SISTEM PENDETEKSI SERANGAN BRUTEFORCE DENGAN INTRUSION DETECTION SYSTEM (IDS) MENGGUNAKAN METODE LSTM (LONG SHORT TERM MEMORY)

HAFIZIN, AGUNG AL and Heryanto, Ahmad (2022) SISTEM PENDETEKSI SERANGAN BRUTEFORCE DENGAN INTRUSION DETECTION SYSTEM (IDS) MENGGUNAKAN METODE LSTM (LONG SHORT TERM MEMORY). Undergraduate thesis, Sriwijaya University.

[thumbnail of RAMA_56201_09011281823040.pdf] Text
RAMA_56201_09011281823040.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (7MB) | Request a copy
[thumbnail of RAMA_56201_09011281823040_TURNITIN.pdf] Text
RAMA_56201_09011281823040_TURNITIN.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (16MB) | Request a copy
[thumbnail of RAMA_56201_09011281823040_0022018703_01_front_ref.pdf]
Preview
Text
RAMA_56201_09011281823040_0022018703_01_front_ref.pdf - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (2MB) | Preview
[thumbnail of RAMA_56201_09011281823040_0022018703_02.pdf] Text
RAMA_56201_09011281823040_0022018703_02.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (1MB) | Request a copy
[thumbnail of RAMA_56201_09011281823040_0022018703_03.pdf] Text
RAMA_56201_09011281823040_0022018703_03.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (846kB) | Request a copy
[thumbnail of RAMA_56201_09011281823040_0022018703_04.pdf] Text
RAMA_56201_09011281823040_0022018703_04.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (3MB) | Request a copy
[thumbnail of RAMA_56201_09011281823040_0022018703_05.pdf] Text
RAMA_56201_09011281823040_0022018703_05.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (7kB) | Request a copy
[thumbnail of RAMA_56201_09011281823040_0022018703_06_ref.pdf] Text
RAMA_56201_09011281823040_0022018703_06_ref.pdf - Bibliography
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (140kB) | Request a copy
[thumbnail of RAMA_56201_09011281823040_0022018703_07_lamp.pdf] Text
RAMA_56201_09011281823040_0022018703_07_lamp.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (378kB) | Request a copy

Abstract

Bruteforce is a password cracking attack against a computer security system by sending repeated combinations of numbers, letters, and different symbols. Bruteforce attack is actually an old attack method and also quite simple, but this type of attack has a fairly high success rate and is considered very effective. that's why this attack is still popular today and is widely used by hackers to carry out criminal acts. The method used in this research is Long Short Term Memory (LSTM). The advantage of LSTM is that it can maintain errors that occur when doing backpropagation so that it does not allow the loss of training to increase. In this study, detection for 2 classes of FTP and SSH Bruteforce attacks with validation results from 10% to 90% of training data, on the parameters of the number of layers and nodes, activation of tanh and softmax, learning rate, batch size, optimizer function, and loss. based on the tests that have been carried out, the best results are obtained with an accuracy rate of 99,995, 100% precision, 99,9984% specificity, 99,9992% precision, and 99,9996% F1-Score.

Item Type: Thesis (Undergraduate)
Uncontrolled Keywords: Deteksi, Bruteforce, Intrusion Detection System, Long Short Term Memory.
Subjects: Q Science > Q Science (General) > Q300-390 Cybernetics > Q325.5 Machine learning
Q Science > Q Science (General) > Q334-342 Computer science. Artificial intelligence. Algorithms. Robotics. Automation.
Q Science > QA Mathematics > QA75-76.95 Calculating machines > QA76.9.A25 Computer security. Systems and Data Security.
Divisions: 09-Faculty of Computer Science > 56201-Computer Systems (S1)
Depositing User: Users 21870 not found.
Date Deposited: 25 Jul 2022 06:09
Last Modified: 25 Jul 2022 06:09
URI: http://repository.unsri.ac.id/id/eprint/74306

Actions (login required)

View Item View Item