DETEKSI SERANGAN REMOTE TO LOCAL (R2L) MENGGUNAKAN METODE SUPPORT VECTOR MACHINE (SVM)

SAPUTRA, MUHAMMAD FACHRURROJI ILHAM and Stiawan, Deris (2019) DETEKSI SERANGAN REMOTE TO LOCAL (R2L) MENGGUNAKAN METODE SUPPORT VECTOR MACHINE (SVM). Undergraduate thesis, Sriwijaya Universty.

[img]
Preview
Text
RAMA_56201_09011181320025_0003047905_01_front_ref.pdf - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (1MB) | Preview
[img] Text
RAMA_56201_09011181320025_0003047905_02.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (441kB) | Request a copy
[img] Text
RAMA_56201_09011181320025_0003047905_03.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (243kB) | Request a copy
[img] Text
RAMA_56201_09011181320025_0003047905_04.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (823kB) | Request a copy
[img] Text
RAMA_56201_09011181320025_0003047905_05.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (162kB) | Request a copy
[img] Text
RAMA_56201_09011181320025_0003047905_06_ref.pdf - Bibliography
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (177kB) | Request a copy
[img] Text
RAMA_56201_09011181320025.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (3MB) | Request a copy
[img] Text
RAMA_56201_09011181320025_TURNITIN.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (7MB) | Request a copy

Abstract

Detection is a process by which to examine or conduct an examination of something using certain means and techniques. The remote to local attack was a local incursion to get access to an account into a system that didn't have an account into that system before. The r2l attack patterns on darpa databases are identifiable with such parameters as source address, destination address, flags, IP addresses, and TCP claims. It USES vector support technology where SVM produces a classification of offensive and normal files separated by hyperlane line, purple class 1 for attack and -1 for normal yellow file. Results from my classification used SVM in evaluation with confusion matrix to find out how great the accuracy level of detection of attack and normal file and SVM. From this research we obtained a 99.99% accurate rate which is a very good result of accuracy.

Item Type: Thesis (Undergraduate)
Uncontrolled Keywords: Detection, Remote to Local, Snort IDS, Support Vectror Machine
Subjects: Q Science > Q Science (General) > Q300-390 Cybernetics > Q325.5 Machine learning
Q Science > Q Science (General) > Q350-390 Information theory
T Technology > T Technology (General) > T57.6-57.97 Operations research. Systems analysis
T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK5101-6720 Telecommunication Including telegraphy, telephone, radio, radar, television > TK5105.5.S72 Computer networks
Divisions: 09-Faculty of Computer Science > 56201-Computer Systems (S1)
Depositing User: Muhammad Fachrurroji Ilham Saputra
Date Deposited: 06 Jan 2020 06:45
Last Modified: 06 Jan 2020 06:45
URI: http://repository.unsri.ac.id/id/eprint/23108

Actions (login required)

View Item View Item