RIANDI, JUNED and Stiawan, Deris (2018) DETEKSI ANOMALI TRAFFIC DATA PADA WEB SERVER DENGAN METODE OUTLIER DAN NAIVE PATTERN. Undergraduate thesis, Sriwijaya University.
Preview |
Text
RAMA_56201_09111001055_0003047905_01_front_ref.pdf - Accepted Version Available under License Creative Commons Public Domain Dedication. Download (874kB) | Preview |
Text
RAMA_56201_09111001055_0003047905_02.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (374kB) | Request a copy |
|
Text
RAMA_56201_09111001055_0003047905_03.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (1MB) | Request a copy |
|
Text
RAMA_56201_09111001055_0003047905_04.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (2MB) | Request a copy |
|
Text
RAMA_56201_09111001055_0003047905_05.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (10kB) | Request a copy |
|
Text
RAMA_56201_09111001055_0003047905_06_ref.pdf - Bibliography Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (183kB) | Request a copy |
|
Text
RAMA_56201_09111001055_0003047905_07_lamp.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (93kB) | Request a copy |
Abstract
Intrusion detection system (IDS) is a network security system to detect any intrusion which performed by the intruder on the computer network. IDS able to design with outlier and naïve pattern method. Outlier Methode is used by IDS to detect the anomaly traffic data on a web server. Naive pattern method is used by IDS to match the pattern of attacks on IDS rule base system with webserver access.log . in this Research IDS designed with outlier and naïve pattern method is succes to detect the attack well. IDS will produce level 1 anomaly output when only detected an outlier on the size of traffic data, anomaly output level 2 is when only detected pattern of attacks on access.log web server and anomaly output level 3 is output when anomalies on the size of the traffic data and pattern of attacks on access.log web server is detected.
Item Type: | Thesis (Undergraduate) |
---|---|
Uncontrolled Keywords: | Intrusion Detection System (IDS), Outlier, Naïve Pattern, Traffic data, access.log web server |
Subjects: | T Technology > TS Manufactures > TS155-194 Production management. Operations management > TS183.G76 Manufacturing processes, Automation. Production control. CAD/CAM systems. Computer integrated manufacturing systems. Robots, Industrial. |
Divisions: | 09-Faculty of Computer Science > 56201-Computer Systems (S1) |
Depositing User: | Mrs Sri Astuti |
Date Deposited: | 26 Sep 2019 03:43 |
Last Modified: | 26 Sep 2019 03:43 |
URI: | http://repository.unsri.ac.id/id/eprint/8951 |
Actions (login required)
View Item |