085296655112

Reinhard Ruben Rumare, Henning Titi Ciptaningtyas
Submission Date: 2017-07-25 14:36:18
Accepted Date: 2018-01-09 21:27:32

Abstract


Serangan digital saat ini jenisnya sangat banyak. Tiap hari jumlahnya juga selalu meningkat. Untuk mendeteksinya, ada banyak aplikasi yang menggunakan berbagai jenis metode untuk mendeteksi serangan – serangan yang ada. Riset – riset sebelumnya sudah menunjukkan bahwa analisis berlevel bite dari lalu lintas jaringan dapat digunakan untuk mendeteksi serangan dan analisis lalu lintas jaringan. Pada paper ini, penulis menggunakan 5 jenis teknik n-gram untuk mendeteksi serangan HTTP. Tujuannya adalah untuk membuat sebuah pertahanan pertama untuk serangan HTTP. Teknik – teknik n-gram ini dianalisa berdasarkan tingkat akurasi dan performanya. Hasil dari tes – tes yang dilakukan membuktikan bahwa teknik yang digunakan memiliki tingkat akurasi dan performa yang memuaskan.

Keywords


Analisis Byte; Analisis N-gram; Chi-squared Distance; Pearson Chi-squared Test; Serangan HTTP

References


"Symantec Internet Security Threat Report, Vol. 17," [Online]. Available: http://www.symantec.com/threatreport/.

A. Z. Broder, S. C. Glassman, M. S. Manasse and G. Zweig, "Syntactic clustering of the web," vol. 29, no. 8-13, 1997.

G. W. Snedecor and W. G. Cochran, Statistical Method, Eigth Edition, Iowa State University Press, 1989.

"http://www.ling.upenn.edu/~clight/chisquared.htm," [Online]. Available: http://www.ling.upenn.edu/~clight/chisquared.htm. [Accessed 3 July 2015].

P. R and e. a. , "McPAD: a multiple classifier system for accurate payload-based anomaly detection.," Computer Networks: The International Journal of Computer and Telecommunications Networking, 2009.

W. K and S. S. , "Anomalous payload-based network intrusion detection," In: Proceedings of the 7th international conference on recent advances in intrusion detection, 2004.

T. A and S. M. , "Chi-squared distance and metamorphic virus detection," Journal of Computer Virology and Hacking Techniques, 2013.

A. I and L. K, "Classification of packet contents for malware detection," Journal of Computer Virology, 2011.


Full Text: PDF

CC Licencing


Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).

Refbacks

  • There are currently no refbacks.


Creative Commons License
Jurnal Teknik ITS by Lembaga Penelitian dan Pengabdian Kepada Masyarakat, LPPM-ITS is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Based on a work at http://ejurnal.its.ac.id/index.php/teknik.
Statistik Pengunjung