Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 11821 dokumen yang sesuai dengan query
cover
"Written by leading researchers, this complete introduction brings together all the theory and tools needed for building robust machine learning in adversarial environments. Discover how machine learning systems can adapt when an adversary actively poisons data to manipulate statistical inference, learn the latest practical techniques for investigating system security and performing robust data analysis, and gain insight into new approaches for designing effective countermeasures against the latest wave of cyber-attacks. Privacy-preserving mechanisms and the near-optimal evasion of classifiers are discussed in detail, and in-depth case studies on email spam and network security highlight successful attacks on traditional machine learning algorithms. Providing a thorough overview of the current state of the art in the field, and possible future directions, this groundbreaking work is essential reading for researchers, practitioners and students in computer security and machine learning, and those wanting to learn about the next stage of the cybersecurity arms race."
Cambridge: Cambridge University Press, 2019
006.31 ADV
Buku Teks SO  Universitas Indonesia Library
cover
Mitchell, Tom M.
New York: McGraw-Hill, 1997
006.31 MIT m
Buku Teks SO  Universitas Indonesia Library
cover
Faul, A.C.
"The emphasis of the book is on the question of Why – only if why an algorithm is successful is understood, can it be properly applied, and the results trusted. Algorithms are often taught side by side without showing the similarities and differences between them. This book addresses the commonalities, and aims to give a thorough and in-depth treatment and develop intuition, while remaining concise."
London: CRC press, 2020
e20528988
eBooks  Universitas Indonesia Library
cover
Muhammad Farhan Haniftyaji
"Arsitektur 5G Core (5GC) menjawab permintaan akan koneksi berkecepatan tinggi dan aman dengan janji konektivitas yang lebih cepat dan keandalan jaringan yang lebih baik. Namun, tantangan keamanan siber terhadap serangan pada Session Management Function (SMF) melalui Packet Forwarding Control Protocol (PFCP) mendorong pengembangan Intrusion Detection System (IDS) menggunakan Machine Learning. Dataset yang digunakan dalam penelitian adalah 5G Core PFCP Intrusion Dataset milik George Amponis, dkk. Penelitian dilakukan dengan menggunakan metode fitur seleksi seperti filter dengan korelasi Pearson, embedded, dan wrapper dengan Recursive Feature Elimination (RFE). Model Machine Learning yang diujikan adalah Random Forest, Gradient Boost Machine (GBM), Light Gradient Boost Machine (LGBM), Extreme Gradient Boost (XGB), dan AdaBoost. Skenario penelitian dibuat menjadi dua berdasarkan data awal dari 5G Core PFCP Intrusion Dataset dengan lima kelas target dan skenario setelah dilakukan penggabungan pada serangan PFCP Session Modification Flood Attack menjadi empat kelas target. Penelitian mendapatkan bahwa kombinasi model GBM dengan metode seleksi fitur embedded pada skenario empat kelas target memiliki kinerja terbaik dalam mendeteksi serangan PFCP pada jaringan 5G Core dengan nilai akurasi sebesar 97,366%, presisi 97,383%, recall 97,366%, dan f1-score sebesar 97,375%.

The 5G Core (5GC) architecture addresses the demand for high-speed and secure connections with the promise of faster connectivity and better network reliability. However, cybersecurity challenges against attacks on the Session Management Function (SMF) through the Packet Forwarding Control Protocol (PFCP) drive the development of an Intrusion Detection System (IDS) using Machine Learning. The dataset used in the research is the 5G Core PFCP Intrusion Dataset by George Amponis, et al. Research was conducted using feature selection methods such as filters with Pearson correlation, embedded, and wrapper with Recursive Feature Elimination (RFE). The Machine Learning models tested were Random Forest, Gradient Boost Machine (GBM), Light Gradient Boost Machine (LGBM), Extreme Gradient Boost (XGB), and AdaBoost. The research scenarios were made into two based on the initial data from the 5G Core PFCP Intrusion Dataset with five target classes and the scenario after combining the PFCP Session Modification Flood Attack into four target classes. The research found that the combination of the GBM model with the embedded feature selection method in the four target classes scenario has the best performance in detecting PFCP attacks on the 5G Core network with an accuracy value of 97.366%, precision of 97.383%, recall of 97.366%, and f1-score of 97.375%."
Depok: Fakultas Teknik Universitas Indonesia, 2024
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
Zahra Rubena Putri
"Meningkatnya jumlah pengguna internet saat ini memberikan banyak dampak pada kehidupan manusia, karena internet menghubungkan banyak perangkat setiap hari. Perkembangan ini membawa berbagai dampak positif maupun dampak negatif. Salah satu dampak negatifnya adalah adanya aktivitas berbahaya yang dapat menyerang jaringan. Intrusion detection system merupakan sebuah sistem manajemen keamanan pada jaringan komputer. Data yang dimiliki intrusion detection system mempunyai fitur yang cukup banyak tetapi tidak semua fitur yang ada relevan dengan data yang digunakan dan jika data tersebut diolah akan memakan waktu yang cukup lama. Oleh karena itu, diperlukan pemilihan fitur untuk meningkatkan akurasi serta memperpendek waktu pembelajaran.
Beberapa metode pembelajaran sudah pernah diterapkan untuk menyelesaikan masalah intrusion detection system, seperti Na ? ve Bayes, Decision Tree, Support Vector Machines dan Neuro-Fuzzy Methods. Metode pemilihan fitur yang digunakan untuk skripsi ini adalah metode Chi-Square. Setelah dilakukan pemilihan fitur, akan didapatkan hasil berupa sebuah dataset baru yang kemudian akan diklasifikasi menggunakan metode Extreme Learning Machines. Hasilnya menunjukkan setelah dilakukan pemilihan fitur dengan metode Chi-Square, tingkat akurasi akan meningkat serta waktu yang dibutuhkan algoritma pembelajaran untuk menyelesaikan metode tersebut menjadi semakin singkat.

The increasing rates of internet users nowadays must be give much impacts to our lifes, because the internet things can connect more devices every day. This growth carriers several benefits as well as can attack the network. Intrusion detection system IDS are used as security management system. IDS can be used to detect suspicious activity or alert the system. IDS involves large number of data sets with several different features but not all features are relevant with the data sets and it takes long computational time to solve IDS data sets. Therefore, it has to do feature selection to remove the irrelevant features, to increase the accuracy and to shorten the computational time for the learning methods.
Many researches about learning method to solve intrusion detection system problem have been done to develop and test the best model from various classifiers, such as Na ve Bayes, Decision Tree, Support Vector Machines, and Neuro Fuzzy Methods. For this thesis, the feature selection methods will be used is Chi Square methods to reduce dimentionality of IDS data sets. The new IDS data sets with the best selected features are obtained afterwards, and then these new data sets will be classified with Extreme Learning Machines methods. The result denotes that Extreme Learning Machines classification methods provides better accuracy level while combined with Chi Square feature selection.
"
Depok: Fakultas Matematika dan Ilmu Pengetahuan Alam Universitas Indonesia, 2017
S-Pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
Rebala, Gopinath
"Just like electricity, Machine Learning will revolutionize our life in many ways-some of which are not even conceivable today. This book provides a thorough conceptual understanding of Machine Learning techniques and algorithms. Many of the mathematical concepts are explained in an intuitive manner. The book starts with an overview of machine learning and the underlying Mathematical and Statistical concepts before moving onto machine learning topics. It gradually builds up the depth, covering many of the present day machine learning algorithms, ending in Deep Learning and Reinforcement Learning algorithms. The book also covers some of the popular Machine Learning applications. The material in this book is agnostic to any specific programming language or hardware so that readers can try these concepts on whichever platforms they are already familiar with."
Switzerland: Springer Nature, 2019
e20506268
eBooks  Universitas Indonesia Library
cover
Vien Aulia Rahmatika
"Kepolisian Republik Indonesia (Polri) merupakan alat negara yang terus berusaha memberikan pelayanan publik secara prima salah satu nya dengan melakukan inovasi dengan memanfaatkan teknologi dalam memberikan pelayanan SIM melalui aplikasi bernama Digital Korlantas Polri. Namun sejak aplikasi tersebut diluncurkan pada tahun 2021 hingga tahun 2022 terdapat pemberitaan di berita online terkait kendala pada aplikasi dalam perpanjangan SIM online yang tidak berjalan sebagaimana semestinya. Penelitian ini bertujuan untuk melihat bagaimana pandangan masyarakat sebagai pengguna layanan dari Twitter dan Play Store. Data yang digunakan dalam penelitian ini berasal dari Twitter dan Play Store sebanyak 5944 data. Analisis dilakukan dengan membangun model klasifikasi relevansi, aspek, dan sentimen pada aspek reliability, efficiency, trust, dan citizen support. Algoritma yang digunakan yaitu Decision Tree, Logistic Regression, dan SVM. Hasil pemodelan klasifikasi dengan performa yang paling tinggi dalam klasifikasi relevansi, aspek, dan sentimen pada tiap aspek dihasilkan oleh algoritma Logistic Regression dengan TF-IDF unigram dan SMOTE. Pada model klasifikasi relevansi didapatkan nilai accuracy sebesar 87.05%, precision sebesar 87.38%, recall sebesar 87.04%, dan f1 score sebesar 87.16%. Pada model klasifikasi aspek, nilai accuracy sebesar 74.28%, precision sebesar 75.93%, recall sebesar 74.27%, dan f1 score sebesar 74.70%. Pada model klasifikasi sentimen pada masing-masing aspek, model klasifikasi sentimen pada aspek citizen support mendapatkan nilai yang paling tinggi dibanding aspek lain yaitu dengan nilai accuration sebesar 95.38%, precision sebesar 95.60%, recall sebesar 95.38%, dan f1-score sebesar 94.05%. Pada penelitian ini menghasilkan temuan sentimen pada masing-masing aspek dalam layanan perpanjang SIM online di aplikasi Digital Korlantas Polri dimana reliability merupakan aspek yang paling banyak dikemukakan dan mendapat sentimen negatif, kemudian diikuti oleh aspek efficiency, citizen support, dan aspek trust.

The Indonesian National Police (Polri) continues to strive to provide excellent public services, one of which is by innovating by utilizing technology in providing SIM services through an application called Digital Korlantas Polri. However, since the application was launched in 2021 to 2022 there have been reports in online news regarding problems with applications, so it is necessary to conduct research regarding how the public views the application as service users and maps these views into aspects which affect the quality of government services so that service providers can take improvement to realize excellent service delivery. The data used in this study are from Twitter and Play Store as many as 5944 data. The analysis is carried out by building a classification model of relevance, aspect, and sentiment on the aspects of reliability, efficiency, trust, and citizen support. The algorithms used are Decision Tree, Logistic Regression, and SVM. The results of classification modeling with the highest performance in the classification of relevance, aspect, and sentiment for each aspect were produced by the Logistic Regression algorithm with the TF-IDF unigram and SMOTE. In the relevance classification model, the accuracy value is 87.05%, precision is 87.38%, recall is 87.04%, and f1 score is 87.16%. In the aspect classification model, the accuracy value is 74.28%, precision is 75.93%, recall is 74.27%, and f1 score is 74.70%. In the sentiment classification model for each aspect, the sentiment classification model for the citizen support aspect gets the highest score compared to other aspects, namely with an accuracy value of 95.38%, a precision of 95.60%, a recall of 95.38%, and an f1-score of 94.05% . This study produced sentiment findings for each aspect of the online SIM service in the Digital Korlantas Polri application where reliability was the aspect that was most frequently raised and received negative sentiment, followed by aspects of efficiency, citizen support, and trust."
Depok: Fakultas Ilmu Komputer Universitas Indonesia, 2023
TA-pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
Arif Rahman Hakim
"Salah satu tantangan utama investigasi insiden kebocoran data adalah tidak tersedianya kerangka kerja spesifik yang sesuai dengan karakteristik insiden kebocoran, disertai langkah-langkah yang jelas dan memberikan hasil investigasi yang komprehensif. Tantangan lain berupa proses analisis terhadap logs berjumlah besar akan menghabiskan waktu dan berpotensi terjadi human-error bila dilakukan secara manual. Pendekatan machine learning (ML) dapat dijadikan solusi, namun kinerja ML seringkali tidak optimal dikarenakan kondisi ketidakseimbangan dataset. Untuk itu, pada penelitian ini dikembangkan kerangka kerja forensik digital baru yang bernama KARAFFE (Kalamullah Ramli–Arif Rahman Hakim–Forensic Framework for Exfiltration), yang bersifat spesifik sesuai dengan karakteristik kebocoran data. Tahapan dan komponen pada KARAFFE mampu menghasilkan jawaban atas pertanyaan investigatif berupa What, When, Who, Where, Why dan How (5WH) dari insiden yang diinvestigasi. Berdasarkan karakteristik pembanding yang ditetapkan, KARAFFE memenuhi enam indikator karakteristik mengungguli kerangka kerja existing lainnya. Lebih lanjut, analisis studi kasus menunjukkan bahwa KARAFFE mampu menginvestigasi insiden secara utuh disertai jawaban 5WH yang lengkap atas insiden yang diuji. Metode lain yang dikembangkan adalah ARKAIV (Arif Rahman Hakim-Kalamullah Ramli-Advanced Investigation). Metode ARKAIV berbasis ML mampu memprediksi terjadinya exfilration berdasarkan event logs yang dipetakan ke adversarial tactics. Untuk prediksi tersebut dilakukan modifikasi dataset berupa rangkain tactics dengan exfiltration sebagai target dan didesain skema resampling untuk mengatasi kondisi ketidakseimbangan dataset. SMOTEENN menghasilkan kinerja terbaik mengungguli empat teknik resampling lainnya, dengan meningkatkan nilai geometric-mean 0 pada initial dataset menjadi 0.99 pada resampled dataset. Selain itu, model ML pada metode ARKAIV dipilih dengan kinerja paling optimal berdasarkan lima teknik feature selection, menerapkan lima classifiers ML, dan dua teknik validasi model. Hasil ML-ARKAIV menunjukkan bahwa Random Forest melampaui kinerja empat classifiers lainnya (XGBoost, Logistic Regression, Naive Bayes, dan Support Vector Machine), dengan mean accuracy sebesar 99.1% (5-folds), 99.8% (10-folds), 99.7% (5-folds 5-repetitions), dan 99.74% (10-folds 10-repetitions). Selain itu, analisis studi kasus menunjukkan bahwa ARKAIV mampu memprediksi secara akurat dua insiden exfiltration dan satu insiden non-exfiltration. Dengan demikian, ARKAIV menunjukkan konsistensi kinerja dan efektifitasnya dalam memprediksi terjadinya exfiltration dalam berbagai skenario.

One of the primary challenges in investigating data breach incidents is the lack of a specific framework tailored to the characteristics of such incidents, accompanied by clear steps to ensure comprehensive investigative results. Another challenge lies in the analysis of large volumes of logs, which is time-consuming and prone to human error when performed manually. Machine learning (ML) approaches offer a potential solution; however, their performance is often suboptimal due to the imbalance in datasets. This study proposes a novel digital forensic framework named KARAFFE, designed specifically to address the unique characteristics of data breach incidents. The stages and components of KARAFFE are structured to answer investigative questions encompassing What, When, Who, Where, Why, and How (5WH) of the incidents under investigation. Case study analysis demonstrates that KARAFFE provides a complete investigation of incidents, delivering comprehensive 5WH responses for the examined cases. Based on the established comparative characteristics, KARAFFE meets six key indicators, outperforming other existing frameworks. Furthermore, the case study analysis demonstrates that KARAFFE enables comprehensive incident investigation, providing complete 5WH answers for the tested incidents. Additionally, this study introduces the ARKAIV method. ARKAIV is an ML-based approach capable of predicting exfiltration attacks based on event logs mapped to adversarial tactics. To facilitate these predictions, the dataset was modified to include a sequence of tactics with exfiltration as the target, and a resampling scheme was designed to address dataset imbalance. SMOTEENN achieved the best performance, surpassing four other resampling techniques by improving the geometric mean value from 0 on the initial dataset to 0.99 on the resampled dataset. Furthermore, the ML models in ARKAIV were selected for optimal performance through the application of five feature selection techniques, five ML classifiers, and two model validation methods. The results of ML-ARKAIV indicate that Random Forest outperformed four other classifiers (XGBoost, Logistic Regression, Naive Bayes, and Support Vector Machine), with mean accuracy rates of 99.1% (5-folds), 99.8% (10-folds), 99.7% (5-folds with 5 repetitions), and 99.74% (10-folds with 10 repetitions). Additionally, the case study analysis demonstrated that ARKAIV accurately predicted two exfiltration incidents and one non-exfiltration incident. These findings underscore ARKAIV's consistent performance and effectiveness in predicting exfiltration across various scenarios."
Depok: Fakultas Teknik Universitas Indonesia, 2025
D-pdf
UI - Disertasi Membership  Universitas Indonesia Library
cover
Albon, Chris
"With Early Release ebooks, you get books in their earliest form--the author's raw and unedited content as he or she writes--so you can take advantage of these technologies long before the official release of these titles. You'll also receive updates when significant changes are made, new chapters are available, and the final ebook bundle is released. The Python programming language and its libraries, including pandas and scikit-learn, provide a production-grade environment to help you accomplish a broad range of machine-learning tasks. With this comprehensive cookbook, data scientists and software engineers familiar with Python will benefit from almost 200 practical recipes for building a comprehensive machine-learning pipeline--everything from data preprocessing and feature engineering to model evaluation and deep learning. Learn from author Chris Albon, a data scientist who has written more than 500 tutorials on Python, data science, and machine learning. Each recipe in this practical cookbook includes code solutions that you can put to work right away, along with a discussion of how and why they work--making it ideal as a learning tool and reference book"
Beijing: O'Reilly, 2018
006.31 ALB m
Buku Teks SO  Universitas Indonesia Library
cover
Aulia Rahman
"Aktivitas produksi dan ekspor komoditas kelapa sawit terus mengalami ekspansi dan peningkatan. Indonesia memiliki perkebunan kelapa sawit dengan luas mencapai 12.761.586 Hektar. menjadikan Indonesia sebagai salah satu penghasil CPO (Crude Palm Oil) terbesar di dunia. Keberhasilan produksi dari kelapa sawit tidak terlepas dari kegiatan perencanaan dan pengawasan sehingga diperlukan pemantauan secara cepat dan efektif. Penelitian ini dilakukan dengan tujuan untuk mengetahui karakteristik dan pola persebaran umur kelapa sawit berdasarkan nilai backscatter pada citra radar Sentinel-1. Data berupa citra radar Sentinel-1 digunakakan untuk dapat melakukan estimasi terhadap umur kelapa sawit berdasarkan nilai backscatter menggunakan pendekatan machine learning. Hasil pemodelan menunjukan bahwa tren nilai backscatter terhadap umur kelapa sawit memiliki karakter berbanding lurus dengan umur kelapa sawit. Estimasi umur kelapa sawit berdasarkan nilai backscatter pada Sentinel-1 GRD menghasilkan 3 kelas umur kelapa sawit dengan tingkat overall accuracy sebesar 93.3% pada anlisis yang dilakukan secara Single Time, sedangkan pada analisis time series diperoleh nilai overall accuracy sebesar 94.5% Hasil menunjukkan bahwa kelas umur dewasa memiliki nilai z score sebesar -4.190963 dengan pola persebaran clustered (mengelompok), kelas umur taruna dengan z score -8.388942 berpola clustered (mengelompok), dan kelas umur remaja dengan perolehan nilai z score 7.801667 dengan pola persebaran dispersed (seragam).

Production and export activities of palm oil commodities continue to expand and increase. Indonesia has oil palm plantations with an area of ​​12,761,586 hectares. making Indonesia one of the largest CPO (Crude Palm Oil) producers in the world. The success of production from oil palm cannot be separated from planning and monitoring activities so that it is necessary to monitor quickly and effectively. This research was conducted with the aim of knowing the characteristics and patterns of age distribution of oil palms based on the backscatter value on Sentinel-1 radar images. Data in the form of Sentinel-1 radar images are used to estimate the age of oil palms based on the backscatter value using a machine learning approach. The modeling results show that the trend of the backscatter value of the age of the oil palm has a character that is directly proportional to the age of the oil palm. Oil palm age estimation based on the backscatter value on Sentinel-1 GRD resulted in 3 oil palm age classes with an overall accuracy rate of 93.3% in the Single Time analysis, while the time series analysis obtained an overall accuracy value of 94.5%. adults have a z score of -4.190963 with a clustered distribution pattern, the cadet age class with a z score of -8.388942 with a clustered pattern, and the adolescent age class with a z score of 7.801667 with a dispersed distribution pattern."
Depok: Fakultas Matematika Dan Ilmu Pengetahuan Alam Universitas Indonesia, 2021
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>