Skripsi
VISUALISASI SERANGAN GERAKAN LATERAL (LATERAL MOVEMENT ATTACK) DENGAN MENERAPKAN METODE K-MEANS CLUSTERING
The lateral movement is one of the most crucial phases in an Advanced Persistent Threat (APT) attack, aiming to penetrate other resources and gain greater privileges within the target network. Attackers typically exploit social engineering techniques (such as phishing, pretexting, baiting) to deceive individuals within the network into running malicious code or surrendering credentials. This enables the attacker to gain access to the victim's computer and gradually seek valuable information by exploiting vulnerabilities in other intranet entities. Utilizing the K-means method for clustering benign and malicious activities, combined with Principal Component Analysis (PCA), this approach delivers good performance in visualizing laterally moving attacks. Combining the four datasets, connection dataset, files dataset, DNS dataset, and HTTP dataset, can provide a clear visualization to illustrate differences based on user activities. Through this data integration, it fosters a better understanding of normal and malicious activities within the network. The use of validation methods like the Elbow method proves the existence of a clear elbow point, making it easy to identify the optimal clusters. On the other hand, graphs lacking a clear elbow point might provide unreliable assessments. Hence, this research indicates that using the silhouette method is an effective evaluation technique for measuring the quality of an ideal cluster.
Inventory Code | Barcode | Call Number | Location | Status |
---|---|---|---|---|
2407000210 | T138013 | T1380132023 | Central Library (Referens) | Available but not for loan - Not for Loan |
No other version available