ANALISA INTRUSION DETECTION SYSTEM DENGAN METODE ANOMALY BASED TERHADAP SERANGAN SIBER
Intrusion Detection System is a system that conducts surveillance of network traffic and against suspicious or harmful activities in the network system. To know the effectiveness of using the Intrusion Detection System against cyberattacks, it is necessary to know how the IDS can detect the presence...
Saved in:
Main Author: | |
---|---|
Format: | Book |
Published: |
2021-08-10.
|
Subjects: | |
Online Access: | Link Metadata |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Intrusion Detection System is a system that conducts surveillance of network traffic and against suspicious or harmful activities in the network system. To know the effectiveness of using the Intrusion Detection System against cyberattacks, it is necessary to know how the IDS can detect the presence of an attack. One of IDS detection techniques is anomaly detection. This technique involves the traffic pattern of an attack being carried out by an attacker by comparing the activities being monitored with normal activities to detect any irregularities. Based on the results of the study Intrusion detection system can detect 72 out of 175 attacks. That's because anomaly detection requires a very significant change in traffic during normal activity with activity at the time of an attack, so the Intrusion Detection System considers an anomaly on the network and can detect an attempted attack. |
---|---|
Item Description: | http://repository.upnvj.ac.id/11686/1/Abstrak.pdf http://repository.upnvj.ac.id/11686/3/Awal.pdf http://repository.upnvj.ac.id/11686/4/BAB%201.pdf http://repository.upnvj.ac.id/11686/5/BAB%202.pdf http://repository.upnvj.ac.id/11686/6/BAB%203.pdf http://repository.upnvj.ac.id/11686/7/BAB%204.pdf http://repository.upnvj.ac.id/11686/8/BAB%205.pdf http://repository.upnvj.ac.id/11686/9/Daftar%20Pustaka.pdf http://repository.upnvj.ac.id/11686/10/Daftar%20Riwayat%20Hidup.pdf http://repository.upnvj.ac.id/11686/11/Lampiran.pdf http://repository.upnvj.ac.id/11686/2/Artikel%20KL.pdf |