{"dcterms:modified":"2022-04-03","dcterms:creator":"A Dataverse Instance","@type":"ore:ResourceMap","@id":"https://dataverse.telkomuniversity.ac.id/api/datasets/export?exporter=OAI_ORE&persistentId=doi:10.34820/FK2/A8DDXN","ore:describes":{"Subject":["Computer and Information Science","Engineering"],"citation:Depositor":"Dewanta, Favian","Title":"Klasifikasi serangan pada SDN","Deposit Date":"2022-04-02","citation:Description":{"dsDescription:Text":"Dataset ini merupakan modifikasi dari dataset BUET-DDoS2020 (https://data.mendeley.com/datasets/bzgf9r36kp/2),\nyang digunakan untuk klasifikasi serangan pada SDN dengan kelas serangan ICMP-Flood-Attack, Ping-of-death-attack, Port-scanning, TCP-SYN-flood-attack"},"citation:Contact":{"datasetContact:Name":"Dewanta, Favian","datasetContact:E-mail":"favian@telkomuniversity.ac.id"},"Related Publication":{"Citation":"Barends, J. K., Dewanta, F., & Karna, N. B. A. (2022). Perancangan dan Analisis Intrusion Prevention Sistem Berbasis SNORT dan IPTABLES dengan Integrasi Honeypot pada Arsitektur Software Defined Network. MULTINETICS, 7(2), 169–182.","URL":"https://jurnal.pnj.ac.id/index.php/multinetics/article/view/4276/2439"},"Author":{"author:Name":"Dewanta, Favian"},"@id":"doi:10.34820/FK2/A8DDXN","@type":["ore:Aggregation","schema:Dataset"],"schema:version":"1.0","schema:datePublished":"2022-04-02","schema:name":"Klasifikasi serangan pada SDN","schema:dateModified":"Sat Apr 02 23:11:43 WIB 2022","schema:license":"https://creativecommons.org/publicdomain/zero/1.0/","dvcore:fileTermsOfAccess":{"dvcore:fileRequestAccess":false},"schema:includedInDataCatalog":"Favian Dewanta Dataverse","ore:aggregates":[{"schema:name":"TA_Test.tab","dvcore:restricted":false,"schema:version":3,"dvcore:datasetVersionId":294,"@id":"doi:10.34820/FK2/A8DDXN/01O33Q","schema:sameAs":"https://dataverse.telkomuniversity.ac.id/api/access/datafile/:persistentId?persistentId=doi:10.34820/FK2/A8DDXN/01O33Q","@type":"ore:AggregatedResource","schema:fileFormat":"text/tab-separated-values","dvcore:filesize":34259663,"dvcore:storageIdentifier":"file://17feb0403da-4a1758a5a3ab","dvcore:originalFileFormat":"text/csv","dvcore:originalFormatLabel":"Comma Separated Values","dvcore:UNF":"UNF:6:2ory/xsFTEOqaM1r1mF/+A==","dvcore:rootDataFileId":-1,"dvcore:checksum":{"@type":"MD5","@value":"3577d51459a6b7f3774199e084b486b4"}},{"schema:name":"TA_train.tab","dvcore:restricted":false,"schema:version":3,"dvcore:datasetVersionId":294,"@id":"doi:10.34820/FK2/A8DDXN/E3N1AN","schema:sameAs":"https://dataverse.telkomuniversity.ac.id/api/access/datafile/:persistentId?persistentId=doi:10.34820/FK2/A8DDXN/E3N1AN","@type":"ore:AggregatedResource","schema:fileFormat":"text/tab-separated-values","dvcore:filesize":85800525,"dvcore:storageIdentifier":"file://17feb0503ff-f25870b2e294","dvcore:originalFileFormat":"text/csv","dvcore:originalFormatLabel":"Comma Separated Values","dvcore:UNF":"UNF:6:E7s7oZLcyP8lvgkov5k1Aw==","dvcore:rootDataFileId":-1,"dvcore:checksum":{"@type":"MD5","@value":"259765a2dadbeb78e97987fec24b104b"}}],"schema:hasPart":["doi:10.34820/FK2/A8DDXN/01O33Q","doi:10.34820/FK2/A8DDXN/E3N1AN"]},"@context":{"Author":"http://purl.org/dc/terms/creator","Citation":"http://purl.org/dc/terms/bibliographicCitation","Deposit Date":"http://purl.org/dc/terms/dateSubmitted","Related Publication":"http://purl.org/dc/terms/isReferencedBy","Subject":"http://purl.org/dc/terms/subject","Title":"http://purl.org/dc/terms/title","URL":"https://schema.org/distribution","author":"https://dataverse.org/schema/citation/author#","citation":"https://dataverse.org/schema/citation/","datasetContact":"https://dataverse.org/schema/citation/datasetContact#","dcterms":"http://purl.org/dc/terms/","dsDescription":"https://dataverse.org/schema/citation/dsDescription#","dvcore":"https://dataverse.org/schema/core#","ore":"http://www.openarchives.org/ore/terms/","schema":"http://schema.org/"}}