IMPLEMENTASI DATA MINING DENGAN ALGORITMA BERBASIS TREE UNTUK KLASIFIKASI SERANGAN PADA INTRUSION DETECTION SYSTEM (IDS)
Abstract
Full Text:
PDF (Bahasa Indonesia)References
Bilal Ahmad, “Intrusion Detection With Tree-Based Data Mining Classification Techniques By Using Kdd Dataset,” European Jurnal Of Computer Science and Information Technology., Vo. 5 , No. 6, pp. 11-18, December 2017.
Ms. Urvashi Modi, and Prof. Anurag Jain, “A survey of IDS classification using KDD CUP 99 dataset in WEKA,” International Journal of Scientific & Engineering Research, Volume 6, Issue 11, November-2015.
Preeti Aggarwala, and Sudhir Kumar Sharmab, “Analysis of KDD Dataset Attributes - Class wise For Intrusion Detection,” 3rd International Conference on Recent Trends in Computing 2015 (ICRTC-2015).
P. N. S. Chandolikar and P. (Dr. . V.D. Nandavadekar, “Selection of Relevant Feature for Intrusion Attack Classification by Analyzing KDD Cup 99,” MIT Int. J. Comput. Sci. Inf. Technol., vol. 2, no. 2, pp. 85–90, 2012.
“KDD Cup 1999 Data.” [Online]. Available: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. [Accessed: 02-Agustus-2019].
Weka machine learning tool available on http://www.cs.waikato.ac.nz/ml/weka/downloading.html
Witten, I. et al. 1999. Weka: Practical machine learning tools and techniques with java implementations.
Lakshmi Devasena C, “Comparative Analysis of Random Forest, REP Tree and J48 Classifiers for Credit Risk Prediction,” International Journal of Computer Applications (0975 – 8887) ,(ICCCMIT-2014), 30-36.
R. Bace and P. Mell, “Intrusion Detection System,” NIST Spec. Publ. Intrusion Detect. Syst., pp. 1–51, 2001.
Federal Office for Information Security (BSI), “Industrial Control System Security Top 10 Threats and Countermeasures 2019,” 2019.
Symantec Corporation, “Internet Security Threat Report 2019 Appendices,” Internet Secur. Threat Rep., vol. 24, February, 2019.
Turban Efraim., E Jay., Aronson., Liang Ting-Peng, Decision Support System and Intelligent System. Andi Offset, 2005
J., J. & Muthukumar, D. B., 2015. Intrusion Detection System (ID S): Anomaly Detection Using Outlier Detection Approach. Procedia Computer Science, Volume 48, pp. 338-346.
Lee, W., dan S. Stolfo .1998. Data Mining Approaches for Intrusion Detection. dalam 7th USENIX Security Symposium, San Antonio, TX.
DOI: https://doi.org/10.30873/simada.v2i2.1606
Refbacks
- There are currently no refbacks.
Jurnal SIMADA (Sistem Informasi dan Manajemen Basis Data)
Diatur by: Departemen Sistem Informasi IIB Darmajaya
Diterbitkan Oleh: IIB Darmajaya
Alamat: Jl. Z.A. Pagar Alam No. 93 Gedong Meneng, Bandar Lampung Lampung
Website: jurnal.darmajaya.ac.id, E-mail: simada@darmajaya.ac.id
View Jurnal SIMADA StatCounter
Jurnal SIMADA is licensed under a Creative Commons Attribution 4.0 International License.