ANALISA PENDETEKSIAN WORM dan TROJAN PADA JARINGAN INTERNET UNIVERSITAS SEMARANG MENGGUNAKAN METODE KALSIFIKASI PADA DATA MINING C45 dan BAYESIAN NETWORK
DOI:
https://doi.org/10.26623/transformatika.v14i2.440Keywords:
Worm, Trojan, C45, Bayesian NetworkAbstract
Worm attacks become a dangerous threat and cause damage in the Internet network. If the Internet network worms and trojan attacks the very disruption of traffic data as well as create bandwidth capacity has increased and wasted making the Internet connection is slow. Detecting worms and trojan on the Internet network, especially new variants of worms and trojans and worms and trojans hidden is still a challenging problem. Worm and trojan attacks generally occur in computer networks or the Internet which has a low level of security and vulnerable to infection. The detection and analysis of the worm and trojan attacks in the Internet network can be done by looking at the anomalies in Internet traffic and internet protocol addresses are accessed.
This research used experimental research applying C4.5 and Bayesian Network methods to accurately classify anomalies in network traffic internet. Analysis of classification is applied to an internet address, internet protocol and internet bandwidth that allegedly attacked and trojan worm attacks.
The results of this research is a result of analysis and classification of internet addresses, internet protocol and internet bandwidth to get the attack worms and trojans.
References
Abdul Kadir. 2013. Pengantar Teknologi Informasi. Penerbit Andi
Aji Supriyanto. 2005. Pengantar Teknologi Informasi. Penerbit Salemba Infotek
Dony Ariyus. 2007. Intrusion Detection System, Penerbit Andi
Eko Prasetyo. 2012. Data Mining, Penerbit Andi
Gupta, Momtora. 2012. Intrusion Detection System Using Wireshark. International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), Volume 2, Issue 11, November.
Jonathan Palmer. 2011. Naive Bayes Classification for Intrusion Detection Using Live Packet Capture. Data Mining in Bioinformatics, Spring.
P. Szor. 2005. The Art of Computer Virus Research and Defense. Addison Wesley for Symantec Press, New Jersey.
Rastri Prathivi. 2015. Klasifikasi Data Trafik Internet Menggunakan Metode Bayes Network (Studi Kasus Jaringan Internet Universitas Semarang., Jurnal Transformatika Volume 12 Nomor 2 ISSN 1693 3656
Shelly, 2007. Disovering Computers. Penerbit Salemba Infotek
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
Transformatika is licensed under a Creative Commons Attribution 4.0 International License.