Implementasi Recurrent Neural Network Sebagai IDS Terhadap Serangan Jaringan
Abstract
In recent years, a new term has emerged which is now widely applied as IDS (Intrusion Detection System), namely Deep Learing. One type of Deep – Learing is RNN (Recurrent Neural Network) which has recently been applied to IDS. Cyber attacs cannot be avoided, but they can be anticipated by building a system than can detect the performance of network data flows so that users can avoid all kinds of attacks and intrusion attempts from unknown parties. This research aims to test and analyse the accurary and speed of the Recurrent Neural Network in detecting attacks. The method used for this research is RNN, which is operated through the Python and Google Colab programs. Based on the results, the model was trained with 50 epochs resulting in an accurary of 92%. Meanwhile, a model with 30 epochs produces an accurary of 99%. So, the model can work well on training data with a total of 30 epochs.
Downloads
References
[2] Rizaldi, A. (2022). Pengembangan Cyber Security Indonesia Dalam Upaya Menghadapi Ancaman Cyber Crime Melalui Badan Siber Dan Sandi Negara (BSSN). Universitas Muhammadiyah Malang.
[3] Sutarti and Alif Alfiyansyah, “Analisis dan Implementasi Sistem Monitoring Koneksi Internet Menggunakan The Dude Di STIKOM Al Khairiyah,” J. Sist. Inf., vol. 4, no. 1, pp. 45–45, Oct. 2017.
[4] J. Jabez and B. Muthukumar, “Instrusion detection System (IDS): Anomaly Detection Using Outlier Detection Approach. Procedia Computer Science ,” Procedia Comput. Sci., vol. 48, no. 1, pp. 346–346, May 2015.
[5] R. Vinayakumar, Mamoun Alazab, K.P. Soman, Prabaharan Poornachandran, Ameer Al-Nemrat, and Sitalakshmi Venkatraman, “Deep Learning Approach For Intelligent Instrusion Detection System,” IEEE, vol. 7, no. 1, pp. 41525–41550, Apr. 2019.
[6] Malabay. (2021). Pemanfaatan Flowchart Untuk Kebutuhan Deskripsi Proses Bisnis. Jurnal Ilmu Komputer, 12(1), 21–26. Https://Digilib.Esaunggul.Ac.Id/Pemanfaatan-Flowchart-Untuk-Kebutuhan-Deskripsi-Proses-Bisnis-9347.Html.
[7] Muhammad Rizki, Setio Basuki, and Yufis Azhar, “Implementasi Deep Learning Menggunakan Arsitektur Long Short Term Memory(LSTM) Untuk Prediksi Curah Hujan Kota Malang.,” J. Rpositor, vol. 2, no. 3, pp. 338–338, Mar. 2020.
[8] E. D. Tarkus, S. R. U. A. Sompue, dan A. Jacobus, "Implementasi Metode Recurrent Neural Network pada Pengklasifikasian Kualitas Telur Puyuh," J. Tek. Imform., vil. 15, no. 2, hal 137-144,2020, doi: 10.35793/jti.v15i2.29552.
[9] D. S. Winantio, Eko Arip, Kurniabudi, Sharipuddin, Ibnu Sani Wijaya, “Deteksi Serangan Pada Jaringan Kompleks IoT Menggunakan Recurrent Neural Network,” J. Ris. Komput., vol. 9, no. 6, 2022, doi: htpp://dx.doi.org/10.30865/jurikom.v9i6.5298.
[10] Sugiarti, Y., & Sulaeman, O. (2015). Rancang Bangun Knowledge Management System Bahan Ajar Online Dalam Meningkatkan Kompetensi Guru Mts Negeri 2 Pamulang. Jti (Jurnal Teknik Informatika) Uin Syarif Hidayatullah, 1–6.
[11] Sugiarti, Y., & Sulaeman, O. (2015). Rancang Bangun Knowledge Management System Bahan Ajar Online Dalam Meningkatkan Kompetensi Guru Mts Negeri 2 Pamulang. Jti (Jurnal Teknik Informatika) Uin Syarif Hidayatullah, 1–6.
[12] Mamay Syani, “Implementasi Intrusion Detection System (IDS) Menggunakan Suricata Pada Linux Debian 9 Berbasis Cloud Virtual Private Servers (VPS),” J. Inkofar, vol. 1, no. 1, pp. 9–9, Aug. 2020.
[13] I Komang Setia Buana, “Implementasi Aplikasi Speech To Text Untuk Memudahkan Wartawan Mencatat Wawancara Dengan Python,” J. Sist. dan Inform., vol. 14, no. 2, pp. 135–142, Aug. 2020.
[14] Suyanto, Ramadhani, K. N., & Mandala, S. (2019). Deep Learning Modernisasi Machine Learning Untuk Big Data. Penerbit INFORMATIKA
[15] Michelucci, U. (2019), Advanced Applied Deep Learning Convolution Neural Networks and Object Detection. SSBM Finence Inc.
[16] Primartha, R. (2018). Belajar Machine Learning Teori Dan Praktik. Penerbit INFORMATIKA.
[17] W. Seok, Y. Kim, and C. Park, “Pattern Recognition Of Human Arm Movement Using Deep Reinforcement Learning Intelligent Information System And Embedded Software Engineering,” Kwangwoon Univ., pp. 917–919, 2018.
[18] Noertjahyana, A., & Adipranata, R. (2020). Ipsec Sebagai Salah Satu Solusi Keamanan Data Pada Jaringan Komputer. Seminar Nasional Aplikasi Teknologi Informasi, 2005(Snati).
[19] Rahino, B. G, & Susila A. (2022). Implementasi Jaringan VPN (L2TPIpsec) Mikrotik Untuk Remote Accsess Sebagai Security Selama Work From Home. Jurnal Ilmu Komputer dan Science, 1(11), 1911-1918.
[20] Dalia Ezzat, Aboul Ella Hassanien, and Hassan Aboul Ella, “An Optimized Deep Learning Architecture For The Diagnosis Of Covid-19 Disease Based On Gravitational Search Optimization,” Appl. Soft Comput., vol. 98, Jan. 2021.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.