Distribusi Intrusion Detection System Rules Dengan Menggunakan Algoritma RSA pada Cloud Computing

Zakka Muhammad Shiddiq, - (2018) Distribusi Intrusion Detection System Rules Dengan Menggunakan Algoritma RSA pada Cloud Computing. S1 thesis, Universitas Pendidikan Indonesia.

[img] Text
S_KOM_1405201_Title.pdf

Download (623kB)
[img] Text
S_KOM_1405201_Chapter1.pdf

Download (397kB)
[img] Text
S_KOM_1405201_Chapter2.pdf
Restricted to Staf Perpustakaan

Download (632kB)
[img] Text
S_KOM_1405201_Chapter3.pdf

Download (522kB)
[img] Text
S_KOM_1405201_Chapter4.pdf
Restricted to Staf Perpustakaan

Download (1MB)
[img] Text
S_KOM_1405201_Chapter5.pdf

Download (376kB)
[img] Text
S_KOM_1405201_Appendix.pdf
Restricted to Staf Perpustakaan

Download (12kB)
Official URL: http://repository.upi.edu

Abstract

ABSTRAK Pada penelitian sebelumnya telah dilakukan perubahan log honeypot menjadi rules Intrusion Detection System (IDS). Pada penelitian ini, dilakukan pengembangan lebih lanjut pada rules IDS tersebut. Rules IDS yang telah diubah kemudian didistribusikan dan diaplikasikan ke dalam lingkungan cloud computing. Pada proses pendistribusian, algoritma RSA diaplikasikan untuk melakukan verifikasi keaslian dari rules yang didistribusikan. Selain itu, pada penelitian ini algoritma BFS digunakan untuk mempercepat proses pendistribusian rules pada Virtual Machine di dalam cloud. Hasil dari penelitian ini menunjukkan bahwa RSA layak digunakan sebagai algortima verifikasi rules. Penelitian ini juga membuktikan bahwa penggunaan algoritma BFS dapat mempercepat proses distribusi rules. Kata Kunci: Rivest-Shamir-Adleman, SHA-256 Digital signature, Breadth first search, Cloud computing ABSTRACT On previous research, honeypot logs were converted into Intrusion Detection System (IDS) rules. On this research that matters were developed further more. IDS rules that were converted, then distributed and aplicated into cloud computing environment. At the distribution process, RSA algorithms were used for verificating the authenticity of the rules that was distributed. Other than RSA, this research were using Breadth First Search (BFS) to speed up the distribution process. This research proves that RSA algorithm can be used as rules verificator. This research also proves that BFS algorithm are able to speed up the distribution process. Keyword: Rivest-Shamir-Adleman, SHA-256 Digital signature, Breadth first search, Cloud computing

Item Type: Thesis (S1)
Additional Information: No. Panggil: S KOM ZAK d-2019; Pembimbing: I. Rizky Rachman, II. Wahyudin; NIM: 1405201
Uncontrolled Keywords: Rivest-Shamir-Adleman, SHA-256 Digital signature, Breadth first search, Cloud computing
Subjects: L Education > L Education (General)
Q Science > QA Mathematics > QA76 Computer software
Divisions: Fakultas Pendidikan Matematika dan Ilmu Pengetahuan Alam > Program Studi Ilmu Komputer
Depositing User: Zakka Muhammad Shiddiq
Date Deposited: 17 Jan 2020 09:58
Last Modified: 17 Jan 2020 09:58
URI: http://repository.upi.edu/id/eprint/36594

Actions (login required)

View Item View Item