| Judul | COMPARISON ANALYSIS BETWEEN DBN-ISOLATION FOREST AND DBN-SVM IN DETECTING CYBER ATTACKS |
| Pengarang | GILANG PRAKOSO Hondor Saragih Teddy Mantoro Bisyron Wahyudi Aulia Khamas Heikmakhtiar Danang Rimbawa |
| Penerbitan | Bogor : Universitas Pertahanan Republik Indonesia, 2024 |
| Subjek | Rekayasa Perangkat Siber -- Cybersecurity -- Deep Belief Network -- Isolation Forest -- Support Vector Machine -- Detection |
| Catatan | This study addresses the growing attack of cyber-attacks on computer internet networks, in critical information infrastructure. The study attempts to improve detection in these networks by comparing three methods: Deep Belief Network (DBN), DBN with Isolation Forest, and DBN with Support Vector Machine. The quantitative methodology assesses the effectiveness and accuracy of various procedures in detecting abnormalities and provides numerical performance metrics. The results suggest that DBN alone is an excellent detection method for attacks, with good accuracy, precision, and recall. Furthermore, collaborative models that include DBN, Isolation Forest, and SVM show enhanced overall performance by exploiting the benefits of each method. This study has major implications for addressing security flaws and inefficiency in detection on internet networks, which is consistent with the problems raised earlier. The favorable findings of this study provide hope for the application of DBN technology, which will enable the strengthening of cybersecurity systems under legislation such as the Presidential Regulation on the Protection of Critical Information Infrastructure. The integration of DBN with other detection methods appears to be a promising strategy for improving security and contributing positively to national cyber defense. |
| Bentuk Karya | Tidak ada kode yang sesuai |
| Target Pembaca | Tidak ada kode yang sesuai |
Informasi: Di sini Anda dapat mengakses seluruh konten digital yang tersedia untuk koleksi ini.
Tombol "Baca Buku" di bawah sampul hanya menampilkan file pertama sebagai preview.
| No | Nama File | Nama File Format Flash | Format | Aksi |
|---|---|---|---|---|
| 1 | 3d789d50823cb07373ba8d9905d707ec.pdf | 3d789d50823cb07373ba8d9905d707ec.pdf | Baca | |
| 2 | 98a3955560291fd440a2c61bf6456100.pdf | 98a3955560291fd440a2c61bf6456100.pdf | Baca | |
| 3 | 791dceb5dfcd1cc2067879c78e67cb08.pdf | 791dceb5dfcd1cc2067879c78e67cb08.pdf | Baca | |
| 4 | dce8efae8146cabdfa089fe784ad808e.pdf | dce8efae8146cabdfa089fe784ad808e.pdf | Baca | |
| 5 | 4238749908dea6bbe41cc2510cb20b4d.pdf | 4238749908dea6bbe41cc2510cb20b4d.pdf | Baca |
Informasi: Di sini Anda dapat melihat ketersediaan eksemplar fisik koleksi ini di perpustakaan beserta lokasinya.
| No | No Barcode | No. Panggil | Akses | Lokasi | Ketersediaan | Aksi |
|---|
| Tag | Ind1 | Ind2 | Isi |
| 001 | INLIS000000000003119 | ||
| 005 | 20260212101730 | ||
| 008 | 260212################|##########|#|## | ||
| 035 | # | # | $a 0010-1225003119 |
| 041 | $a en | ||
| 082 | # | # | $a NONE |
| 100 | 0 | # | $a GILANG PRAKOSO |
| 245 | 1 | # | $a COMPARISON ANALYSIS BETWEEN DBN-ISOLATION FOREST AND DBN-SVM IN DETECTING CYBER ATTACKS |
| 260 | # | # | $a Bogor :$b Universitas Pertahanan Republik Indonesia,$c 2024 |
| 500 | # | # | $a This study addresses the growing attack of cyber-attacks on computer internet networks, in critical information infrastructure. The study attempts to improve detection in these networks by comparing three methods: Deep Belief Network (DBN), DBN with Isolation Forest, and DBN with Support Vector Machine. The quantitative methodology assesses the effectiveness and accuracy of various procedures in detecting abnormalities and provides numerical performance metrics. The results suggest that DBN alone is an excellent detection method for attacks, with good accuracy, precision, and recall. Furthermore, collaborative models that include DBN, Isolation Forest, and SVM show enhanced overall performance by exploiting the benefits of each method. This study has major implications for addressing security flaws and inefficiency in detection on internet networks, which is consistent with the problems raised earlier. The favorable findings of this study provide hope for the application of DBN technology, which will enable the strengthening of cybersecurity systems under legislation such as the Presidential Regulation on the Protection of Critical Information Infrastructure. The integration of DBN with other detection methods appears to be a promising strategy for improving security and contributing positively to national cyber defense. |
| 650 | 4 | $a Rekayasa Perangkat Siber -- Cybersecurity -- Deep Belief Network -- Isolation Forest -- Support Vector Machine -- Detection | |
| 700 | 0 | # | $a Aulia Khamas Heikmakhtiar |
| 700 | 0 | # | $a Bisyron Wahyudi |
| 700 | 0 | # | $a Danang Rimbawa |
| 700 | 0 | # | $a Hondor Saragih |
| 700 | 0 | # | $a Teddy Mantoro |
Content Unduh katalog
Karya Terkait :