Zakka Muhammad Shiddiq, - (2018) Distribusi Intrusion Detection System Rules Dengan Menggunakan Algoritma RSA pada Cloud Computing. S1 thesis, Universitas Pendidikan Indonesia.
Text
S_KOM_1405201_Title.pdf Download (623kB) |
|
Text
S_KOM_1405201_Chapter1.pdf Download (397kB) |
|
Text
S_KOM_1405201_Chapter2.pdf Restricted to Staf Perpustakaan Download (632kB) |
|
Text
S_KOM_1405201_Chapter3.pdf Download (522kB) |
|
Text
S_KOM_1405201_Chapter4.pdf Restricted to Staf Perpustakaan Download (1MB) |
|
Text
S_KOM_1405201_Chapter5.pdf Download (376kB) |
|
Text
S_KOM_1405201_Appendix.pdf Restricted to Staf Perpustakaan Download (12kB) |
Abstract
ABSTRAK Pada penelitian sebelumnya telah dilakukan perubahan log honeypot menjadi rules Intrusion Detection System (IDS). Pada penelitian ini, dilakukan pengembangan lebih lanjut pada rules IDS tersebut. Rules IDS yang telah diubah kemudian didistribusikan dan diaplikasikan ke dalam lingkungan cloud computing. Pada proses pendistribusian, algoritma RSA diaplikasikan untuk melakukan verifikasi keaslian dari rules yang didistribusikan. Selain itu, pada penelitian ini algoritma BFS digunakan untuk mempercepat proses pendistribusian rules pada Virtual Machine di dalam cloud. Hasil dari penelitian ini menunjukkan bahwa RSA layak digunakan sebagai algortima verifikasi rules. Penelitian ini juga membuktikan bahwa penggunaan algoritma BFS dapat mempercepat proses distribusi rules. Kata Kunci: Rivest-Shamir-Adleman, SHA-256 Digital signature, Breadth first search, Cloud computing ABSTRACT On previous research, honeypot logs were converted into Intrusion Detection System (IDS) rules. On this research that matters were developed further more. IDS rules that were converted, then distributed and aplicated into cloud computing environment. At the distribution process, RSA algorithms were used for verificating the authenticity of the rules that was distributed. Other than RSA, this research were using Breadth First Search (BFS) to speed up the distribution process. This research proves that RSA algorithm can be used as rules verificator. This research also proves that BFS algorithm are able to speed up the distribution process. Keyword: Rivest-Shamir-Adleman, SHA-256 Digital signature, Breadth first search, Cloud computing
Item Type: | Thesis (S1) |
---|---|
Additional Information: | No. Panggil: S KOM ZAK d-2019; Pembimbing: I. Rizky Rachman, II. Wahyudin; NIM: 1405201 |
Uncontrolled Keywords: | Rivest-Shamir-Adleman, SHA-256 Digital signature, Breadth first search, Cloud computing |
Subjects: | L Education > L Education (General) Q Science > QA Mathematics > QA76 Computer software |
Divisions: | Fakultas Pendidikan Matematika dan Ilmu Pengetahuan Alam > Program Studi Ilmu Komputer |
Depositing User: | Zakka Muhammad Shiddiq |
Date Deposited: | 17 Jan 2020 09:58 |
Last Modified: | 17 Jan 2020 09:58 |
URI: | http://repository.upi.edu/id/eprint/36594 |
Actions (login required)
View Item |