Uniform Resource Locator (URL) Detection Security System Based on Android

Haruno Sajati, Harliyus Agustian, Eko Murdiansyah

Submitted : 2018-08-23, Published : 2019-02-18.


The use of the internet, which is currently increasing dramatically, certainly brings the convenience of finding information. The increase in internet usage also eventually gave rise to cybercrime crimes, one of which was by spreading a URL or fake site to steal someone's personal data. The research done is how to build an Android-based application that can detect the security of a URL. The goal is that internet users, especially social media, can avoid cybercrime crime that wants to steal personal data. Making an application uses the Regular Expression method to analyze each line of the Webpage Source Code in the URL based on 8 criteria taken from the World Wide Web Consortium (W3C). The application was then tested with 10 phishing-charged URLs and compared with Kaspersky, McAfee, and AdBlock applications. Based on the results of trials and comparisons, applications that have been made are able to detect 6 or 60% of the 10 URLs. Kaspersky and McAfee applications can detect 70%, while AdBlock only detects 3 or 30% of 10 URLs that contain phishing.


Internet, Cybercrime, URL


Alkhozae, M. G., & Batarfi, O. A. (2011). Phishing websites detection based on phishing characteristics in the webpage source code. International Journal of Information and Communication Technology Research, 1(6).

Mohammad, R. M., Thabtah, F., & McCluskey, L. (2014). Intelligent rule-based phishing websites classification. IET Information Security, 8(3), 153-160.

Horton, J. (2015). Android Programming for Beginners. Packt Publishing Ltd.

Kuchling, A. M. (2014). Regular Expression HOWTO. Regular Expression HOWTO—Python, 2(10).

Sudaryanto, S. (2018, November). Implementation Port Security for Security Systems Network at the Computing Laboratory of Adisutjipto College of Technology. In Conference SENATIK STT Adisutjipto Yogyakarta (Vol. 4).

Setiawan, Y., Sajati, H., & Sudibya, B. (2013). Perancangan Keamanan Sistem Menggunakan Algoritma Honeypot pada Aplikasi Krs Online (Studi Kasus: Sekolah Tinggi Teknologi Adisutjipto). Compiler, 2(2).

Zonggonau, K., & Sajati, H. (2015). Membangun Sistem Keamanan Arp Spoofing Memanfaatkan Arpwatch dan Addons Firefox. Compiler, 4(1).

Hamka, C. A., Sajati, H., & Indrianingsih, Y. (2014). Sistem Keamanan Jail Bash Untuk Mengamankan Akun Legal Dari Kejahatan Internet MenggunakanThc-hydra. Compiler, 3(1).

Suhendar, A. S. S., Sajati, H., & Astuti, Y. (2013). Perancangan Algoritma Anggi (Aa) dengan Memanfaatkan Diffie-hellman dan Ronald Rivest(Rc4) untuk Membangun Sistem Keamanan Berbasis Port Knocking. Compiler,2(2).

Widodo, A. P., Sarwoko, E. A., Suharto, E., & Siahaan, J. F. O. (2016). PENGAMANAN DATA FOTO PADA PERANGKAT OS ANDROID MENGGUNAKAN TEKNIKKRIPTOGRAFI HILL CIPHER. JISKA (Jurnal Informatika Sunan Kalijaga), 1(2).

Rifa’i, A. F. (2016). Sistem Pendeteksi Dan Monitoring Kebocoran Gas(Liquefied Petrolum Gas) Berbasis Internet Of Things.

Article Metrics

Abstract view: 593 times
Download     : 229   times

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.


  • There are currently no refbacks.