SISTEM DETEKSI MAN IN THE MIDDLE (MITM) ATTACK PADA JARINGAN SUPERVISORY CONTROL AND DATA ACQUISITION (SCADA) DENGAN MENGGUNAKAN DECISION TREE

FARHAN, M. ROZZAK and Stiawan, Deris and Heryanto, Ahmad (2021) SISTEM DETEKSI MAN IN THE MIDDLE (MITM) ATTACK PADA JARINGAN SUPERVISORY CONTROL AND DATA ACQUISITION (SCADA) DENGAN MENGGUNAKAN DECISION TREE. Undergraduate thesis, Sriwajaya University.

[thumbnail of RAMA_56201_09011181621014.pdf]
Preview
Text
RAMA_56201_09011181621014.pdf - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (5MB) | Preview
[thumbnail of RAMA_56201_09011181621014_TURNITIN.pdf] Text
RAMA_56201_09011181621014_TURNITIN.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (5MB) | Request a copy
[thumbnail of RAMA_56201_09011181621014_0003047905_0022018703_01_front_ref.pdf]
Preview
Text
RAMA_56201_09011181621014_0003047905_0022018703_01_front_ref.pdf - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (7MB) | Preview
[thumbnail of RAMA_56201_09011181621014_0003047905_0022018703_02.pdf] Text
RAMA_56201_09011181621014_0003047905_0022018703_02.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (262kB) | Request a copy
[thumbnail of RAMA_56201_09011181621014_0003047905_0022018703_03.pdf] Text
RAMA_56201_09011181621014_0003047905_0022018703_03.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (255kB) | Request a copy
[thumbnail of RAMA_56201_09011181621014_0003047905_0022018703_04.pdf] Text
RAMA_56201_09011181621014_0003047905_0022018703_04.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (591kB) | Request a copy
[thumbnail of RAMA_56201_09011181621014_0003047905_0022018703_05.pdf] Text
RAMA_56201_09011181621014_0003047905_0022018703_05.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (131kB) | Request a copy
[thumbnail of RAMA_56201_09011181621014_0003047905_0022018703_06_ref.pdf] Text
RAMA_56201_09011181621014_0003047905_0022018703_06_ref.pdf - Bibliography
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (127kB) | Request a copy
[thumbnail of RAMA_56201_09011181621014_0003047905_0022018703_07_lamp.pdf] Text
RAMA_56201_09011181621014_0003047905_0022018703_07_lamp.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (5MB) | Request a copy

Abstract

Supervisory Control and Data Acquisition (SCADA) adalah suatu sistem kontrol yang memungkinkan pemantauan dan pengelolaan proses industri dari jarak jauh dan dikendalikan dengan memanfaatkan jaringan komputer. Pada sistem SCADA terdapat beberapa protokol, salah satu protokol komunikasi tersebut adalah IEC 60870-5-104 atau dikenal juga dengan IEC-104. Serangan Man In The Middle (MITM) merupakan salah satu jenis serangan keamanan yang paling umum, yang menggambarkan serangan MITM juga merupakan ancaman keamanan pada jaringan SCADA. Salah satu serangan MITM adalah ARP Spoofing yang bisa melakukan network scanning. Intrusion Detection System (IDS) merupakan suatu sistem untuk mendeteksi lalu lintas dalam sebuah jaringan. IDS akan memberikan alert ketika mendeteksi serangan. Decision tree adalah suatu metode algoritma yang digunakan untuk teknik klasifikasi yang mana mempunyai tujuan untuk melakukan prediksi terhadap sekumpulan data. Hasil performa terbaik yang dihasilkan oleh Decision Tree ialah dengan tingkat akurasi sebesar 97.52%.

Item Type: Thesis (Undergraduate)
Uncontrolled Keywords: Supervisory Control and Data Acquisition (SCADA), Man In The Middle (MITM), Decision Tree
Subjects: Q Science > QA Mathematics > QA75-76.95 Calculating machines > QA76.9.A25 Computer security. Systems and Data Security.
Q Science > QA Mathematics > QA75-76.95 Calculating machines > QA76.9.E94 Computer system performance. Computer Communication Networks. Computer science. Logic design. Operating systems (Computers).
Divisions: 09-Faculty of Computer Science > 56201-Computer Systems (S1)
Depositing User: M. Rozzak Farhan
Date Deposited: 26 Jan 2022 06:19
Last Modified: 26 Jan 2022 06:19
URI: http://repository.unsri.ac.id/id/eprint/62953

Actions (login required)

View Item View Item