DETEKSI SERANGAN BRUTE FORCE MENGGUNAKAN METODE BIDIRECTIONAL RECURRENT NEURAL NETWORKS

RIZON, M. ALFAT HAYATUR and Heryanto, Ahmad and Hermansyah, Adi (2022) DETEKSI SERANGAN BRUTE FORCE MENGGUNAKAN METODE BIDIRECTIONAL RECURRENT NEURAL NETWORKS. Undergraduate thesis, Sriwijaya University.

[thumbnail of RAMA_56201_09011381823120.pdf] Text
RAMA_56201_09011381823120.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (5MB) | Request a copy
[thumbnail of RAMA_56201_09011381823120_0022018703_ 0030048909_01_front_ref.pdf]
Preview
Text
RAMA_56201_09011381823120_0022018703_ 0030048909_01_front_ref.pdf - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (581kB) | Preview
[thumbnail of RAMA_56201_09011381823120_0022018703_ 0030048909_02.pdf] Text
RAMA_56201_09011381823120_0022018703_ 0030048909_02.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (537kB) | Request a copy
[thumbnail of RAMA_56201_09011381823120_0022018703_ 0030048909_03.pdf] Text
RAMA_56201_09011381823120_0022018703_ 0030048909_03.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (1MB) | Request a copy
[thumbnail of RAMA_56201_09011381823120_0022018703_ 0030048909_04.pdf] Text
RAMA_56201_09011381823120_0022018703_ 0030048909_04.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (800kB) | Request a copy
[thumbnail of RAMA_56201_09011381823120_0022018703_ 0030048909_05.pdf] Text
RAMA_56201_09011381823120_0022018703_ 0030048909_05.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (160kB) | Request a copy
[thumbnail of RAMA_56201_09011381823120_0022018703_ 0030048909_06_ref.pdf] Text
RAMA_56201_09011381823120_0022018703_ 0030048909_06_ref.pdf - Bibliography
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (189kB) | Request a copy
[thumbnail of RAMA_56201_09011381823120_0022018703_ 0030048909_07_lamp.pdf] Text
RAMA_56201_09011381823120_0022018703_ 0030048909_07_lamp.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (2MB) | Request a copy
[thumbnail of RAMA_56201_09011381823120_TURNITIN.pdf] Text
RAMA_56201_09011381823120_TURNITIN.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (8MB) | Request a copy

Abstract

Brute Force Attack is an attack that targets private information such as usernames, passwords, passphrases and other information. Brute force attack sends combinations continuously in the form of different numbers, letters or symbols, until it gets the right combination so that it can access the protected data. Brute force attack tries to break credential information that is valuable for attackers. The algorithms that are often used in these systems are CNN , Naïve Bayes , SVM , KNN , Decision Tree, Logistic Regression, Random Forest, K-Means, Gradient Bossting, Dimensionality Reduction , Based on the CNN algorithm and brutefoce attack detection, said that the weakness of the cnn method is in the paper, presenting a new framework that integrates local cnn and global cnn both of which are based on the results of the study showing that the CNN-based model is superior to traditional machine learning methods with an accuracy of 94.3%, a precision rate of 92.5%, 97.8% recall rate and 91.8% F1-score in terms of the ability to detect SSH-Brute Froce. forced attack. After a comparative analysis of various classifier models, it was found that the Naive Bayes classifier is very suitable for image classification from its features, many related studies say that the RNN algorithm can overcome the problem that the bi-directional rnn method can solve faster by iteratively so that results emerge the best in the data studied.

Item Type: Thesis (Undergraduate)
Uncontrolled Keywords: Brute force attack, Bi-directional recurrent neural network
Subjects: T Technology > T Technology (General) > T1-995 Technology (General)
Divisions: 09-Faculty of Computer Science > 56201-Computer Systems (S1)
Depositing User: M. Alfat Hayatur Rizon
Date Deposited: 13 Jan 2023 01:26
Last Modified: 13 Jan 2023 01:26
URI: http://repository.unsri.ac.id/id/eprint/85596

Actions (login required)

View Item View Item