Penerapan Algoritma Isolation Forest dan Metode Rule Based untuk Deteksi Serangan Brute Force
Abstract
Keywords
Full Text:
PDFReferences
Alpaydin, E., 2020. Introduction to machine learning. MIT Press.
Bejtlich, R., 2014. The practice of network security monitoring: Understanding incident detection and response. No Starch Press.
Buczak, A. L., Guven, E.. 2021. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153–1176.
Chandola, V., Banerjee, A., Kumar, V., 2021. Anomaly detection: A survey. ACM Computing Surveys, 41(3), 1–58.
Chandravathi, B., Rao, K. S., Reddy, A. V., 2024. Network forensic analysis using Wireshark and machine learning techniques. Journal of Network and Computer Applications, 224, 103567.
Chua, Y., Lim, W., Wong, K., 2024. Isolation Forest based anomaly detection for network intrusion detection systems. Computers & Security, 134, 103455.
Hidayat, R., Kurniawan, F., 2021. Analisis forensik jaringan menggunakan Wireshark untuk mendeteksi serangan brute force. Jurnal Keamanan Informasi, 7(2), 85–94.
Khan, M. A., Karim, A., Kim, Y., 2022. A scalable machine learning based intrusion detection system for networks. Future Generation Computer Systems, 128, 83–95.
Kurose, J. F., Ross, K. W., 2021. Computer networking: A top-down approach. Pearson.
Liu, F. T., Ting, K. M., Zhou, Z. H. 2008. Isolation Forest. Proceedings of the IEEE International Conference on Data Mining, 413–422.
Mubarok, A., Romli, R., 2025. Rule-based and machine learning approaches for brute force attack detection. Journal of Network Security, 14(1), 22–35.
Raza, M., Rafiq, A., Iqbal, S., 2021. Detection of brute force attacks using machine learning techniques. Journal of Information Security and Applications, 58, 102713.
Schneier, B., 2018. Click here to kill everybody: Security and survival in a hyper- connected world. W. W. Norton & Company.
Stallings, W., 2020. Network security essentials: Applications and standards. Pearson.
Wireshark Foundation. 2023. Wireshark user’s guide. https://www.wireshark.org
DOI: http://dx.doi.org/10.33087/jiubj.v26i1.6425
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
|



