Judul COMPARISON ANALYSIS BETWEEN DBN-ISOLATION FOREST AND DBN-SVM IN DETECTING CYBER ATTACKS
Pengarang GILANG PRAKOSO
Hondor Saragih
Teddy Mantoro
Bisyron Wahyudi
Aulia Khamas Heikmakhtiar
Danang Rimbawa
Penerbitan Bogor : Universitas Pertahanan Republik Indonesia, 2024
Subjek Rekayasa Perangkat Siber -- Cybersecurity -- Deep Belief Network -- Isolation Forest -- Support Vector Machine -- Detection
Catatan This study addresses the growing attack of cyber-attacks on computer internet networks, in critical information infrastructure. The study attempts to improve detection in these networks by comparing three methods: Deep Belief Network (DBN), DBN with Isolation Forest, and DBN with Support Vector Machine. The quantitative methodology assesses the effectiveness and accuracy of various procedures in detecting abnormalities and provides numerical performance metrics. The results suggest that DBN alone is an excellent detection method for attacks, with good accuracy, precision, and recall. Furthermore, collaborative models that include DBN, Isolation Forest, and SVM show enhanced overall performance by exploiting the benefits of each method. This study has major implications for addressing security flaws and inefficiency in detection on internet networks, which is consistent with the problems raised earlier. The favorable findings of this study provide hope for the application of DBN technology, which will enable the strengthening of cybersecurity systems under legislation such as the Presidential Regulation on the Protection of Critical Information Infrastructure. The integration of DBN with other detection methods appears to be a promising strategy for improving security and contributing positively to national cyber defense.
Bentuk Karya Tidak ada kode yang sesuai
Target Pembaca Tidak ada kode yang sesuai

 
Informasi: Di sini Anda dapat mengakses seluruh konten digital yang tersedia untuk koleksi ini. Tombol "Baca Buku" di bawah sampul hanya menampilkan file pertama sebagai preview.
No Nama File Nama File Format Flash Format Aksi
1 3d789d50823cb07373ba8d9905d707ec.pdf 3d789d50823cb07373ba8d9905d707ec.pdf pdf Baca
2 98a3955560291fd440a2c61bf6456100.pdf 98a3955560291fd440a2c61bf6456100.pdf pdf Baca
3 791dceb5dfcd1cc2067879c78e67cb08.pdf 791dceb5dfcd1cc2067879c78e67cb08.pdf pdf Baca
4 dce8efae8146cabdfa089fe784ad808e.pdf dce8efae8146cabdfa089fe784ad808e.pdf pdf Baca
5 4238749908dea6bbe41cc2510cb20b4d.pdf 4238749908dea6bbe41cc2510cb20b4d.pdf pdf Baca
Informasi: Di sini Anda dapat melihat ketersediaan eksemplar fisik koleksi ini di perpustakaan beserta lokasinya.
No No Barcode No. Panggil Akses Lokasi Ketersediaan Aksi
Tag Ind1 Ind2 Isi
001 INLIS000000000003119
005 20260212101730
008 260212################|##########|#|##
035 # # $a 0010-1225003119
041 $a en
082 # # $a NONE
100 0 # $a GILANG PRAKOSO
245 1 # $a COMPARISON ANALYSIS BETWEEN DBN-ISOLATION FOREST AND DBN-SVM IN DETECTING CYBER ATTACKS
260 # # $a Bogor :$b Universitas Pertahanan Republik Indonesia,$c 2024
500 # # $a This study addresses the growing attack of cyber-attacks on computer internet networks, in critical information infrastructure. The study attempts to improve detection in these networks by comparing three methods: Deep Belief Network (DBN), DBN with Isolation Forest, and DBN with Support Vector Machine. The quantitative methodology assesses the effectiveness and accuracy of various procedures in detecting abnormalities and provides numerical performance metrics. The results suggest that DBN alone is an excellent detection method for attacks, with good accuracy, precision, and recall. Furthermore, collaborative models that include DBN, Isolation Forest, and SVM show enhanced overall performance by exploiting the benefits of each method. This study has major implications for addressing security flaws and inefficiency in detection on internet networks, which is consistent with the problems raised earlier. The favorable findings of this study provide hope for the application of DBN technology, which will enable the strengthening of cybersecurity systems under legislation such as the Presidential Regulation on the Protection of Critical Information Infrastructure. The integration of DBN with other detection methods appears to be a promising strategy for improving security and contributing positively to national cyber defense.
650 4 $a Rekayasa Perangkat Siber -- Cybersecurity -- Deep Belief Network -- Isolation Forest -- Support Vector Machine -- Detection
700 0 # $a Aulia Khamas Heikmakhtiar
700 0 # $a Bisyron Wahyudi
700 0 # $a Danang Rimbawa
700 0 # $a Hondor Saragih
700 0 # $a Teddy Mantoro
Content Unduh katalog