11
Log Analysis Techniques using Clustering in Network Forensics By Imam Riadi WORD COUNT 5105 T IME SUBMIT T ED 18-JUL-2017 09:41AM PAPER ID 30571450

in Network Forensics Log Analysis Techniques …eprints.uad.ac.id/6924/1/hasil-cek-similarity-0510088001...needed to deal with cyber criminals that are more and more sophisticated

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: in Network Forensics Log Analysis Techniques …eprints.uad.ac.id/6924/1/hasil-cek-similarity-0510088001...needed to deal with cyber criminals that are more and more sophisticated

Log Analysis Techniques using Clusteringin Network Forensics

By Imam Riadi

WORD COUNT 5105 TIME SUBMITTED 18-JUL-2017 09:41AM

PAPER ID 30571450

Page 2: in Network Forensics Log Analysis Techniques …eprints.uad.ac.id/6924/1/hasil-cek-similarity-0510088001...needed to deal with cyber criminals that are more and more sophisticated
Page 3: in Network Forensics Log Analysis Techniques …eprints.uad.ac.id/6924/1/hasil-cek-similarity-0510088001...needed to deal with cyber criminals that are more and more sophisticated
Page 4: in Network Forensics Log Analysis Techniques …eprints.uad.ac.id/6924/1/hasil-cek-similarity-0510088001...needed to deal with cyber criminals that are more and more sophisticated
Page 5: in Network Forensics Log Analysis Techniques …eprints.uad.ac.id/6924/1/hasil-cek-similarity-0510088001...needed to deal with cyber criminals that are more and more sophisticated
Page 6: in Network Forensics Log Analysis Techniques …eprints.uad.ac.id/6924/1/hasil-cek-similarity-0510088001...needed to deal with cyber criminals that are more and more sophisticated
Page 7: in Network Forensics Log Analysis Techniques …eprints.uad.ac.id/6924/1/hasil-cek-similarity-0510088001...needed to deal with cyber criminals that are more and more sophisticated
Page 8: in Network Forensics Log Analysis Techniques …eprints.uad.ac.id/6924/1/hasil-cek-similarity-0510088001...needed to deal with cyber criminals that are more and more sophisticated
Page 9: in Network Forensics Log Analysis Techniques …eprints.uad.ac.id/6924/1/hasil-cek-similarity-0510088001...needed to deal with cyber criminals that are more and more sophisticated
Page 10: in Network Forensics Log Analysis Techniques …eprints.uad.ac.id/6924/1/hasil-cek-similarity-0510088001...needed to deal with cyber criminals that are more and more sophisticated

3%SIMILARITY INDEX

1

2

3

4

5

6

7

8

EXCLUDE QUOTES OFF

EXCLUDE BIBLIOGRAPHY OFF

EXCLUDE MATCHES OFF

Log Analysis Techniques using Clustering in NetworkForensicsORIGINALITY REPORT

PRIMARY SOURCES

issuu.comInternet

akademik.unsoed.ac.idInternet

interscience.inInternet

Zhu, Ying. "Attack Pattern Discovery in ForensicInvestigation of Network Attacks", IEEE Journal onSelected Areas in Communications, 2011.Crossref

www.forensicmag.comInternet

www.computersecuritydirectory.comInternet

www.dronasoft.comInternet

www.sersc.orgInternet

40 words — 1%

24 words — < 1%

21 words — < 1%

21 words — < 1%

10 words — < 1%

10 words — < 1%

10 words — < 1%

9 words — < 1%

Page 11: in Network Forensics Log Analysis Techniques …eprints.uad.ac.id/6924/1/hasil-cek-similarity-0510088001...needed to deal with cyber criminals that are more and more sophisticated