Text
VISUALISASI SERANGAN MAN IN THE MIDDLE (MITM) PADA PROTOKOL JARINGAN SCADA(IEC 60870-5-104) MENGGUNAKAN METODE K-MEANS
Supervisory Control and Data Acquisition (SCADA) is a system based on software and hardware elements critical to everyday life and the citizens' economy, including oil networks, water treatment plants, and chemical plants. However, SCADA networks often get cyberattacks, for example, "Man in the Middle" (MITM), in which the attacker secretly takes data, transfers it, and even changes correspondence between the two parties where the victim does not realize that the victim is not communicating directly with the destination. In this research, an experiment will be carried out to visualize the Man in the Middle (MITM) attack using the K-Means method. The optimal cluster results were obtained with 2 clusters using the elbow technique. From the visualization results, cluster 1 and cluster 2 have the same pattern and an uneven distribution because a lot of the data has uniformity, so it only forms a particular pattern and does not spread. Then the normal data is more dominant than the attack data.
Inventory Code | Barcode | Call Number | Location | Status |
---|---|---|---|---|
2207005339 | T85048 | T850482022 | Central Library (Referens) | Available but not for loan - Not for Loan |
No other version available