ANALISIS LOG SISTEM PADA SECURITY INFORMATION AND EVENT MANAGEMENT UNTUK MENDETEKSI SERANGAN DDOS

One area of technology that is growing rapidly today is information and communication technology. The form of advances in information and communication technology that we often encounter in everyday life is the Internet (Interconnected Network). Through the internet, various individuals and organiza...

Full description

Saved in:
Bibliographic Details
Main Author: Gede Angga Widya Putra, (Author)
Format: Book
Published: 2023-07-11.
Subjects:
Online Access:Link Metadata
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000 am a22000003u 4500
001 repoupnvj_25354
042 |a dc 
100 1 0 |a Gede Angga Widya Putra, .  |e author 
245 0 0 |a ANALISIS LOG SISTEM PADA SECURITY INFORMATION AND EVENT MANAGEMENT UNTUK MENDETEKSI SERANGAN DDOS 
260 |c 2023-07-11. 
500 |a http://repository.upnvj.ac.id/25354/1/ABSTRACT.pdf 
500 |a http://repository.upnvj.ac.id/25354/3/AWAL.pdf 
500 |a http://repository.upnvj.ac.id/25354/4/BAB%201.pdf 
500 |a http://repository.upnvj.ac.id/25354/5/BAB%202.pdf 
500 |a http://repository.upnvj.ac.id/25354/6/BAB%203.pdf 
500 |a http://repository.upnvj.ac.id/25354/7/BAB%204.pdf 
500 |a http://repository.upnvj.ac.id/25354/8/BAB%205.pdf 
500 |a http://repository.upnvj.ac.id/25354/9/DAFTAR%20PUSTAKA.pdf 
500 |a http://repository.upnvj.ac.id/25354/12/RIWAYAT%20HIDUP.pdf 
500 |a http://repository.upnvj.ac.id/25354/11/LAMPIRAN.pdf 
500 |a http://repository.upnvj.ac.id/25354/10/Hasil%20Plagiarisme.pdf 
500 |a http://repository.upnvj.ac.id/25354/2/Artikel%20KI.pdf 
520 |a One area of technology that is growing rapidly today is information and communication technology. The form of advances in information and communication technology that we often encounter in everyday life is the Internet (Interconnected Network). Through the internet, various individuals and organizations can exchange information with each other. However, this increase is also directly proportional to the emergence of various kinds of security holes that are often exploited by electronic criminals to gain financial gain. This can be seen from the number of cases of DDoS attacks on organizations. Distributed Denial of Service attacks are carried out by flooding a server or host, causing the victim host to run out of resources to serve other users. To overcome this, the author uses Security Information and Event Management (SIEM). SIEM is a method for monitoring, analyzing, giving warnings and automating responses to incidents. This research is expected to be able to explain the results of testing, analysis, and solutions regarding the problem of DDoS attacks on SIEM. 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
690 |a QA Mathematics 
690 |a QA75 Electronic computers. Computer science 
690 |a QA76 Computer software 
690 |a U Military Science (General) 
655 7 |a Thesis  |2 local 
655 7 |a NonPeerReviewed  |2 local 
787 0 |n http://repository.upnvj.ac.id/25354/ 
787 0 |n https://repository.upnvj.ac.id 
856 4 1 |u http://repository.upnvj.ac.id/25354/  |z Link Metadata