IMPLEMENTASI INTRUSION DETECTION SYSTEM SEBAGAI KEAMANAN WEB SERVER UNIVERSITAS DEHASEN BENGKULU
نویسندگان
چکیده
منابع مشابه
Web Server Logs Preprocessing for Web Intrusion Detection
Securing e-commerce sites has become a necessity as they process critical and sensitive data to customers and organizations. When a customer navigates through an e-commerce site his/her clicks are recorded in web log file. Analyzing these log files using data mining reveal many interesting patterns. These results are used in many different applications and recently in detecting attacks on web. ...
متن کاملEvaluasi Celah Keamanan Web Server pada LPSE Kota Palembang
Along the development of information technology systems among the public at large, also develops information systems to facilitate the public to access and search for information in the form of a website. Electronic Procurement Service (LPSE) Palembang is a business unit set up to organize the service system of government procurement of goods or services electronically. And to allow companies o...
متن کاملSensorWebIDS: a web mining intrusion detection system
Purpose of this Paper: Paper proposes a web intrusion detection system, SensorWebIDS, which applies data mining, anomaly and misuse intrusion detection on web environment. Design Approach: SensorWebIDS has three main components: the Network Sensor for extracting parameters from real-time network traffic, the Log Digger for extracting parameters from web log files and the Audit Engine for analyz...
متن کاملSelf-adaptive web intrusion detection system
The evolution of the web server contents and the emergence of new kinds of intrusions make necessary the adaptation of the intrusion detection systems (IDS). Nowadays, the adaptation of the IDS requires manual – tedious and unreactive – actions from system administrators. In this paper, we present a self-adaptive intrusion detection system which relies on a set of local model-based diagnosers. ...
متن کاملDesigning Intrusion Detection System for Web Documents Using Neural Network
Cryptographic systems are the most widely used techniques for information security. These systems however have their own pitfalls as they rely on prevention as their sole means of defense. That is why most of the organizations are attracted to the intrusion detection systems. The intrusion detection systems can be broadly categorized into two types, Anomaly and Misuse Detection systems. An anom...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Pseudocode
سال: 2015
ISSN: 2655-1845,2355-5920
DOI: 10.33369/pseudocode.1.2.155-169