ANALISA PENDETEKSIAN WORM dan TROJAN PADA JARINGAN INTERNET UNIVERSITAS SEMARANG MENGGUNAKAN METODE KALSIFIKASI PADA DATA MINING C45 dan BAYESIAN NETWORK
Main Authors: | Prathivi, Rastri, Vydia, Vensy |
---|---|
Format: | Article info bayesian application/pdf eJournal |
Bahasa: | ind |
Terbitan: |
Jurusan Teknologi Informasi Universitas Semarang
, 2017
|
Subjects: | |
Online Access: |
http://journals.usm.ac.id/index.php/transformatika/article/view/440 http://journals.usm.ac.id/index.php/transformatika/article/view/440/275 |
ctrlnum |
article-440 |
---|---|
fullrecord |
<?xml version="1.0"?>
<dc schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd"><title lang="en-US">ANALISA PENDETEKSIAN WORM dan TROJAN PADA JARINGAN INTERNET UNIVERSITAS SEMARANG MENGGUNAKAN METODE KALSIFIKASI PADA DATA MINING C45 dan BAYESIAN NETWORK</title><creator>Prathivi, Rastri</creator><creator>Vydia, Vensy</creator><subject lang="en-US">Worm, Trojan, C45, Bayesian Network</subject><description lang="en-US">Worm attacks become a dangerous threat and cause damage in the Internet network. If the Internet network worms and trojan attacks the very disruption of traffic data as well as create bandwidth capacity has increased and wasted making the Internet connection is slow. Detecting worms and trojan on the Internet network, especially new variants of worms and trojans and worms and trojans hidden is still a challenging problem. Worm and trojan attacks generally occur in computer networks or the Internet which has a low level of security and vulnerable to infection. The detection and analysis of the worm and trojan attacks in the Internet network can be done by looking at the anomalies in Internet traffic and internet protocol addresses are accessed.This research used experimental research applying C4.5 and Bayesian Network methods to accurately classify anomalies in network traffic internet. Analysis of classification is applied to an internet address, internet protocol and internet bandwidth that allegedly attacked and trojan worm attacks.The results of this research is a result of analysis and classification of internet addresses, internet protocol and internet bandwidth to get the attack worms and trojans.</description><publisher lang="en-US">Jurusan Teknologi Informasi Universitas Semarang</publisher><contributor lang="en-US"/><date>2017-01-30</date><type>Journal:Article</type><type>Other:info:eu-repo/semantics/publishedVersion</type><type>Other:</type><type>Other:bayesian</type><type>File:application/pdf</type><identifier>http://journals.usm.ac.id/index.php/transformatika/article/view/440</identifier><source lang="en-US">Jurnal Transformatika; Vol 14, No 2 (2017): January 2017; 77-81</source><source>2460-6731</source><source>1693-3656</source><language>ind</language><relation>http://journals.usm.ac.id/index.php/transformatika/article/view/440/275</relation><rights lang="en-US">Copyright (c) 2017 Jurnal Transformatika</rights><rights lang="en-US">http://creativecommons.org/licenses/by-sa/4.0</rights><recordID>article-440</recordID></dc>
|
language |
ind |
format |
Journal:Article Journal Other:info:eu-repo/semantics/publishedVersion Other Other: Other:bayesian File:application/pdf File Journal:eJournal |
author |
Prathivi, Rastri Vydia, Vensy |
title |
ANALISA PENDETEKSIAN WORM dan TROJAN PADA JARINGAN INTERNET UNIVERSITAS SEMARANG MENGGUNAKAN METODE KALSIFIKASI PADA DATA MINING C45 dan BAYESIAN NETWORK |
publisher |
Jurusan Teknologi Informasi Universitas Semarang |
publishDate |
2017 |
topic |
Worm Trojan C45 Bayesian Network |
url |
http://journals.usm.ac.id/index.php/transformatika/article/view/440 http://journals.usm.ac.id/index.php/transformatika/article/view/440/275 |
contents |
Worm attacks become a dangerous threat and cause damage in the Internet network. If the Internet network worms and trojan attacks the very disruption of traffic data as well as create bandwidth capacity has increased and wasted making the Internet connection is slow. Detecting worms and trojan on the Internet network, especially new variants of worms and trojans and worms and trojans hidden is still a challenging problem. Worm and trojan attacks generally occur in computer networks or the Internet which has a low level of security and vulnerable to infection. The detection and analysis of the worm and trojan attacks in the Internet network can be done by looking at the anomalies in Internet traffic and internet protocol addresses are accessed.This research used experimental research applying C4.5 and Bayesian Network methods to accurately classify anomalies in network traffic internet. Analysis of classification is applied to an internet address, internet protocol and internet bandwidth that allegedly attacked and trojan worm attacks.The results of this research is a result of analysis and classification of internet addresses, internet protocol and internet bandwidth to get the attack worms and trojans. |
id |
IOS730.article-440 |
institution |
Universitas Semarang |
institution_id |
153 |
institution_type |
library:university library |
library |
Perpustakaan Universitas Semarang |
library_id |
594 |
collection |
Jurnal Transformatika |
repository_id |
730 |
subject_area |
Data Processing, Computer Science/Pemrosesan Data, Ilmu Komputer, Teknik Informatika |
city |
SEMARANG |
province |
JAWA TENGAH |
repoId |
IOS730 |
first_indexed |
2017-02-25T11:06:32Z |
last_indexed |
2017-08-19T19:08:31Z |
recordtype |
dc |
_version_ |
1722489081226592256 |
score |
17.607244 |