EMAIL: PASSWORD:
Front Office
UPT. PERPUSTAKAAN
Institut Teknologi Sepuluh Nopember Surabaya


Kampus ITS Sukolilo - Surabaya 60111

Phone : 031-5921733 , 5923623
Fax : 031-5937774
E-mail : libits@its.ac.id
Website : http://library.its.ac.id

Support (Customer Service) :
timit_perpus@its.ac.id




Welcome..guys!

Have a problem with your access?
Please, contact our technical support below:
LIVE SUPPORT


Moh. Fandika Aqsa


Davi Wahyuni


Tondo Indra Nyata


Anis Wulandari


Ansi Aflacha




ITS » Master Theses » MMT - Pasca Sarjana ITS
Posted by dewi007 at 16/12/2008 16:04:02  •  30152 Views


ANALISIS PENGENALAN POLA DALAM JARINGAN DEMILITERIZED ZONE MENGGUNAKAN TEKNIK KLASIFIKASI DECISION TREE DATA MINING

Pattern Matching Analysis in Demiliterized Zone Network using Decision Tree of Data Mining Classification Technique

Author :
Gunawan, Jimmy Agung 




ABSTRAK

Di jaman yang serba internet ini kebutuhan akan suatu sistem pengaman dalam membangun jaringan komputer tidak dapat dielakkan lagi. Sistem administrator wajib memasang pengaman baik berupa firewall maupun Intrusion Detection System IDS untuk memeriksa aliran data yang keluar dan masuk dari internal jaringan ke eksternal jaringan internet. Jaringan internal dalam skala pelayanan dan pengaksesan publik itu sendiri dikelompokkan dalam satu lingkup demiliterized zone DMZ agar tidak bercampur dengan sistem pada jaringan lokal. Dalam kurun perkembangan waktu dan penyimpanan data log lalu lintas data yang semakin bertambah jumlahnya dan menjamurnya teknik-teknik penyerangan dan penyusupan baru seringkali pendeteksian serangan sulit dikontrol oleh analis sistem keamanan. Untuk menanggapi persoalan tersebut maka dalam penelitian ini diujicobakan penggunaan teknik data mining dengan algoritma yang termasuk dalam kelompok supervised untuk melakukan klasifikasi pada tiap pola yang terbentuk khususnya pada pengenalan pola-pola data normal dan serangan. Data yang digunakan untuk penelitian ini dari Knowledge Data Discovery KDD yaitu KDDCup99 dan diaplikasikan algoritma-algoritma data mining dari decision tree untuk menemukan pola-pola contoh data normal dan serangan.


ABSTRACT

The necessity of a security system while building computer networks is a must especially in this internet-based network computing. Administrators of the system have to setup their safeguard like firewall or intrusion detection system IDS in order to check the data flow in and out between internal network and eksternal network internet. Internal network in public services clustered in a scope of demiliterized zone DMZ to avoid a mixture with the local network system. By the time the log of data flow traffic and intrusion techniques keep growing bigger and log traffic will be overloaded beside that intrusions and network attacks technique developed also this condition make security system analysts harder controlling their network system . In order to answer that problem this research examined data mining technique with algorithms under supervised method to classify every pattern especially pattern matching of normal and intrusion datas. KDDCup99 of Knowledge Data Discovery KDD used in this research as network traffic data and data mining algorithms from decision tree applied to find sample patterns of normals and intrusion datas.



Keywordsdata mining; decision tree; demiliterized zone; pendeteksian intrusi; keamanan jaringan; KDDCup’99; signature-based
 
Subject:  jaringan informasi; Internet; pengolahan data elektronis
Contributor
  1. Rully Soelaiman, Skom., Mkom.
Date Create: 16/12/2008
Type: Text
Format: pdf.
Language: Indonesian
Identifier: ITS-Master-3100008031153
Collection ID: 3100008031153
Call Number: RTMT 006.312 Gun a


Source
Master Theses of Program In Management Of Technologi, RTMT 006.312 Gun a, 2008

Coverage
ITS Community Only

Rights
Copyright @2008 by ITS Library. This publication is protected by copyright and permission should be obtained from the ITS Library prior to any prohibited reproduction, storage in a retrievel system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. For information regarding permission(s), write to ITS Library




[ Download - Summary ]

ITS-Master-3100008031153-2983.pdf




 Similar Document...




! ATTENTION !

To facilitate the activation process, please fill out the member application form correctly and completely

Registration activation of our members will process up to max 24 hours (confirm by email). Please wait patiently

POLLING

Bagaimana pendapat Anda tentang layanan repository kami ?

Bagus Sekali
Baik
Biasa
Jelek
Mengecewakan





You are connected from 34.234.207.100
using CCBot/2.0 (https://commoncrawl.org/faq/)



Copyright © ITS Library 2006 - 2020 - All rights reserved.
Dublin Core Metadata Initiative and OpenArchives Compatible
Developed by Hassan