Analisis dan Penanganan Insiden Siber SQL Injection Menggunakan Kerangka NIST SP 800-61R2 dan Algoritma Klusterisasi K-Means

Choerun Asnawi, Dedy Hariyadi, Ulfi Saidata Aesyi, Puji Winar Cahyo
{"title":"Analisis dan Penanganan Insiden Siber SQL Injection Menggunakan Kerangka NIST SP 800-61R2 dan Algoritma Klusterisasi K-Means","authors":"Choerun Asnawi, Dedy Hariyadi, Ulfi Saidata Aesyi, Puji Winar Cahyo","doi":"10.31603/komtika.v7i2.10527","DOIUrl":null,"url":null,"abstract":"Based on the OWASP Top Ten document in 2021, attacks or vulnerabilities in an application in the form of injection still rank in the top 3. SQL Injection attacks are still classified as injection vulnerabilities so they need special attention from Information & Communication Technology Managers. Badan Siber dan Sandi Negara (BSSN) has published a document related to preventing SQL Injection attacks. However, the document has not included a cyber attack analysis process that uses the K-Means clustering approach. So in this research, a collaborative method of handling cyber attacks in the form of SQL Injection is proposed using the NIST SP 800-61R2 framework as a fundamental for handling cyber attacks and K-Means clustering. Before analyzing cyber attacks, it is better to use a framework or standardization that applies globally. Based on the research conducted, the K-Means clustering algorithm can help cybersecurity analysts in the process of analyzing cyber attacks that occur. The result of this research is that the optimal value is obtained that cyber attacks in the form of SQL Injection, namely 3 clusters. The hope of the research can facilitate cybersecurity analysts in analyzing cyber attacks that are poured into reports to parties in need","PeriodicalId":292404,"journal":{"name":"Jurnal Komtika (Komputasi dan Informatika)","volume":"222 ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Jurnal Komtika (Komputasi dan Informatika)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31603/komtika.v7i2.10527","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Based on the OWASP Top Ten document in 2021, attacks or vulnerabilities in an application in the form of injection still rank in the top 3. SQL Injection attacks are still classified as injection vulnerabilities so they need special attention from Information & Communication Technology Managers. Badan Siber dan Sandi Negara (BSSN) has published a document related to preventing SQL Injection attacks. However, the document has not included a cyber attack analysis process that uses the K-Means clustering approach. So in this research, a collaborative method of handling cyber attacks in the form of SQL Injection is proposed using the NIST SP 800-61R2 framework as a fundamental for handling cyber attacks and K-Means clustering. Before analyzing cyber attacks, it is better to use a framework or standardization that applies globally. Based on the research conducted, the K-Means clustering algorithm can help cybersecurity analysts in the process of analyzing cyber attacks that occur. The result of this research is that the optimal value is obtained that cyber attacks in the form of SQL Injection, namely 3 clusters. The hope of the research can facilitate cybersecurity analysts in analyzing cyber attacks that are poured into reports to parties in need
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用 NIST SP 800-61R2 框架和 K-Means 聚类算法分析和处理 SQL 注入网络事件
根据 2021 年 OWASP 十大文件,应用程序中以注入形式出现的攻击或漏洞仍然排在前三位。SQL 注入攻击仍被归类为注入漏洞,因此需要信息和通信技术管理人员特别关注。Badan Siber dan Sandi Negara(BSSN)发布了一份与预防 SQL 注入攻击有关的文件。然而,该文件并未包含使用 K-Means 聚类方法的网络攻击分析流程。因此,在本研究中,提出了一种协同处理 SQL 注入形式网络攻击的方法,将 NIST SP 800-61R2 框架作为处理网络攻击和 K-Means 聚类的基础。在分析网络攻击之前,最好使用全球适用的框架或标准化。根据所开展的研究,K-Means 聚类算法可以帮助网络安全分析人员分析所发生的网络攻击。研究结果表明,SQL 注入形式的网络攻击获得了最佳值,即 3 个聚类。希望这项研究能有助于网络安全分析人员分析向有需要的各方报告的网络攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Analisa Pengukuran Tingkat Kepuasan Pengguna Aplikasi Daytrans Dengan Kerangka Kerja Pieces Framework Analysis of User Experience on the MyPertamina Application using User Experience Questionnaire Method Monitoring dan Klasifikasi Kualitas Air Kolam Ikan Gurami Berbasis Internet of Things Menggunakan Metode Naive Bayes Evaluation of Maturity Level and Recommendations for Improvement of Software Testing Process Based on Test Maturity Model Integration (TMMi): A Case Study Analisis dan Penanganan Insiden Siber SQL Injection Menggunakan Kerangka NIST SP 800-61R2 dan Algoritma Klusterisasi K-Means
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1