Detektor Anomali Jaringan dengan Analisis Perilaku untuk Mengidentifikasi Ancaman Persisten

Authors

  • Rakhmadi Rahman Institut Teknologi Bacharuddin Jusuf Habibie
  • Andi Maharani Institut Teknologi Bacharuddin Jusuf Habibie
  • Nur Azisah Basir Institut Teknologi Bacharuddin Jusuf Habibie

DOI:

https://doi.org/10.59841/saber.v1i3.1596

Keywords:

Digital Technology, Android Operating System, Digital Ordering Application, Cloud-Based Payment, Application Integration

Abstract

Technological developments in the digital world have now begun to increase the use of operating systems such as Android which are often used on electronic devices such as smartphones and tablets, penetrating various fields of human life. The use of these devices is essential in facilitating various tasks, especially digital ordering and transactions. This integration provides better transaction protection, more effective usage, and benefits and convenience. Cloud computing makes it easy and efficient to integrate digital ordering applications into payment systems. Observations show that these integrations provide user convenience and purchase trends, assist marketing strategies, and generate more accurate business decisions. If carefully developed and implemented, this integration has great potential to change the way business is done in the digital age.

 

 

References

Bestari, N. (2022, Oktober 25). Mengenal antarmuka aplikasi: Pengertian, contoh penggunaan, dan manfaatnya. Parapuan. https://bobo.grid.id/read/083540727/mengenal-antarmuka-aplikasi-pengertian-contoh-penggunaan-dan-manfaatnya?page=all

Efianti, I. R., Nasrullah, M., & Siregar, S. (2016). Implementasi Intrusion Detection System (IDS).

Husen, Z., & Surbakti, M. S. (2020). Membangun server dan jaringan komputer dengan Linux Ubuntu. Syiah Kuala University Press.

Jolin, S., & Manggu, B. (2023). Pengaruh pemanfaatan mobile banking dan kualitas pelayanan pada Bank BRI Cabang Bengkayang terhadap kepuasan nasabah. Jurnal Manuhara: Pusat Penelitian Ilmu Manajemen dan Bisnis, 1(4), 11–25.

Jurgenson, S. (2023, April 28). Mobile cloud computing: Melepaskan potensinya untuk aplikasi Anda. AppMaster. https://appmaster.io/id/blog/komputasi-awan-seluler-mengeluarkan-potensi-untuk-aplikasi-anda

Kolahi, S. S., Treseangrat, K., & Sarrafpour, B. (2015). Analysis of UDP DDoS flood cyber attack and defense mechanisms on web server with Linux Ubuntu 13. In Proceedings of the 2015 International Conference on Communications, Signal Processing, and their Applications (ICCSPA’15) (pp. 1–5). IEEE.

Maulidya, B. S. (2024). Pengembangan aplikasi pada era modern 2024. LIBRARIA: Jurnal Perpustakaan, 11(2), 323–346.

Megavitry, R., Hakim, R. R. Al, Amperawati, S., Jannah, A., Ismiasih, Aisyah, S., & Kamarudin, A. P. (2022). Peran teknologi era modern. PT Global Ekskutif Teknologi.

Pratama, D. R. (2023, May 11). What is Linux kernel. Alibaba Cloud. https://www.alibabacloud.com/blog/what-is-linux-kernel_599980

Purwanto, K. H., & Rahardjo, B. (2014). Traffic anomaly detection in DDoS flooding. In Proceedings of the International Conference on Telecommunication Systems Services and Applications (TSSA).

Stiawan, D. (2009). Intrusion Prevention System (IPS) dan tantangan dalam pengembangannya. [Sumber tidak diterbitkan].

Syahza, A. (2021). Metodologi penelitian. UR Press.

Tabassum, M., & Mathew, K. (2014). Software evolution analysis of Linux (Ubuntu) OS. In Proceedings of the 2014 International Conference on Computational Science and Technology (ICCST) (pp. 1–7). IEEE.

Tamimi, M., & Sopiah. (2022). Entrepreneurship and business management: The influence of leadership style on employee performance: A systematic literature review. International Journal of Entrepreneurship and Business Management, 1(2), 128–138.

Волох, С. (2018). Ubuntu Linux с нуля. БХВ-Петербург.

Published

2024-07-26

How to Cite

Rakhmadi Rahman, Andi Maharani, & Nur Azisah Basir. (2024). Detektor Anomali Jaringan dengan Analisis Perilaku untuk Mengidentifikasi Ancaman Persisten. SABER : Jurnal Teknik Informatika, Sains Dan Ilmu Komunikasi, 2(4), 01–11. https://doi.org/10.59841/saber.v1i3.1596

Similar Articles

1 2 3 4 5 6 > >> 

You may also start an advanced similarity search for this article.