ANALISA INTRUSION DETECTION SYSTEM DENGAN METODE ANOMALY BASED TERHADAP SERANGAN SIBER

Intrusion Detection System is a system that conducts surveillance of network traffic and against suspicious or harmful activities in the network system. To know the effectiveness of using the Intrusion Detection System against cyberattacks, it is necessary to know how the IDS can detect the presence...

Full description

Saved in:
Bibliographic Details
Main Author: Muammar Fadhlurrohman, (Author)
Format: Book
Published: 2021-08-10.
Subjects:
Online Access:Link Metadata
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000 am a22000003u 4500
001 repoupnvj_11686
042 |a dc 
100 1 0 |a Muammar Fadhlurrohman, .  |e author 
245 0 0 |a ANALISA INTRUSION DETECTION SYSTEM DENGAN METODE ANOMALY BASED TERHADAP SERANGAN SIBER 
260 |c 2021-08-10. 
500 |a http://repository.upnvj.ac.id/11686/1/Abstrak.pdf 
500 |a http://repository.upnvj.ac.id/11686/3/Awal.pdf 
500 |a http://repository.upnvj.ac.id/11686/4/BAB%201.pdf 
500 |a http://repository.upnvj.ac.id/11686/5/BAB%202.pdf 
500 |a http://repository.upnvj.ac.id/11686/6/BAB%203.pdf 
500 |a http://repository.upnvj.ac.id/11686/7/BAB%204.pdf 
500 |a http://repository.upnvj.ac.id/11686/8/BAB%205.pdf 
500 |a http://repository.upnvj.ac.id/11686/9/Daftar%20Pustaka.pdf 
500 |a http://repository.upnvj.ac.id/11686/10/Daftar%20Riwayat%20Hidup.pdf 
500 |a http://repository.upnvj.ac.id/11686/11/Lampiran.pdf 
500 |a http://repository.upnvj.ac.id/11686/2/Artikel%20KL.pdf 
520 |a Intrusion Detection System is a system that conducts surveillance of network traffic and against suspicious or harmful activities in the network system. To know the effectiveness of using the Intrusion Detection System against cyberattacks, it is necessary to know how the IDS can detect the presence of an attack. One of IDS detection techniques is anomaly detection. This technique involves the traffic pattern of an attack being carried out by an attacker by comparing the activities being monitored with normal activities to detect any irregularities. Based on the results of the study Intrusion detection system can detect 72 out of 175 attacks. That's because anomaly detection requires a very significant change in traffic during normal activity with activity at the time of an attack, so the Intrusion Detection System considers an anomaly on the network and can detect an attempted attack. 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
690 |a QA75 Electronic computers. Computer science 
655 7 |a Thesis  |2 local 
655 7 |a NonPeerReviewed  |2 local 
787 0 |n http://repository.upnvj.ac.id/11686/ 
787 0 |n HTTP://repository.upnvj.ac.id 
856 4 1 |u http://repository.upnvj.ac.id/11686/  |z Link Metadata