ANALISA PENDETEKSIAN WORM dan TROJAN PADA JARINGAN INTERNET UNIVERSITAS SEMARANG MENGGUNAKAN METODE KALSIFIKASI PADA DATA MINING C45 dan BAYESIAN NETWORK

Main Authors: Prathivi, Rastri, Vydia, Vensy
Format: Article info bayesian application/pdf eJournal
Bahasa: ind
Terbitan: Jurusan Teknologi Informasi Universitas Semarang , 2017
Subjects:
C45
Online Access: http://journals.usm.ac.id/index.php/transformatika/article/view/440
http://journals.usm.ac.id/index.php/transformatika/article/view/440/275
ctrlnum article-440
fullrecord <?xml version="1.0"?> <dc schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd"><title lang="en-US">ANALISA PENDETEKSIAN WORM dan TROJAN PADA JARINGAN INTERNET UNIVERSITAS SEMARANG MENGGUNAKAN METODE KALSIFIKASI PADA DATA MINING C45 dan BAYESIAN NETWORK</title><creator>Prathivi, Rastri</creator><creator>Vydia, Vensy</creator><subject lang="en-US">Worm, Trojan, C45, Bayesian Network</subject><description lang="en-US">Worm attacks become a dangerous threat and cause damage in the Internet network. If the Internet network worms and trojan attacks the very disruption of traffic data as well as create bandwidth capacity has increased and wasted making the Internet connection is slow. Detecting worms and trojan on the Internet network, especially new variants of worms and trojans and worms and trojans hidden is still a challenging problem. Worm and trojan attacks generally occur in computer networks or the Internet which has a low level of security and vulnerable to infection. The detection and analysis of the worm and trojan attacks in the Internet network can be done by looking at the anomalies in Internet traffic and internet protocol addresses are accessed.This research used experimental research applying C4.5 and Bayesian Network methods to accurately classify anomalies in network traffic internet. Analysis of classification is applied to an internet address, internet protocol and internet bandwidth that allegedly attacked and trojan worm attacks.The results of this research is a result of analysis and classification of internet addresses, internet protocol and internet bandwidth to get the attack worms and trojans.</description><publisher lang="en-US">Jurusan Teknologi Informasi Universitas Semarang</publisher><contributor lang="en-US"/><date>2017-01-30</date><type>Journal:Article</type><type>Other:info:eu-repo/semantics/publishedVersion</type><type>Other:</type><type>Other:bayesian</type><type>File:application/pdf</type><identifier>http://journals.usm.ac.id/index.php/transformatika/article/view/440</identifier><source lang="en-US">Jurnal Transformatika; Vol 14, No 2 (2017): January 2017; 77-81</source><source>2460-6731</source><source>1693-3656</source><language>ind</language><relation>http://journals.usm.ac.id/index.php/transformatika/article/view/440/275</relation><rights lang="en-US">Copyright (c) 2017 Jurnal Transformatika</rights><rights lang="en-US">http://creativecommons.org/licenses/by-sa/4.0</rights><recordID>article-440</recordID></dc>
language ind
format Journal:Article
Journal
Other:info:eu-repo/semantics/publishedVersion
Other
Other:
Other:bayesian
File:application/pdf
File
Journal:eJournal
author Prathivi, Rastri
Vydia, Vensy
title ANALISA PENDETEKSIAN WORM dan TROJAN PADA JARINGAN INTERNET UNIVERSITAS SEMARANG MENGGUNAKAN METODE KALSIFIKASI PADA DATA MINING C45 dan BAYESIAN NETWORK
publisher Jurusan Teknologi Informasi Universitas Semarang
publishDate 2017
topic Worm
Trojan
C45
Bayesian Network
url http://journals.usm.ac.id/index.php/transformatika/article/view/440
http://journals.usm.ac.id/index.php/transformatika/article/view/440/275
contents Worm attacks become a dangerous threat and cause damage in the Internet network. If the Internet network worms and trojan attacks the very disruption of traffic data as well as create bandwidth capacity has increased and wasted making the Internet connection is slow. Detecting worms and trojan on the Internet network, especially new variants of worms and trojans and worms and trojans hidden is still a challenging problem. Worm and trojan attacks generally occur in computer networks or the Internet which has a low level of security and vulnerable to infection. The detection and analysis of the worm and trojan attacks in the Internet network can be done by looking at the anomalies in Internet traffic and internet protocol addresses are accessed.This research used experimental research applying C4.5 and Bayesian Network methods to accurately classify anomalies in network traffic internet. Analysis of classification is applied to an internet address, internet protocol and internet bandwidth that allegedly attacked and trojan worm attacks.The results of this research is a result of analysis and classification of internet addresses, internet protocol and internet bandwidth to get the attack worms and trojans.
id IOS730.article-440
institution Universitas Semarang
institution_id 153
institution_type library:university
library
library Perpustakaan Universitas Semarang
library_id 594
collection Jurnal Transformatika
repository_id 730
subject_area Data Processing, Computer Science/Pemrosesan Data, Ilmu Komputer, Teknik Informatika
city SEMARANG
province JAWA TENGAH
repoId IOS730
first_indexed 2017-02-25T11:06:32Z
last_indexed 2017-08-19T19:08:31Z
recordtype dc
_version_ 1722489081226592256
score 17.607244