ANALISIS POLA HASIL PENETRATION TESTING DENIAL OF SERVICE, MAN-IN-THE-MIDDLE, BRUTE FORCE, DAN SQL INJECTION PADA SISTEM DISASTER RECOVERY CENTER (DRC) MENGGUNAKAN METODE K-MEANS CLUSTERING

FATHURRAHMAN, ARMANDA and Heryanto, Ahmad and Hermansyah, Adi (2025) ANALISIS POLA HASIL PENETRATION TESTING DENIAL OF SERVICE, MAN-IN-THE-MIDDLE, BRUTE FORCE, DAN SQL INJECTION PADA SISTEM DISASTER RECOVERY CENTER (DRC) MENGGUNAKAN METODE K-MEANS CLUSTERING. Undergraduate thesis, Sriwijaya University.

[thumbnail of RAMA_56201_09011282126055_cover.jpeg]
Preview
Image
RAMA_56201_09011282126055_cover.jpeg - Cover Image
Available under License Creative Commons Public Domain Dedication.

Download (407kB) | Preview
[thumbnail of RAMA_56201_09011282126055.pdf] Text
RAMA_56201_09011282126055.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (8MB) | Request a copy
[thumbnail of RAMA_56201_09011282126055_TURNITIN.pdf] Text
RAMA_56201_09011282126055_TURNITIN.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (14MB) | Request a copy
[thumbnail of RAMA_56201_09011282126055_0022018703_0030048909_01_front_ref.pdf] Text
RAMA_56201_09011282126055_0022018703_0030048909_01_front_ref.pdf - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (1MB)
[thumbnail of RAMA_56201_09011282126055_0022018703_0030048909_02.pdf] Text
RAMA_56201_09011282126055_0022018703_0030048909_02.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (1MB) | Request a copy
[thumbnail of RAMA_56201_09011282126055_0022018703_0030048909_03.pdf] Text
RAMA_56201_09011282126055_0022018703_0030048909_03.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (1MB) | Request a copy
[thumbnail of RAMA_56201_09011282126055_0022018703_0030048909_04.pdf] Text
RAMA_56201_09011282126055_0022018703_0030048909_04.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (2MB) | Request a copy
[thumbnail of RAMA_56201_09011282126055_0022018703_0030048909_05.pdf] Text
RAMA_56201_09011282126055_0022018703_0030048909_05.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (232kB) | Request a copy
[thumbnail of RAMA_56201_09011282126055_0022018703_0030048909_06_ref.pdf] Text
RAMA_56201_09011282126055_0022018703_0030048909_06_ref.pdf - Bibliography
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (220kB) | Request a copy
[thumbnail of RAMA_56201_09011282126055_0022018703_0030048909_07_lamp.pdf] Text
RAMA_56201_09011282126055_0022018703_0030048909_07_lamp.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (889kB) | Request a copy

Abstract

The Disaster Recovery Center (DRC) system ensures the availability of information services during incidents, but it remains vulnerable to cyber attacks such as DoS, MiTM, Brute Force, and SQL Injection. This study analyzes the patterns of penetration testing results on the DRC system using the K-Means Clustering method. Attack data is sourced from internal network simulations, involving preprocessing, balancing using ADASYN, and feature selection via PCA. Clustering results are visualized in two dimensions and evaluated using a confusion matrix. DoS and Brute Force attacks demonstrate high accuracy, while MiTM and SQLi exhibit poor performance due to data imbalance and unclear attack patterns. Additionally, the impact of attacks on CPU usage, memory, and disk I/O was quantitatively analyzed. This study contributes to visual attack detection, clustering evaluation, and the analysis of their impact on the DRC system.

Item Type: Thesis (Undergraduate)
Uncontrolled Keywords: Machine Learning, Penetration Testing, Serangan Siber, Disaster Recovery Center
Subjects: Q Science > Q Science (General) > Q334-342 Computer science. Artificial intelligence. Algorithms. Robotics. Automation.
T Technology > T Technology (General) > T10.5-11.9 Communication of technical information > T10.68 Risk communication
T Technology > T Technology (General) > T57.6-57.97 Operations research. Systems analysis > T57.85 Network systems theory Including network analysis Cf. TS157.5+ Scheduling
Divisions: 09-Faculty of Computer Science > 56201-Computer Systems (S1)
Depositing User: Armanda Fathurrahman
Date Deposited: 07 Sep 2025 05:51
Last Modified: 07 Sep 2025 05:51
URI: http://repository.unsri.ac.id/id/eprint/183607

Actions (login required)

View Item View Item