NEGORO, ADJIE BUDI and Heryanto, Ahmad (2024) IMPLEMENTASI METODE LSTM-CNN DALAM SISTEM MULTI-CLASSIFICATION DETEKSI SERANGAN SIBER. Undergraduate thesis, Sriwijaya University.
Text
RAMA_56201_09011282025096.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (8MB) | Request a copy |
|
Text
RAMA_56201_09011282025096_TURNITIN.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (8MB) | Request a copy |
|
Text
RAMA_56201_09011282025096_0022018703_01_front_ref.pdf - Accepted Version Available under License Creative Commons Public Domain Dedication. Download (9MB) |
|
Text
RAMA_56201_09011282025096_0022018703_02.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (10MB) | Request a copy |
|
Text
RAMA_56201_09011282025096_0022018703_03.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (11MB) | Request a copy |
|
Text
RAMA_56201_09011282025096_0022018703_04.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (19MB) | Request a copy |
|
Text
RAMA_56201_09011282025096_0022018703_05.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (560kB) | Request a copy |
|
Text
RAMA_56201_09011282025096_0022018703_06_ref.pdf - Bibliography Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (2MB) | Request a copy |
|
Text
RAMA_56201_09011282025096_0022018703_07_lamp.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (697kB) | Request a copy |
Abstract
Cyberattacks are attempts by individuals or groups to attack computer systems, networks, or other electronic devices with the intent of stealing sensitive data, damaging infrastructure, or creating disruptions in service. There are various types of cyber-attacks, including malware attacks, phishing attacks, DDoS (Distributed Denial of Service) attacks, ransomware attacks, and more. To protect the network security system against various types of cyber-attacks, an attack detection system such as an Intrusion Detection System is needed. IDS is a detector that can investigate activities that occur on internet systems and networks. The method used in this research is Long Short-Term Memory – Convolutional Neural Network (LSTM-CNN). This research uses four different datasets, namely KDD-Cup99, NSL-KDD, ISCX 2012, and CIC-IDS 2018 with various types of attacks in them. By validating training and testing data from 20% to 80%. The output of this research produces the best performance values in the form of Accuracy for the KDD-Cup99 dataset of 99.96%, Recall 99.96%, Specificity 99.99%, Precision 99.96%, F1-Score 99.96%. Accuracy for the NSL-KDD dataset is 99.78%, Recall 99.78%, Specificity 99.94%, Precision 99.78%, F1-Score 99.77%. Accuracy for the ISCX 2012 dataset is 99.58%, Recall 99.58%, Specificity 99.92%, Precision 99.58%, F1-Score 99.58%. Accuracy for the 2018 CIC-IDS dataset is 99.95%, Recall 99.95%, Specificity 100.00%, Precision 99.95%, F1-Score 99.95%.
Item Type: | Thesis (Undergraduate) |
---|---|
Uncontrolled Keywords: | Machine Learning, Classification Detection, deteksi serangan siber |
Subjects: | Q Science > Q Science (General) > Q334-342 Computer science. Artificial intelligence. Algorithms. Robotics. Automation. T Technology > T Technology (General) > T61-173 Technical education. Technical schools > T173.8 Technological innovations T Technology > T Technology (General) > T173.2-174.5 Technological change > T173.8 Technological innovations T Technology > T Technology (General) > T58.5-58.64 Information technology > T58.6.E9 Management information systems -- Congresses. T Technology > T Technology (General) > T59.4 Mechanization T Technology > T Technology (General) > T59.5 Automation |
Divisions: | 09-Faculty of Computer Science > 56201-Computer Systems (S1) |
Depositing User: | Adjie Budi Negoro |
Date Deposited: | 13 May 2024 03:49 |
Last Modified: | 13 May 2024 03:49 |
URI: | http://repository.unsri.ac.id/id/eprint/143872 |
Actions (login required)
View Item |