TAUFIK, M. and Heryanto, Ahmad (2022) KLASIFIKASI SERANGAN BOTNET MENGGUNAKAN METODE BI-DIRECTIONAL LONG SHORT-TERM MEMORY. Undergraduate thesis, Sriwijaya University.
Text
RAMA_56201_09011281823073.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (3MB) | Request a copy |
|
Text
RAMA_56201_09011281823073_TURNITIN.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (5MB) | Request a copy |
|
Preview |
Text
RAMA_56201_09011281823073_0022018703_01_front_ref.pdf - Accepted Version Available under License Creative Commons Public Domain Dedication. Download (1MB) | Preview |
Text
RAMA_56201_09011281823073_0022018703_02.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (1MB) | Request a copy |
|
Text
RAMA_56201_09011281823073_0022018703_03.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (665kB) | Request a copy |
|
Text
RAMA_56201_09011281823073_0022018703_04.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (1MB) | Request a copy |
|
Text
RAMA_56201_09011281823073_0022018703_05.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (201kB) | Request a copy |
|
Text
RAMA_56201_09011281823073_0022018703_06_ref.pdf - Bibliography Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (330kB) | Request a copy |
|
Text
RAMA_56201_09011281823073_0022018703_07_lamp.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (631kB) | Request a copy |
Abstract
Botnet attacks have become a major threat on the internet in recent years. Because a botnet is a collection of programs in which there is malware, both of which are connected to each other within the scope of the internet network, which can communicate with a collection of similar malware bot programs to do work that is detrimental and targets the intended victim. There are three objectives in this research, among others, to build a model of the Bi-Directional LSTM method for the ability to classify botnet attacks on the CIC-IDS 2018 dataset. Second, apply PCA feature selection to optimize the classification of botnet attacks. And thirdly Knowing the results of the classification performance of Botnet attacks seen from the results of accuracy, specificity, recall, precision. Therefore, to overcome the previous problem, the deep learning method was used. The Deep Learning method used is the BI-Directional LSTM method which is a branch of LSTM which has the advantage of having two layers, namely the forward layer and the backward layer so that it allows additional information enhancement and improves memory capabilities. This research has three benefits, including applying the Bi-Directional Long Short-Term Memory method for classifying Botnet attacks. The second is to optimize the Bi-Directional Long Short Term Memory method so as to get a high accuracy value. The third is to find out the performance of Bi-Directional Long Short-Term Memory results to classify Botnet attacks. This research was conducted by training the 2018 CIC-IDS dataset on machine learning with the provision of tuning hyperparameters and comparing results with different ratios of training data and test data so that the best evaluation results were obtained with an accuracy value of 99.82% accuracy, 99.76% precision, 99.89 recall. %, and a specificity of 99.82%.
Actions (login required)
View Item |