ANALISA REAL-TIME DATA LOG HONEYPOT MENGGUNAKAN ALGORITMA K-MEANS PADA SERANGAN DISTRIBUTED DENIAL OF SERVICE
Main Author: | Hermawan, Denni Septian |
---|---|
Format: | Thesis NonPeerReviewed Book |
Bahasa: | eng |
Terbitan: |
, 2018
|
Subjects: | |
Online Access: |
http://eprints.umm.ac.id/42336/1/PENDAHULUAN.pdf http://eprints.umm.ac.id/42336/2/BAB%20I.pdf http://eprints.umm.ac.id/42336/3/BAB%20II.pdf http://eprints.umm.ac.id/42336/4/BAB%20III.pdf http://eprints.umm.ac.id/42336/5/BAB%20IV.pdf http://eprints.umm.ac.id/42336/6/BAB%20V.pdf http://eprints.umm.ac.id/42336/ |
Daftar Isi:
- Cyber attacks on the internet are increasing. Various forms of cyber attacks will cause a disruption to the system which will cause the server to be unusable. Attacks that carry out continuous packet transmission with many computers such as Distributed Denial Of Service (DDoS) that are carried out by many hosts [3] will make the network unstable, even the network cannot be used because there are so many requests to meet the resource of the server. Honeypot can be used to detect and store information from DDoS attacks and then provide the results of a log data attack. The K-Means Clustering algorithm can group log data and group them into a data cluster that has the same time characteristics of a log of a Honeypot. From the cluster results and silhoulete coefficient calculation, network attacks are recorded in the second cluster with the value of the attack 845 with the highest attacker ip 210.124.164.133 of the total 7 clusters.