Loading

Visualization of Encrypted Data Packages using Birch Algorithm
Herri Setiawan1, Ahmad Sanmarino2, Dwi Asa Verano3

1Herri Setiawan*, Department of Informatics, Faculty of Computer Science, University Indo Global Mandiri.
2Ahmad Sanmarino, Department of Informatics, Faculty of Computer Science, University Indo Global Mandiri.
3DwiAsa Verano, Department of Engineering Informatics of Computer System, Sriwijaya University, Indonesia.
Manuscript received on September 08, 2019. | Revised Manuscript received on September 22, 2019. | Manuscript published on October 30, 2019. | PP: 3594-3597 | Volume-9 Issue-1, October 2019 | Retrieval Number: A2693109119/2019©BEIESP | DOI: 10.35940/ijeat.A2693.109119
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Encrypted data packages are already widely used in public services; such as Secure Sockets Layer (SSL/Transport Layer Security (TLS) and tunneling. It is used for its advantage of providing secure data exchange. However, there are difficulties to recognize encrypted packet patterns and distinguish between safe and malicious data. This paper proposes a method to visualize encrypted data packages in graphical form using Birch algorithm where itrecognizes better. There are four stages carried out in the study, namely System Design, Feature Extraction, Cluster Process, and Visualization. The results of clustering using the birch algorithm of 0.98 or have a percentage level of accuracy of 98 percent.
Keywords: Encrypted, Cluster, Data Packages, Birch, Visualize.