Detektor Anomali Jaringan dengan Analisis Perilaku untuk Mengidentifikasi Ancaman Persisten
DOI:
https://doi.org/10.59841/saber.v1i3.1596Keywords:
Digital Technology, Android Operating System, Digital Ordering Application, Cloud-Based Payment, Application IntegrationAbstract
Technological developments in the digital world have now begun to increase the use of operating systems such as Android which are often used on electronic devices such as smartphones and tablets, penetrating various fields of human life. The use of these devices is essential in facilitating various tasks, especially digital ordering and transactions. This integration provides better transaction protection, more effective usage, and benefits and convenience. Cloud computing makes it easy and efficient to integrate digital ordering applications into payment systems. Observations show that these integrations provide user convenience and purchase trends, assist marketing strategies, and generate more accurate business decisions. If carefully developed and implemented, this integration has great potential to change the way business is done in the digital age.
References
Bestari, N. (2022, Oktober 25). Mengenal antarmuka aplikasi: Pengertian, contoh penggunaan, dan manfaatnya. Parapuan. https://bobo.grid.id/read/083540727/mengenal-antarmuka-aplikasi-pengertian-contoh-penggunaan-dan-manfaatnya?page=all
Efianti, I. R., Nasrullah, M., & Siregar, S. (2016). Implementasi Intrusion Detection System (IDS).
Husen, Z., & Surbakti, M. S. (2020). Membangun server dan jaringan komputer dengan Linux Ubuntu. Syiah Kuala University Press.
Jolin, S., & Manggu, B. (2023). Pengaruh pemanfaatan mobile banking dan kualitas pelayanan pada Bank BRI Cabang Bengkayang terhadap kepuasan nasabah. Jurnal Manuhara: Pusat Penelitian Ilmu Manajemen dan Bisnis, 1(4), 11–25.
Jurgenson, S. (2023, April 28). Mobile cloud computing: Melepaskan potensinya untuk aplikasi Anda. AppMaster. https://appmaster.io/id/blog/komputasi-awan-seluler-mengeluarkan-potensi-untuk-aplikasi-anda
Kolahi, S. S., Treseangrat, K., & Sarrafpour, B. (2015). Analysis of UDP DDoS flood cyber attack and defense mechanisms on web server with Linux Ubuntu 13. In Proceedings of the 2015 International Conference on Communications, Signal Processing, and their Applications (ICCSPA’15) (pp. 1–5). IEEE.
Maulidya, B. S. (2024). Pengembangan aplikasi pada era modern 2024. LIBRARIA: Jurnal Perpustakaan, 11(2), 323–346.
Megavitry, R., Hakim, R. R. Al, Amperawati, S., Jannah, A., Ismiasih, Aisyah, S., & Kamarudin, A. P. (2022). Peran teknologi era modern. PT Global Ekskutif Teknologi.
Pratama, D. R. (2023, May 11). What is Linux kernel. Alibaba Cloud. https://www.alibabacloud.com/blog/what-is-linux-kernel_599980
Purwanto, K. H., & Rahardjo, B. (2014). Traffic anomaly detection in DDoS flooding. In Proceedings of the International Conference on Telecommunication Systems Services and Applications (TSSA).
Stiawan, D. (2009). Intrusion Prevention System (IPS) dan tantangan dalam pengembangannya. [Sumber tidak diterbitkan].
Syahza, A. (2021). Metodologi penelitian. UR Press.
Tabassum, M., & Mathew, K. (2014). Software evolution analysis of Linux (Ubuntu) OS. In Proceedings of the 2014 International Conference on Computational Science and Technology (ICCST) (pp. 1–7). IEEE.
Tamimi, M., & Sopiah. (2022). Entrepreneurship and business management: The influence of leadership style on employee performance: A systematic literature review. International Journal of Entrepreneurship and Business Management, 1(2), 128–138.
Волох, С. (2018). Ubuntu Linux с нуля. БХВ-Петербург.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 SABER : Jurnal Teknik Informatika, Sains dan Ilmu Komunikasi
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.