Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Deteksi dan Mitigasi Serangan Backdoor Menggunakan Python Watchdog

View through CrossRef
The number of cyber attacks is increasing. This happens thoroughly, both at the international and national levels. Technology, techniques, and methods of carrying out cyber attacks are also increasingly sophisticated and up-to-date. Responding to this phenomenon, this research was conducted to implement an application for detecting and mitigating backdoor-based attacks using Python Watchdog. The method used in this study is the experimental method. This research is a case study of backdoor attacks that have been experienced by Universitas Muhammadiyah Kotabumi. In August – December 2021, one of the servers owned by Universitas Muhammadiyah Kotabumi received a significant backdoor-based attack. This research implements Python Watchdog to detect foreign files that are indicated as a backdoor, then sends notifications. Referring to the notification, the administrator can take further action. Based on the research that has been done, Python Watchdog is proven to overcome backdoor attacks. Once Python Watchdog is enabled, backdoor attacks are no longer possible.
Title: Deteksi dan Mitigasi Serangan Backdoor Menggunakan Python Watchdog
Description:
The number of cyber attacks is increasing.
This happens thoroughly, both at the international and national levels.
Technology, techniques, and methods of carrying out cyber attacks are also increasingly sophisticated and up-to-date.
Responding to this phenomenon, this research was conducted to implement an application for detecting and mitigating backdoor-based attacks using Python Watchdog.
The method used in this study is the experimental method.
This research is a case study of backdoor attacks that have been experienced by Universitas Muhammadiyah Kotabumi.
In August – December 2021, one of the servers owned by Universitas Muhammadiyah Kotabumi received a significant backdoor-based attack.
This research implements Python Watchdog to detect foreign files that are indicated as a backdoor, then sends notifications.
Referring to the notification, the administrator can take further action.
Based on the research that has been done, Python Watchdog is proven to overcome backdoor attacks.
Once Python Watchdog is enabled, backdoor attacks are no longer possible.

Related Results

Backdoor DNFs
Backdoor DNFs
We introduce backdoor DNFs, as a tool to measure the theoretical hardness of CNF formulas. Like backdoor sets and backdoor trees, backdoor DNFs are defined relative to a tractable ...
CSP beyond tractable constraint languages
CSP beyond tractable constraint languages
AbstractThe constraint satisfaction problem (CSP) is among the most studied computational problems. While NP-hard, many tractable subproblems have been identified (Bulatov 2017, Zh...
Penguatan Kapasitas Masyarakat Desa Serangan Menuju Pariwisata Berkelanjutan
Penguatan Kapasitas Masyarakat Desa Serangan Menuju Pariwisata Berkelanjutan
Potensi wisata Kelurahan Serangan dinilai cukup tinggi. Berdasarkan hasil wawancara singkat dengan salah satu Kepala Lingkungan Kelurahan Serangan, ditemukan bahwa Serangan mengede...
PENDIDIKAN KESEHATAN PADA KELUARGA TENTANG PERTOLONGAN PERTAMA PADA PENDERITA YANG MENGALAMI SERANGAN JANTUNG DI PUSKESMAS SINGOSARI
PENDIDIKAN KESEHATAN PADA KELUARGA TENTANG PERTOLONGAN PERTAMA PADA PENDERITA YANG MENGALAMI SERANGAN JANTUNG DI PUSKESMAS SINGOSARI
Serangan jantung merupakan peristiwa terhambatnya aliran darah pada arteri koroner yang menyebabkan otot jantung kekurangan oksigen sehingga terjadi kerusakan irreversibel miokard,...
Deteksi Serangan pada Jaringan IoT Menggunakan Seleksi Fitur Gabungan dan Optimasi Bayesian
Deteksi Serangan pada Jaringan IoT Menggunakan Seleksi Fitur Gabungan dan Optimasi Bayesian
Deteksi serangan berbasis machine learning (ML) berpotensi menjadi alternatif terbaik dalam penanganan ancaman siber pada jaringan internet of things (IoT). Metode ini memiliki kem...
Basic and Advance: Phython Programming
Basic and Advance: Phython Programming
"This book will introduce you to the python programming language. It's aimed at beginning programmers, but even if you have written programs before and just want to add python to y...
Sub-Band Backdoor Attack in Remote Sensing Imagery
Sub-Band Backdoor Attack in Remote Sensing Imagery
Remote sensing datasets usually have a wide range of spatial and spectral resolutions. They provide unique advantages in surveillance systems, and many government organizations use...
IBD: An Interpretable Backdoor-Detection Method via Multivariate Interactions
IBD: An Interpretable Backdoor-Detection Method via Multivariate Interactions
Recent work has shown that deep neural networks are vulnerable to backdoor attacks. In comparison with the success of backdoor-attack methods, existing backdoor-defense methods fac...

Back to Top