators:
CreatorsNIMEmail
Yuslianto, KevinNIM03082180008kevinyusyus@gmail.com
Contributors:
ContributionContributorsNIDN/NIDKEmail
Thesis advisorChandra, WenripinNIDN0116088001wenripin@lecturer.uph.edu
Uncontrolled Keywords: text clustering; web scraping; k-means clustering; topik; tren
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: University Subject > Current > Faculty/School - UPH Medan > School of Information Science and Technology > Informatics
Current > Faculty/School - UPH Medan > School of Information Science and Technology > Informatics
Depositing User: Users 24131 not found.
Date Deposited: 16 Aug 2022 04:57
Last Modified: 28 Sep 2022 10:09
URI: http://repository.uph.edu/id/eprint/49628

Actions (login required)

View Item View Item