IMPLEMENTASI METODE LSTM-CNN DALAM SISTEM MULTI-CLASSIFICATION DETEKSI SERANGAN SIBER

NEGORO, ADJIE BUDI and Heryanto, Ahmad (2024) IMPLEMENTASI METODE LSTM-CNN DALAM SISTEM MULTI-CLASSIFICATION DETEKSI SERANGAN SIBER. Undergraduate thesis, Sriwijaya University.

[thumbnail of RAMA_56201_09011282025096.pdf] Text
RAMA_56201_09011282025096.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (8MB) | Request a copy
[thumbnail of RAMA_56201_09011282025096_TURNITIN.pdf] Text
RAMA_56201_09011282025096_TURNITIN.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (8MB) | Request a copy
[thumbnail of RAMA_56201_09011282025096_0022018703_01_front_ref.pdf] Text
RAMA_56201_09011282025096_0022018703_01_front_ref.pdf - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (9MB)
[thumbnail of RAMA_56201_09011282025096_0022018703_02.pdf] Text
RAMA_56201_09011282025096_0022018703_02.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (10MB) | Request a copy
[thumbnail of RAMA_56201_09011282025096_0022018703_03.pdf] Text
RAMA_56201_09011282025096_0022018703_03.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (11MB) | Request a copy
[thumbnail of RAMA_56201_09011282025096_0022018703_04.pdf] Text
RAMA_56201_09011282025096_0022018703_04.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (19MB) | Request a copy
[thumbnail of RAMA_56201_09011282025096_0022018703_05.pdf] Text
RAMA_56201_09011282025096_0022018703_05.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (560kB) | Request a copy
[thumbnail of RAMA_56201_09011282025096_0022018703_06_ref.pdf] Text
RAMA_56201_09011282025096_0022018703_06_ref.pdf - Bibliography
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (2MB) | Request a copy
[thumbnail of RAMA_56201_09011282025096_0022018703_07_lamp.pdf] Text
RAMA_56201_09011282025096_0022018703_07_lamp.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (697kB) | Request a copy

Abstract

Cyberattacks are attempts by individuals or groups to attack computer systems, networks, or other electronic devices with the intent of stealing sensitive data, damaging infrastructure, or creating disruptions in service. There are various types of cyber-attacks, including malware attacks, phishing attacks, DDoS (Distributed Denial of Service) attacks, ransomware attacks, and more. To protect the network security system against various types of cyber-attacks, an attack detection system such as an Intrusion Detection System is needed. IDS is a detector that can investigate activities that occur on internet systems and networks. The method used in this research is Long Short-Term Memory – Convolutional Neural Network (LSTM-CNN). This research uses four different datasets, namely KDD-Cup99, NSL-KDD, ISCX 2012, and CIC-IDS 2018 with various types of attacks in them. By validating training and testing data from 20% to 80%. The output of this research produces the best performance values in the form of Accuracy for the KDD-Cup99 dataset of 99.96%, Recall 99.96%, Specificity 99.99%, Precision 99.96%, F1-Score 99.96%. Accuracy for the NSL-KDD dataset is 99.78%, Recall 99.78%, Specificity 99.94%, Precision 99.78%, F1-Score 99.77%. Accuracy for the ISCX 2012 dataset is 99.58%, Recall 99.58%, Specificity 99.92%, Precision 99.58%, F1-Score 99.58%. Accuracy for the 2018 CIC-IDS dataset is 99.95%, Recall 99.95%, Specificity 100.00%, Precision 99.95%, F1-Score 99.95%.

Item Type: Thesis (Undergraduate)
Uncontrolled Keywords: Machine Learning, Classification Detection, deteksi serangan siber
Subjects: Q Science > Q Science (General) > Q334-342 Computer science. Artificial intelligence. Algorithms. Robotics. Automation.
T Technology > T Technology (General) > T61-173 Technical education. Technical schools > T173.8 Technological innovations
T Technology > T Technology (General) > T173.2-174.5 Technological change > T173.8 Technological innovations
T Technology > T Technology (General) > T58.5-58.64 Information technology > T58.6.E9 Management information systems -- Congresses.
T Technology > T Technology (General) > T59.4 Mechanization
T Technology > T Technology (General) > T59.5 Automation
Divisions: 09-Faculty of Computer Science > 56201-Computer Systems (S1)
Depositing User: Adjie Budi Negoro
Date Deposited: 13 May 2024 03:49
Last Modified: 13 May 2024 03:49
URI: http://repository.unsri.ac.id/id/eprint/143872

Actions (login required)

View Item View Item