ANALISA PENDETEKSIAN WORM dan TROJAN PADA JARINGAN INTERNET UNIVERSITAS SEMARANG MENGGUNAKAN METODE KALSIFIKASI PADA DATA MINING C45 dan BAYESIAN NETWORK

Rastri Prathivi, Vensy Vydia

Abstract


Worm attacks become a dangerous threat and cause damage in the Internet network. If the Internet network worms and trojan attacks the very disruption of traffic data as well as create bandwidth capacity has increased and wasted making the Internet connection is slow. Detecting worms and trojan on the Internet network, especially new variants of worms and trojans and worms and trojans hidden is still a challenging problem. Worm and trojan attacks generally occur in computer networks or the Internet which has a low level of security and vulnerable to infection. The detection and analysis of the worm and trojan attacks in the Internet network can be done by looking at the anomalies in Internet traffic and internet protocol addresses are accessed.
This research used experimental research applying C4.5 and Bayesian Network methods to accurately classify anomalies in network traffic internet. Analysis of classification is applied to an internet address, internet protocol and internet bandwidth that allegedly attacked and trojan worm attacks.
The results of this research is a result of analysis and classification of internet addresses, internet protocol and internet bandwidth to get the attack worms and trojans.


Keywords


Worm, Trojan, C45, Bayesian Network

References


Abdul Kadir. 2013. Pengantar Teknologi Informasi. Penerbit Andi

Aji Supriyanto. 2005. Pengantar Teknologi Informasi. Penerbit Salemba Infotek

Dony Ariyus. 2007. Intrusion Detection System, Penerbit Andi

Eko Prasetyo. 2012. Data Mining, Penerbit Andi

Gupta, Momtora. 2012. Intrusion Detection System Using Wireshark. International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), Volume 2, Issue 11, November.

Jonathan Palmer. 2011. Naive Bayes Classification for Intrusion Detection Using Live Packet Capture. Data Mining in Bioinformatics, Spring.

P. Szor. 2005. The Art of Computer Virus Research and Defense. Addison Wesley for Symantec Press, New Jersey.

Rastri Prathivi. 2015. Klasifikasi Data Trafik Internet Menggunakan Metode Bayes Network (Studi Kasus Jaringan Internet Universitas Semarang., Jurnal Transformatika Volume 12 Nomor 2 – ISSN 1693 – 3656

Shelly, 2007. Disovering Computers. Penerbit Salemba Infotek


Refbacks

  • There are currently no refbacks.


Copyright (c) 2017 Jurnal Transformatika

| View My Stats |

Transformatika : Journal Information Technology by Department of Information Technology, Faculty of Information Technology and Communication, Semarang University is licensed under a Creative Commons Attribution 4.0 International License.