Analisis Metode K-Nearest Neighbor Dan Metode SVM Pada Log Serangan Jaringan Untuk Rekomendasi Keamanan Jaringan
Abstract
Keywords
Full Text:
PDFReferences
F. Fachri, “Optimasi Keamanan Web Server Terhadap Serangan Brute-Force Menggunakan Penetration Testing,” Jurnal Teknologi Informasi dan Ilmu Komputer, vol. 10, no. 1, pp. 51–58, 2023, doi: 10.25126/jtiik.20231015872.
A. Hermawan, T. Hartati, and Y. A. Wijaya, “Analisa Keamanan Data Melalui Website Zahra Software Menggunakan Metode Keamanan Informasi CIA Triad,” Jurnal Informatika: Jurnal Pengembangan IT, vol. 7, no. 3, pp. 125–130, 2022, doi: 10.30591/jpit.v7i3.3428.
S. Rahayu, Y. MZ, J. E. Bororing, and R. Hadiyat, “Implementasi Metode K-Nearest Neighbor (K-NN) untuk Analisis Sentimen Kepuasan Pengguna Aplikasi Teknologi Finansial FLIP,” Edumatic: Jurnal Pendidikan Informatika, vol. 6, no. 1, pp. 98–106, 2022, doi: 10.29408/edumatic.v6i1.5433.
T. Setiyorini and R. T. Asmono, “Penerapan Metode K-Nearest Neighbor Dan Gini Index Pada Klasifikasi Kinerja Siswa,” Jurnal Techno Nusa Mandiri, vol. 16, no. 2, pp. 121–126, 2019, doi: 10.33480/techno.v16i2.747.
L. V. Nguyen, Q. T. Vo, and T. H. Nguyen, “Adaptive KNN-Based Extended Collaborative Filtering Recommendation Services,” Big Data and Cognitive Computing, vol. 7, no. 2, 2023, doi: 10.3390/bdcc7020106.
O. A. Alkhudaydi, M. Krichen, and A. D. Alghamdi, “A Deep Learning Methodology for Predicting Cybersecurity Attacks on the Internet of Things,” Information (Switzerland), vol. 14, no. 10, 2023, doi: 10.3390/info14100550.
L. M. Pattnaik, P. K. Swain, S. Satpathy, and A. N. Panda, “Cloud DDoS Attack Detection Model with Data Fusion & Machine Learning Classifiers,” EAI Endorsed Transactions on Scalable Information Systems, vol. 10, no. 6, pp. 1–9, 2023, doi: 10.4108/eetsis.3936.
İ. Avcı and M. Koca, “Cybersecurity Attack Detection Model , Using Machine Learning Techniques,” vol. 20, no. 7, pp. 29–44, 2023.
G. Kaur and P. Gupta, “Detection of Distributed Denial of Service Attacks for IoT-Based Healthcare Systems,” vol. 30, no. 2, pp. 167–186, 2023, doi: 10.24423/cames.450.
D. Shivaramakrishna and M. Nagaratna, “A novel hybrid cryptographic framework for secure data storage in cloud computing : Integrating AES-OTP and RSA with adaptive key management and Time-Limited access control,” Alexandria Engineering Journal, vol. 84, no. September, pp. 275–284, 2023, doi: 10.1016/j.aej.2023.10.054.
A. Hossain and S. Islam, “Ensuring network security with a robust intrusion detection system using,” Array, vol. 19, no. May, p. 100306, 2023, doi: 10.1016/j.array.2023.100306.
K. F. Hasan, A. Akhter, M. A. Yousuf, F. Alharbi, and M. A. Moni, “A Dependable Hybrid Machine Learning Model for Network Intrusion Detection”.
G. D. E. C. Bertoli et al., “An End-to-End Framework for Machine Learning-Based Network Intrusion Detection System,” vol. 9, 2021, doi: 10.1109/ACCESS.2021.3101188.
Z. K. Maseer, R. Yusof, N. Bahaman, S. A. Mostafa, C. I. K. Feresa, and M. Foozy, “Benchmarking of Machine Learning for Anomaly Based Intrusion Detection Systems in the CICIDS2017 Dataset,” vol. 9, pp. 22351–22370, 2021, doi: 10.1109/ACCESS.2021.3056614.
N. Ali, “Comparative study between ( SVM ) and ( KNN ) classifiers by using ( PCA ) to improve of intrusion detection system,” vol. 1, no. June, pp. 22–33, 2022, doi: 10.52940/ijici.v1i1.4.
O. Alghushairy, R. Alsini, Z. Alhassan, A. Yafoz, and X. Ma, “An Efficient Support Vector Machine Algorithm Based Network Outlier Detection System,” vol. 12, no. February, 2024
DOI: https://doi.org/10.30743/jet.v11i1.13278
Refbacks
- There are currently no refbacks.
Copyright (c) 2026 Fadil Habib Nasution

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.





