• Tidak ada hasil yang ditemukan

A Bachelor’s Thesis Submitted to the Faculty of INFORMATION TECHNOLOGY

N/A
N/A
Nguyễn Gia Hào

Academic year: 2023

Membagikan "A Bachelor’s Thesis Submitted to the Faculty of INFORMATION TECHNOLOGY"

Copied!
8
0
0

Teks penuh

(1)

By Dimas Aditya

A Bachelor’s Thesis Submitted to the Faculty of INFORMATION TECHNOLOGY

in partial fulfillment of the requirements for the Degree of

BACHELOR OF SCIENCES

WITH A MAJOR IN INFORMATION TECHNOLOGY

SWISS GERMAN UNIVERSITY Campus German Centre Bumi Serpong Damai – 15321

Island of Java, Indonesia

www.sgu.ac.id

(2)

July 2009

(3)

STATEMENT BY THE AUTHOR

I hereby declare that this submission is my own work and to the best of my knowledge, it contains no material previously published or written by another person, nor material which to a substantial extent has been accepted for the award of any other degree or diploma at any educational institution, except where due acknowledgement is made in the thesis.

_______________________________________ ________________

Dimas Aditya, CEH Date

Approved by:

________________________________________ __________________

Prof. Dr. Ir. Richardus Eko Indrajit, M.Sc. MBA. MA. MPhil Date

________________________________________ __________________

James Purnama. M.Sc. Date

______________________________________ _________________

Chairman of the Examination Steering Committee Date

(4)

ABSTRACT

IMPLEMENTATION OF WEB MINING TECHNOLOGY TO INVESTIGATE THE HACKING TECHNIQUES AND INTRUSION ATTEMPT RELATIONSHIP.

CASE STUDY: IDSIRTII.

By

Dimas Aditya

SWISS GERMAN UNIVERSITY Bumi Serpong Damai

Prof. Dr. Ir. Richardus Eko Indrajit, M.Sc. MBA. MA. MPhil, Thesis Advisor James Purnama, M.Sc., Thesis Co-Advisor

The number of Indonesian internet user growing rapidly over past 5 years that more than thirty million Indonesian people connected to the internet for business, education, entertainment, and other social interactions purposes. The internet cyber attacks also increase along with the number of emerging exploits, hacking tools and information.

.

Based on that situation, IDSIRTII (Indonesia Security Incident Response Team) wants to conduct further investigation to find relationship of emerging hacking information and tutorials in Indonesian hacker community websites and cyber attack pattern detected by ID- SIRTII. The result of this research is needed to make new solutions that regulate hacking information flows in media.

Two kind approaches are needed to find the relationship, Nutch web mining tools use to find related contents and deep observations of hacking community websites to find community member

characteristics, type of posts, and information trends

.

The research found that there are relationships and phenomena of emerging hacking

(5)

DEDICATION

I dedicate this thesis to my god Allah SWT, my beloved parents who support me all the time, my sister Ayu Nindya Sari, my lovely girlfriend Tyas Wuri Handayani, my best friend Rinaldi Yulius, Lina Setiawan, Nani Yasmin, Chairunnisa, and Henry, all of my lecturers from the first semester until this semester, all of my fellow students batch 2005, and all people can not be listed here whom gave me supports during my study and my thesis completion.

(6)

ACKNOWLEDGMENTS

The author wishes to express my thankfulness to Allah SWT for His blessings and guidance during my study in Swiss German University.

I would also like to convey my gratitude to my thesis advisor and co-advisor, Prof. Dr. Ir.

Richardus Eko Indrajit, M.Sc. MBA. MA. MPhil and James Purnama, M.Sc. for providing their valuable time in guiding and giving tutorial to me. It is my pride to work together with both of you.

To Dipl. Ing. Kho I Eng, as the new Dean of Information Technology Faculty, thank you for approving this thesis and supporting me until the completion of this thesis.

To Prof. Dr. Peter Pscheid, as the Rector of Swiss German University, thank you for giving me guidance to prepare my bachelor’s thesis in a proper manner.

To Mrs. Nona and Mr. Farhan, thank you for the support and providing me the materials, books, journals.

To all people in ID-SIRTII, thank you for your cooperation by providing me what are needed for this thesis.

To Mr. Anto Satriyo Nugroho, thank you for providing all information related to web mining.

To my parents, thank you for supporting me until the completion of this thesis.

To my girlfriend, thank you for supporting me every day.

To all of those who participated in finishing this thesis, thank you for your supports and attentions.

(7)

TABLE OF CONTENTS

LIST OF TABLES ... 9

LIST OF FIGURES ... 9

CHAPTER 1 INTRODUCTION ... 10

Background ... 10

Research Problems ... 11

Research Purposes ... 11

1.4. Significance of Study ... 11

1.5. Scope and Limitation ... 12

1.6. Research Questions ... 12

1.7. Research Propositions ... 12

1.8. Thesis Structure ... 12

CHAPTER 2 LITERATURE REVIEW ... 14

2.1. Web Content Mining ... 14

2.2. History of Intrusion Attack ... 19

2.3. Intrusion Detection ... 23

2.4. Hacker Definition ... 24

CHAPTER 3 METHODOLOGIES ... 41

3.1. Research Paradigm ... 41

3.2. Research Procedure and Mechanism ... 42

3.3. Sourcefire Data Gathering Phase ... 44

3.4. Web Mining Phase by Using Nutch 0.9 ... 45

CHAPTER 4 RESULT AND DISCUSSION ... 50

4.1. Indonesian Internet Profile and Security Issues ... 50

4.2. Hacker in Social Community Relationship ... 52

4.2. Pattern Phenomena of Attack ... 60

4.3. Attack Motivation ... 62

4.4. Hacker Tendency ... 63

4.5. Crawling Result ... 67

4.6. Indonesian Internet Traffic Log Analyze Phase ... 68

CHAPTER 5 CONCLUSION AND RECOMENDATION ... 73

5.1. New Findings ... 73

(8)

5.2. Propose Approach to Detect and Prevent Attacks ... 75

5.3. Future Works ... 78

5.4. Conclusion ... 78

APPENDIX A ... 79

GLOSSARY ... 80

REFERENCES ... 84

CURRICULUM VITAE ... 85

Referensi

Dokumen terkait

Castroand Eugénio Oliveira Chapter 3 Outsourcing Strategies of Full-Service Airlines: An Application of Two Theoretical Perspectives 99 Alison Rieple Chapter 4 The Pricing

Broadly defined as a collaboration of medical services with the tourism industry, healthcare tourism offers cost effective medical services for individuals who cannot afford these