Implementation of Web Mining Technology to Investigate the Hacking Techniques and Intrusion Attempt Relationships

Aditya, Dimas and Indrajit, R. Eko and Purnama, James (2009) Implementation of Web Mining Technology to Investigate the Hacking Techniques and Intrusion Attempt Relationships. Bachelor thesis, Swiss German University.

[img]
Preview
Text
Dimas Aditya 1-2105-008 TOC.pdf

Download (2MB) | Preview
[img] Text
Dimas Aditya 1-2105-008 1.pdf
Restricted to Registered users only

Download (2MB)
[img] Text
Dimas Aditya 1-2105-008 2.pdf
Restricted to Registered users only

Download (2MB)
[img] Text
Dimas Aditya 1-2105-008 3.pdf
Restricted to Registered users only

Download (2MB)
[img] Text
Dimas Aditya 1-2105-008 4.pdf
Restricted to Registered users only

Download (2MB)
[img] Text
Dimas Aditya 1-2105-008 5.pdf
Restricted to Registered users only

Download (2MB)
[img]
Preview
Text
Dimas Aditya 1-2105-008 Ref.pdf

Download (2MB) | Preview

Abstract

The number of Indonesian internet user growing rapidly over past 5 years that more than thirty million Indonesian people connected to the internet for business, education, entertainment, and other social interactions purposes. The internet cyber attacks also increase along with the number of emerging exploits, hacking tools and information. . Based on that situation, IDSIRTII (Indonesia Security Incident Response Team) wants to conduct further investigation to find relationship of emerging hacking information and tutorials in Indonesian hacker community websites and cyber attack pattern detected by IDSIRTII. The result of this research is needed to make new solutions that regulate hacking information flows in media. Two kind approaches are needed to find the relationship, Nutch web mining tools use to find related contents and deep observations of hacking community websites to find community member characteristics, type of posts, and information trends. The research found that there are relationships and phenomena of emerging hacking information in hacker community websites with ID-SIRTII Indonesian cyber attack report and some new solutions proposed by the author to solve the problem.

Item Type: Thesis (Bachelor)
Subjects: Q Science > QA Mathematics > QA76 Computer software > > QA76.91 Data mining
Q Science > QA Mathematics > QA76 Computer software > > QA76.93 Computer networks--Security measures
T Technology > T Technology (General) > T58.5 Information technology
T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK5105 Web Sites-Design > TK5105.59 Intrusion detection systems (Computer security, Firewalls
Divisions: Faculty of Engineering and Information Technology > Department of Information Technology
Depositing User: Astuti Kusumaningrum
Date Deposited: 04 Nov 2020 02:38
Last Modified: 04 Nov 2020 02:38
URI: http://repository.sgu.ac.id/id/eprint/993

Actions (login required)

View Item View Item