<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=KI%3A_PRAKTEK_10%3A_AI_untuk_Deteksi_Anomali</id>
	<title>KI: PRAKTEK 10: AI untuk Deteksi Anomali - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=KI%3A_PRAKTEK_10%3A_AI_untuk_Deteksi_Anomali"/>
	<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=KI:_PRAKTEK_10:_AI_untuk_Deteksi_Anomali&amp;action=history"/>
	<updated>2026-05-04T07:25:47Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.4</generator>
	<entry>
		<id>https://onnocenter.or.id/wiki/index.php?title=KI:_PRAKTEK_10:_AI_untuk_Deteksi_Anomali&amp;diff=73302&amp;oldid=prev</id>
		<title>Onnowpurbo: /* Skenario Data Log yang Real (Pilih salah satu atau gabungkan) */</title>
		<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=KI:_PRAKTEK_10:_AI_untuk_Deteksi_Anomali&amp;diff=73302&amp;oldid=prev"/>
		<updated>2026-02-13T02:04:56Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;Skenario Data Log yang Real (Pilih salah satu atau gabungkan)&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 02:04, 13 February 2026&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l32&quot; &gt;Line 32:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 32:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Skenario Data Log yang Real (Pilih salah satu atau gabungkan)==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Skenario Data Log yang Real (Pilih salah satu atau gabungkan)==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Kamu bisa latihan pakai:&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Kamu bisa latihan pakai:&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Linux auth log: /var/log/auth.log&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Linux auth log: /var/log/auth.log &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;- &lt;/ins&gt;Cocok untuk mendeteksi percobaan login gagal masif, lonjakan aktivitas sudo, jam akses aneh.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Cocok untuk mendeteksi percobaan login gagal masif, lonjakan aktivitas sudo, jam akses aneh.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Nginx access log (lab): misalnya file access.log dari web server &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;- &lt;/ins&gt;Cocok untuk mendeteksi lonjakan request, path aneh, user-agent janggal, pola scanning.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Nginx access log (lab): misalnya file access.log dari web server&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Cocok untuk mendeteksi lonjakan request, path aneh, user-agent janggal, pola scanning.&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Suricata eve.json (kalau sudah main IDS): event security lebih kaya.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Suricata eve.json (kalau sudah main IDS): event security lebih kaya.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
	<entry>
		<id>https://onnocenter.or.id/wiki/index.php?title=KI:_PRAKTEK_10:_AI_untuk_Deteksi_Anomali&amp;diff=73232&amp;oldid=prev</id>
		<title>Onnowpurbo at 20:15, 23 January 2026</title>
		<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=KI:_PRAKTEK_10:_AI_untuk_Deteksi_Anomali&amp;diff=73232&amp;oldid=prev"/>
		<updated>2026-01-23T20:15:19Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;a href=&quot;https://onnocenter.or.id/wiki/index.php?title=KI:_PRAKTEK_10:_AI_untuk_Deteksi_Anomali&amp;amp;diff=73232&amp;amp;oldid=73231&quot;&gt;Show changes&lt;/a&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
	<entry>
		<id>https://onnocenter.or.id/wiki/index.php?title=KI:_PRAKTEK_10:_AI_untuk_Deteksi_Anomali&amp;diff=73231&amp;oldid=prev</id>
		<title>Onnowpurbo at 20:14, 23 January 2026</title>
		<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=KI:_PRAKTEK_10:_AI_untuk_Deteksi_Anomali&amp;diff=73231&amp;oldid=prev"/>
		<updated>2026-01-23T20:14:55Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;a href=&quot;https://onnocenter.or.id/wiki/index.php?title=KI:_PRAKTEK_10:_AI_untuk_Deteksi_Anomali&amp;amp;diff=73231&amp;amp;oldid=73230&quot;&gt;Show changes&lt;/a&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
	<entry>
		<id>https://onnocenter.or.id/wiki/index.php?title=KI:_PRAKTEK_10:_AI_untuk_Deteksi_Anomali&amp;diff=73230&amp;oldid=prev</id>
		<title>Onnowpurbo at 20:14, 23 January 2026</title>
		<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=KI:_PRAKTEK_10:_AI_untuk_Deteksi_Anomali&amp;diff=73230&amp;oldid=prev"/>
		<updated>2026-01-23T20:14:51Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;a href=&quot;https://onnocenter.or.id/wiki/index.php?title=KI:_PRAKTEK_10:_AI_untuk_Deteksi_Anomali&amp;amp;diff=73230&amp;amp;oldid=73186&quot;&gt;Show changes&lt;/a&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
	<entry>
		<id>https://onnocenter.or.id/wiki/index.php?title=KI:_PRAKTEK_10:_AI_untuk_Deteksi_Anomali&amp;diff=73186&amp;oldid=prev</id>
		<title>Onnowpurbo: Created page with &quot; PRAKTEK 10: AI untuk Deteksi Anomali Fokus sesi ini: kamu bikin “AI security” sederhana yang bisa belajar pola normal dari log, lalu menandai yang aneh (anomaly). Ini buk...&quot;</title>
		<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=KI:_PRAKTEK_10:_AI_untuk_Deteksi_Anomali&amp;diff=73186&amp;oldid=prev"/>
		<updated>2026-01-23T01:51:49Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot; PRAKTEK 10: AI untuk Deteksi Anomali Fokus sesi ini: kamu bikin “AI security” sederhana yang bisa belajar pola normal dari log, lalu menandai yang aneh (anomaly). Ini buk...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&lt;br /&gt;
PRAKTEK 10: AI untuk Deteksi Anomali&lt;br /&gt;
Fokus sesi ini: kamu bikin “AI security” sederhana yang bisa belajar pola normal dari log, lalu menandai yang aneh (anomaly). Ini bukan “AI yang tahu segalanya”, tapi alat bantu triage biar analis tidak tenggelam dalam jutaan baris log.&lt;br /&gt;
Tujuan&lt;br /&gt;
Mahasiswa mampu:&lt;br /&gt;
membangun pipeline deteksi anomali dari log nyata (Linux / web / auth),&lt;br /&gt;
melatih model unsupervised (tanpa label),&lt;br /&gt;
menghasilkan daftar event mencurigakan + alasan/fitur ringkas,&lt;br /&gt;
menyimpan model dan menjalankan deteksi ulang secara berkala.&lt;br /&gt;
Output akhir yang ditargetkan:&lt;br /&gt;
Model tersimpan (.joblib)&lt;br /&gt;
Laporan evaluasi sederhana (rasio anomali, contoh top N anomali)&lt;br /&gt;
File hasil deteksi (CSV/JSON)&lt;br /&gt;
(Opsional) hasil/model dienkripsi dengan GnuPG&lt;br /&gt;
Konsep Inti&lt;br /&gt;
Deteksi anomali = mencari data yang “jarang”, “jauh dari pola normal”, atau “punya kombinasi fitur yang aneh”.&lt;br /&gt;
Kamu akan pakai dua pendekatan:&lt;br /&gt;
Isolation Forest (tree-based): bagus untuk anomaly detection umum, sering jadi baseline kuat.&lt;br /&gt;
KMeans + jarak ke centroid: sederhana, cepat, mudah dijelaskan (jarak besar = makin aneh).&lt;br /&gt;
Catatan penting: Model unsupervised akan menandai “aneh”, bukan otomatis “jahat”. Anomali ≠ serangan, tapi anomali yang harus kamu cek dulu.&lt;br /&gt;
Tools (Open Source)&lt;br /&gt;
OS: Ubuntu 24.04&lt;br /&gt;
Python 3 + venv&lt;br /&gt;
Library: pandas, numpy, scikit-learn, joblib&lt;br /&gt;
(Opsional) matplotlib untuk grafik ringan&lt;br /&gt;
(Opsional) GnuPG untuk enkripsi file output/model&lt;br /&gt;
Skenario Data Log yang Real (Pilih salah satu atau gabungkan)&lt;br /&gt;
Kamu bisa latihan pakai:&lt;br /&gt;
Linux auth log: /var/log/auth.log&lt;br /&gt;
Cocok untuk mendeteksi percobaan login gagal masif, lonjakan aktivitas sudo, jam akses aneh.&lt;br /&gt;
Nginx access log (lab): misalnya file access.log dari web server&lt;br /&gt;
Cocok untuk mendeteksi lonjakan request, path aneh, user-agent janggal, pola scanning.&lt;br /&gt;
Suricata eve.json (kalau sudah main IDS): event security lebih kaya.&lt;br /&gt;
Di modul ini kita buat pipeline yang paling mudah jalan di semua laptop/server: mulai dari auth.log + opsi format log sederhana.&lt;br /&gt;
Tahap Praktikum (Step-by-step)&lt;br /&gt;
0. Setup Environment di Ubuntu 24.04&lt;br /&gt;
Jalankan:&lt;br /&gt;
sudo apt update&lt;br /&gt;
sudo apt install -y python3-venv python3-pip gnupg&lt;br /&gt;
mkdir -p ~/modul10-ai-anomali/{data,models,output,scripts}&lt;br /&gt;
cd ~/modul10-ai-anomali&lt;br /&gt;
python3 -m venv .venv&lt;br /&gt;
source .venv/bin/activate&lt;br /&gt;
pip install -U pip&lt;br /&gt;
pip install pandas numpy scikit-learn joblib&lt;br /&gt;
&lt;br /&gt;
Checklist: pastikan python --version mengarah ke venv dan pip show scikit-learn ada.&lt;br /&gt;
&lt;br /&gt;
1. Ambil Dataset Log&lt;br /&gt;
Opsi A — pakai log asli mesin (paling real)&lt;br /&gt;
Copy auth log:&lt;br /&gt;
sudo cp /var/log/auth.log ~/modul10-ai-anomali/data/auth.log&lt;br /&gt;
sudo chown $USER:$USER ~/modul10-ai-anomali/data/auth.log&lt;br /&gt;
Opsi B — bikin dataset latihan (biar kontrol)&lt;br /&gt;
Kita akan generate log sintetik “mirip event” (normal + aneh) dari Python (nanti ada script).&lt;br /&gt;
2. Prinsip Feature Engineering (Supaya “AI” mengerti)&lt;br /&gt;
Log itu teks; model butuh angka. Maka kita ubah event jadi fitur numerik, contoh:&lt;br /&gt;
Untuk auth event:&lt;br /&gt;
hour (jam kejadian)&lt;br /&gt;
fail_count_5m (jumlah gagal login dalam 5 menit per IP/user)&lt;br /&gt;
distinct_users_10m&lt;br /&gt;
is_sudo (0/1)&lt;br /&gt;
is_failed_password (0/1)&lt;br /&gt;
src_ip_hash (hash → angka stabil; bukan identitas asli)&lt;br /&gt;
msg_len (panjang pesan)&lt;br /&gt;
Yang penting: fitur harus menggambarkan perilaku (burst, jam tidak wajar, variasi user, dsb), bukan sekadar teks mentah.&lt;br /&gt;
Implementasi: Pipeline Lengkap (Python)&lt;br /&gt;
Di bawah ini 3 file utama:&lt;br /&gt;
parser &amp;amp; feature builder&lt;br /&gt;
training model&lt;br /&gt;
deteksi + export hasil&lt;br /&gt;
&lt;br /&gt;
A. scripts/parse_authlog.py — parse auth.log → dataset fitur&lt;br /&gt;
Buat file:&lt;br /&gt;
nano ~/modul10-ai-anomali/scripts/parse_authlog.py&lt;br /&gt;
Isi:&lt;br /&gt;
&lt;br /&gt;
#!/usr/bin/env python3&lt;br /&gt;
import re&lt;br /&gt;
import json&lt;br /&gt;
from datetime import datetime, timedelta&lt;br /&gt;
from collections import deque, defaultdict&lt;br /&gt;
&lt;br /&gt;
# Auth log default Ubuntu: &amp;quot;Jan 20 13:01:02 hostname sshd[123]: Failed password for ...&amp;quot;&lt;br /&gt;
# Catatan: tahun tidak ada, kita isi dengan tahun sekarang (cukup untuk lab).&lt;br /&gt;
AUTH_RE = re.compile(&lt;br /&gt;
    r'^(?P&amp;lt;mon&amp;gt;\w{3})\s+(?P&amp;lt;day&amp;gt;\d{1,2})\s+(?P&amp;lt;time&amp;gt;\d{2}:\d{2}:\d{2})\s+'&lt;br /&gt;
    r'(?P&amp;lt;host&amp;gt;\S+)\s+(?P&amp;lt;proc&amp;gt;[\w\-\/]+)(?:\[\d+\])?:\s+(?P&amp;lt;msg&amp;gt;.*)$'&lt;br /&gt;
)&lt;br /&gt;
&lt;br /&gt;
IP_RE = re.compile(r'(\d{1,3}\.){3}\d{1,3}')&lt;br /&gt;
USER_RE = re.compile(r'for (invalid user )?(?P&amp;lt;user&amp;gt;[a-zA-Z0-9_\-\.]+)')&lt;br /&gt;
&lt;br /&gt;
MONTHS = {&lt;br /&gt;
    &amp;quot;Jan&amp;quot;: 1, &amp;quot;Feb&amp;quot;: 2, &amp;quot;Mar&amp;quot;: 3, &amp;quot;Apr&amp;quot;: 4, &amp;quot;May&amp;quot;: 5, &amp;quot;Jun&amp;quot;: 6,&lt;br /&gt;
    &amp;quot;Jul&amp;quot;: 7, &amp;quot;Aug&amp;quot;: 8, &amp;quot;Sep&amp;quot;: 9, &amp;quot;Oct&amp;quot;: 10, &amp;quot;Nov&amp;quot;: 11, &amp;quot;Dec&amp;quot;: 12&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
def stable_hash_to_int(s: str, mod: int = 1000003) -&amp;gt; int:&lt;br /&gt;
    # hash stabil sederhana (bukan cryptographic, cukup untuk fitur)&lt;br /&gt;
    h = 2166136261&lt;br /&gt;
    for ch in s.encode(&amp;quot;utf-8&amp;quot;, errors=&amp;quot;ignore&amp;quot;):&lt;br /&gt;
        h ^= ch&lt;br /&gt;
        h = (h * 16777619) &amp;amp; 0xFFFFFFFF&lt;br /&gt;
    return int(h % mod)&lt;br /&gt;
&lt;br /&gt;
def parse_ts(line: str, year: int) -&amp;gt; datetime | None:&lt;br /&gt;
    m = AUTH_RE.match(line)&lt;br /&gt;
    if not m:&lt;br /&gt;
        return None&lt;br /&gt;
    mon = MONTHS.get(m.group(&amp;quot;mon&amp;quot;))&lt;br /&gt;
    day = int(m.group(&amp;quot;day&amp;quot;))&lt;br /&gt;
    t = m.group(&amp;quot;time&amp;quot;)&lt;br /&gt;
    hh, mm, ss = map(int, t.split(&amp;quot;:&amp;quot;))&lt;br /&gt;
    return datetime(year, mon, day, hh, mm, ss)&lt;br /&gt;
&lt;br /&gt;
def extract_ip(msg: str) -&amp;gt; str:&lt;br /&gt;
    m = IP_RE.search(msg)&lt;br /&gt;
    return m.group(0) if m else &amp;quot;0.0.0.0&amp;quot;&lt;br /&gt;
&lt;br /&gt;
def extract_user(msg: str) -&amp;gt; str:&lt;br /&gt;
    m = USER_RE.search(msg)&lt;br /&gt;
    return m.group(&amp;quot;user&amp;quot;) if m else &amp;quot;unknown&amp;quot;&lt;br /&gt;
&lt;br /&gt;
def build_features(lines: list[str], year: int):&lt;br /&gt;
    &amp;quot;&amp;quot;&amp;quot;&lt;br /&gt;
    Membuat event-level features + rolling window counts (burst behavior)&lt;br /&gt;
    &amp;quot;&amp;quot;&amp;quot;&lt;br /&gt;
    events = []&lt;br /&gt;
    # rolling windows untuk hitung burst&lt;br /&gt;
    window_5m_by_ip = defaultdict(deque)     # ip -&amp;gt; timestamps&lt;br /&gt;
    window_10m_by_user = defaultdict(deque)  # user -&amp;gt; timestamps&lt;br /&gt;
&lt;br /&gt;
    for line in lines:&lt;br /&gt;
        m = AUTH_RE.match(line)&lt;br /&gt;
        if not m:&lt;br /&gt;
            continue&lt;br /&gt;
&lt;br /&gt;
        ts = parse_ts(line, year)&lt;br /&gt;
        if not ts:&lt;br /&gt;
            continue&lt;br /&gt;
&lt;br /&gt;
        msg = m.group(&amp;quot;msg&amp;quot;)&lt;br /&gt;
        proc = m.group(&amp;quot;proc&amp;quot;)&lt;br /&gt;
        ip = extract_ip(msg)&lt;br /&gt;
        user = extract_user(msg)&lt;br /&gt;
&lt;br /&gt;
        is_failed = 1 if &amp;quot;Failed password&amp;quot; in msg else 0&lt;br /&gt;
        is_invalid_user = 1 if &amp;quot;invalid user&amp;quot; in msg else 0&lt;br /&gt;
        is_accepted = 1 if &amp;quot;Accepted password&amp;quot; in msg or &amp;quot;Accepted publickey&amp;quot; in msg else 0&lt;br /&gt;
        is_sudo = 1 if proc.startswith(&amp;quot;sudo&amp;quot;) or &amp;quot;sudo:&amp;quot; in msg else 0&lt;br /&gt;
        msg_len = len(msg)&lt;br /&gt;
&lt;br /&gt;
        # update rolling window 5m per IP (untuk failed count)&lt;br /&gt;
        dq = window_5m_by_ip[ip]&lt;br /&gt;
        dq.append(ts)&lt;br /&gt;
        while dq and (ts - dq[0]) &amp;gt; timedelta(minutes=5):&lt;br /&gt;
            dq.popleft()&lt;br /&gt;
        count_5m_ip = len(dq)&lt;br /&gt;
&lt;br /&gt;
        # update rolling window 10m per user&lt;br /&gt;
        du = window_10m_by_user[user]&lt;br /&gt;
        du.append(ts)&lt;br /&gt;
        while du and (ts - du[0]) &amp;gt; timedelta(minutes=10):&lt;br /&gt;
            du.popleft()&lt;br /&gt;
        count_10m_user = len(du)&lt;br /&gt;
&lt;br /&gt;
        event = {&lt;br /&gt;
            &amp;quot;ts&amp;quot;: ts.isoformat(),&lt;br /&gt;
            &amp;quot;hour&amp;quot;: ts.hour,&lt;br /&gt;
            &amp;quot;minute&amp;quot;: ts.minute,&lt;br /&gt;
            &amp;quot;proc&amp;quot;: proc,&lt;br /&gt;
            &amp;quot;ip&amp;quot;: ip,&lt;br /&gt;
            &amp;quot;user&amp;quot;: user,&lt;br /&gt;
            &amp;quot;ip_hash&amp;quot;: stable_hash_to_int(ip),&lt;br /&gt;
            &amp;quot;user_hash&amp;quot;: stable_hash_to_int(user),&lt;br /&gt;
            &amp;quot;is_failed&amp;quot;: is_failed,&lt;br /&gt;
            &amp;quot;is_invalid_user&amp;quot;: is_invalid_user,&lt;br /&gt;
            &amp;quot;is_accepted&amp;quot;: is_accepted,&lt;br /&gt;
            &amp;quot;is_sudo&amp;quot;: is_sudo,&lt;br /&gt;
            &amp;quot;msg_len&amp;quot;: msg_len,&lt;br /&gt;
            &amp;quot;count_5m_ip&amp;quot;: count_5m_ip,&lt;br /&gt;
            &amp;quot;count_10m_user&amp;quot;: count_10m_user,&lt;br /&gt;
        }&lt;br /&gt;
        events.append(event)&lt;br /&gt;
&lt;br /&gt;
    return events&lt;br /&gt;
&lt;br /&gt;
def main():&lt;br /&gt;
    import argparse&lt;br /&gt;
    parser = argparse.ArgumentParser()&lt;br /&gt;
    parser.add_argument(&amp;quot;--infile&amp;quot;, required=True, help=&amp;quot;path ke auth.log&amp;quot;)&lt;br /&gt;
    parser.add_argument(&amp;quot;--outfile&amp;quot;, required=True, help=&amp;quot;output JSONL features&amp;quot;)&lt;br /&gt;
    args = parser.parse_args()&lt;br /&gt;
&lt;br /&gt;
    year = datetime.now().year&lt;br /&gt;
&lt;br /&gt;
    with open(args.infile, &amp;quot;r&amp;quot;, encoding=&amp;quot;utf-8&amp;quot;, errors=&amp;quot;ignore&amp;quot;) as f:&lt;br /&gt;
        lines = f.readlines()&lt;br /&gt;
&lt;br /&gt;
    events = build_features(lines, year)&lt;br /&gt;
&lt;br /&gt;
    with open(args.outfile, &amp;quot;w&amp;quot;, encoding=&amp;quot;utf-8&amp;quot;) as out:&lt;br /&gt;
        for ev in events:&lt;br /&gt;
            out.write(json.dumps(ev) + &amp;quot;\n&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
    print(f&amp;quot;[OK] Parsed {len(events)} events -&amp;gt; {args.outfile}&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
if __name__ == &amp;quot;__main__&amp;quot;:&lt;br /&gt;
    main()&lt;br /&gt;
&lt;br /&gt;
Jalankan:&lt;br /&gt;
&lt;br /&gt;
chmod +x scripts/parse_authlog.py&lt;br /&gt;
./scripts/parse_authlog.py --infile data/auth.log --outfile data/auth_features.jsonl&lt;br /&gt;
head -n 3 data/auth_features.jsonl&lt;br /&gt;
B. scripts/train_models.py — latih Isolation Forest + KMeans&lt;br /&gt;
Buat file:&lt;br /&gt;
nano ~/modul10-ai-anomali/scripts/train_models.py&lt;br /&gt;
Isi:&lt;br /&gt;
#!/usr/bin/env python3&lt;br /&gt;
import json&lt;br /&gt;
import joblib&lt;br /&gt;
import numpy as np&lt;br /&gt;
from pathlib import Path&lt;br /&gt;
from sklearn.ensemble import IsolationForest&lt;br /&gt;
from sklearn.cluster import KMeans&lt;br /&gt;
from sklearn.preprocessing import StandardScaler&lt;br /&gt;
&lt;br /&gt;
FEATURE_COLS = [&lt;br /&gt;
    &amp;quot;hour&amp;quot;, &amp;quot;minute&amp;quot;,&lt;br /&gt;
    &amp;quot;ip_hash&amp;quot;, &amp;quot;user_hash&amp;quot;,&lt;br /&gt;
    &amp;quot;is_failed&amp;quot;, &amp;quot;is_invalid_user&amp;quot;, &amp;quot;is_accepted&amp;quot;, &amp;quot;is_sudo&amp;quot;,&lt;br /&gt;
    &amp;quot;msg_len&amp;quot;,&lt;br /&gt;
    &amp;quot;count_5m_ip&amp;quot;, &amp;quot;count_10m_user&amp;quot;&lt;br /&gt;
]&lt;br /&gt;
&lt;br /&gt;
def load_jsonl(path: str):&lt;br /&gt;
    rows = []&lt;br /&gt;
    with open(path, &amp;quot;r&amp;quot;, encoding=&amp;quot;utf-8&amp;quot;) as f:&lt;br /&gt;
        for line in f:&lt;br /&gt;
            rows.append(json.loads(line))&lt;br /&gt;
    return rows&lt;br /&gt;
&lt;br /&gt;
def to_matrix(rows):&lt;br /&gt;
    X = []&lt;br /&gt;
    for r in rows:&lt;br /&gt;
        X.append([float(r.get(c, 0.0)) for c in FEATURE_COLS])&lt;br /&gt;
    return np.array(X, dtype=float)&lt;br /&gt;
&lt;br /&gt;
def main():&lt;br /&gt;
    import argparse&lt;br /&gt;
    p = argparse.ArgumentParser()&lt;br /&gt;
    p.add_argument(&amp;quot;--infile&amp;quot;, required=True, help=&amp;quot;JSONL features&amp;quot;)&lt;br /&gt;
    p.add_argument(&amp;quot;--outdir&amp;quot;, required=True, help=&amp;quot;folder simpan model&amp;quot;)&lt;br /&gt;
    p.add_argument(&amp;quot;--contamination&amp;quot;, type=float, default=0.02,&lt;br /&gt;
                   help=&amp;quot;perkiraan rasio anomali (mis. 0.01-0.05)&amp;quot;)&lt;br /&gt;
    p.add_argument(&amp;quot;--k&amp;quot;, type=int, default=8, help=&amp;quot;jumlah cluster KMeans&amp;quot;)&lt;br /&gt;
    args = p.parse_args()&lt;br /&gt;
&lt;br /&gt;
    outdir = Path(args.outdir)&lt;br /&gt;
    outdir.mkdir(parents=True, exist_ok=True)&lt;br /&gt;
&lt;br /&gt;
    rows = load_jsonl(args.infile)&lt;br /&gt;
    X = to_matrix(rows)&lt;br /&gt;
&lt;br /&gt;
    scaler = StandardScaler()&lt;br /&gt;
    Xs = scaler.fit_transform(X)&lt;br /&gt;
&lt;br /&gt;
    iso = IsolationForest(&lt;br /&gt;
        n_estimators=300,&lt;br /&gt;
        contamination=args.contamination,&lt;br /&gt;
        random_state=42,&lt;br /&gt;
        n_jobs=-1&lt;br /&gt;
    )&lt;br /&gt;
    iso.fit(Xs)&lt;br /&gt;
&lt;br /&gt;
    km = KMeans(n_clusters=args.k, random_state=42, n_init=&amp;quot;auto&amp;quot;)&lt;br /&gt;
    km.fit(Xs)&lt;br /&gt;
&lt;br /&gt;
    bundle = {&lt;br /&gt;
        &amp;quot;feature_cols&amp;quot;: FEATURE_COLS,&lt;br /&gt;
        &amp;quot;scaler&amp;quot;: scaler,&lt;br /&gt;
        &amp;quot;isolation_forest&amp;quot;: iso,&lt;br /&gt;
        &amp;quot;kmeans&amp;quot;: km&lt;br /&gt;
    }&lt;br /&gt;
    model_path = outdir / &amp;quot;anomali_models.joblib&amp;quot;&lt;br /&gt;
    joblib.dump(bundle, model_path)&lt;br /&gt;
&lt;br /&gt;
    # ringkasan cepat&lt;br /&gt;
    iso_pred = iso.predict(Xs)  # -1 anomali, 1 normal&lt;br /&gt;
    anom_ratio = float(np.mean(iso_pred == -1))&lt;br /&gt;
&lt;br /&gt;
    print(&amp;quot;[OK] Model saved:&amp;quot;, model_path)&lt;br /&gt;
    print(f&amp;quot;[INFO] Events: {len(rows)} | Estimated anomaly ratio (IF): {anom_ratio:.4f}&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
if __name__ == &amp;quot;__main__&amp;quot;:&lt;br /&gt;
    main()&lt;br /&gt;
&lt;br /&gt;
Jalankan:&lt;br /&gt;
chmod +x scripts/train_models.py&lt;br /&gt;
./scripts/train_models.py --infile data/auth_features.jsonl --outdir models --contamination 0.02 --k 8&lt;br /&gt;
ls -lah models&lt;br /&gt;
Tips tuning seru: mainkan --contamination (mis. 0.01, 0.03, 0.05). Lihat bagaimana jumlah anomali berubah.&lt;br /&gt;
C. scripts/detect_anomalies.py — scoring, ranking, export&lt;br /&gt;
Buat file:&lt;br /&gt;
nano ~/modul10-ai-anomali/scripts/detect_anomalies.py&lt;br /&gt;
Isi:&lt;br /&gt;
#!/usr/bin/env python3&lt;br /&gt;
import json&lt;br /&gt;
import csv&lt;br /&gt;
import joblib&lt;br /&gt;
import numpy as np&lt;br /&gt;
from pathlib import Path&lt;br /&gt;
&lt;br /&gt;
def load_jsonl(path: str):&lt;br /&gt;
    rows = []&lt;br /&gt;
    with open(path, &amp;quot;r&amp;quot;, encoding=&amp;quot;utf-8&amp;quot;) as f:&lt;br /&gt;
        for line in f:&lt;br /&gt;
            rows.append(json.loads(line))&lt;br /&gt;
    return rows&lt;br /&gt;
&lt;br /&gt;
def main():&lt;br /&gt;
    import argparse&lt;br /&gt;
    p = argparse.ArgumentParser()&lt;br /&gt;
    p.add_argument(&amp;quot;--features&amp;quot;, required=True, help=&amp;quot;JSONL features&amp;quot;)&lt;br /&gt;
    p.add_argument(&amp;quot;--model&amp;quot;, required=True, help=&amp;quot;joblib model bundle&amp;quot;)&lt;br /&gt;
    p.add_argument(&amp;quot;--outcsv&amp;quot;, required=True, help=&amp;quot;output CSV anomali&amp;quot;)&lt;br /&gt;
    p.add_argument(&amp;quot;--top&amp;quot;, type=int, default=50, help=&amp;quot;ambil top N paling anomali&amp;quot;)&lt;br /&gt;
    args = p.parse_args()&lt;br /&gt;
&lt;br /&gt;
    bundle = joblib.load(args.model)&lt;br /&gt;
    cols = bundle[&amp;quot;feature_cols&amp;quot;]&lt;br /&gt;
    scaler = bundle[&amp;quot;scaler&amp;quot;]&lt;br /&gt;
    iso = bundle[&amp;quot;isolation_forest&amp;quot;]&lt;br /&gt;
    km = bundle[&amp;quot;kmeans&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
    rows = load_jsonl(args.features)&lt;br /&gt;
    X = np.array([[float(r.get(c, 0.0)) for c in cols] for r in rows], dtype=float)&lt;br /&gt;
    Xs = scaler.transform(X)&lt;br /&gt;
&lt;br /&gt;
    # IsolationForest: decision_function makin kecil -&amp;gt; makin anomali&lt;br /&gt;
    iso_score = iso.decision_function(Xs)  # higher = more normal&lt;br /&gt;
    iso_label = iso.predict(Xs)            # -1 anomali&lt;br /&gt;
&lt;br /&gt;
    # KMeans: jarak ke centroid terdekat (makin jauh -&amp;gt; makin anomali)&lt;br /&gt;
    centers = km.cluster_centers_&lt;br /&gt;
    # hitung jarak L2 ke centroid terdekat&lt;br /&gt;
    dists = np.sqrt(((Xs[:, None, :] - centers[None, :, :]) ** 2).sum(axis=2))&lt;br /&gt;
    km_dist = dists.min(axis=1)&lt;br /&gt;
&lt;br /&gt;
    # gabung score sederhana: rank berdasarkan 2 sinyal&lt;br /&gt;
    # normalisasi kasar&lt;br /&gt;
    iso_norm = (iso_score - iso_score.min()) / (iso_score.max() - iso_score.min() + 1e-9)&lt;br /&gt;
    km_norm = (km_dist - km_dist.min()) / (km_dist.max() - km_dist.min() + 1e-9)&lt;br /&gt;
&lt;br /&gt;
    # semakin kecil iso_norm = semakin anomali; semakin besar km_norm = semakin anomali&lt;br /&gt;
    combined = (1.0 - iso_norm) * 0.6 + (km_norm * 0.4)&lt;br /&gt;
&lt;br /&gt;
    # pilih top N&lt;br /&gt;
    idx = np.argsort(-combined)[:args.top]&lt;br /&gt;
&lt;br /&gt;
    outpath = Path(args.outcsv)&lt;br /&gt;
    outpath.parent.mkdir(parents=True, exist_ok=True)&lt;br /&gt;
&lt;br /&gt;
    fieldnames = [&lt;br /&gt;
        &amp;quot;rank&amp;quot;, &amp;quot;combined_score&amp;quot;,&lt;br /&gt;
        &amp;quot;iso_label&amp;quot;, &amp;quot;iso_score&amp;quot;,&lt;br /&gt;
        &amp;quot;km_dist&amp;quot;,&lt;br /&gt;
        &amp;quot;ts&amp;quot;, &amp;quot;hour&amp;quot;, &amp;quot;minute&amp;quot;, &amp;quot;proc&amp;quot;, &amp;quot;user&amp;quot;, &amp;quot;ip&amp;quot;,&lt;br /&gt;
        &amp;quot;is_failed&amp;quot;, &amp;quot;is_invalid_user&amp;quot;, &amp;quot;is_accepted&amp;quot;, &amp;quot;is_sudo&amp;quot;,&lt;br /&gt;
        &amp;quot;count_5m_ip&amp;quot;, &amp;quot;count_10m_user&amp;quot;, &amp;quot;msg_len&amp;quot;&lt;br /&gt;
    ]&lt;br /&gt;
&lt;br /&gt;
    with open(outpath, &amp;quot;w&amp;quot;, newline=&amp;quot;&amp;quot;, encoding=&amp;quot;utf-8&amp;quot;) as f:&lt;br /&gt;
        w = csv.DictWriter(f, fieldnames=fieldnames)&lt;br /&gt;
        w.writeheader()&lt;br /&gt;
        for rnk, i in enumerate(idx, start=1):&lt;br /&gt;
            r = rows[int(i)]&lt;br /&gt;
            w.writerow({&lt;br /&gt;
                &amp;quot;rank&amp;quot;: rnk,&lt;br /&gt;
                &amp;quot;combined_score&amp;quot;: float(combined[i]),&lt;br /&gt;
                &amp;quot;iso_label&amp;quot;: int(iso_label[i]),&lt;br /&gt;
                &amp;quot;iso_score&amp;quot;: float(iso_score[i]),&lt;br /&gt;
                &amp;quot;km_dist&amp;quot;: float(km_dist[i]),&lt;br /&gt;
                &amp;quot;ts&amp;quot;: r.get(&amp;quot;ts&amp;quot;, &amp;quot;&amp;quot;),&lt;br /&gt;
                &amp;quot;hour&amp;quot;: r.get(&amp;quot;hour&amp;quot;, 0),&lt;br /&gt;
                &amp;quot;minute&amp;quot;: r.get(&amp;quot;minute&amp;quot;, 0),&lt;br /&gt;
                &amp;quot;proc&amp;quot;: r.get(&amp;quot;proc&amp;quot;, &amp;quot;&amp;quot;),&lt;br /&gt;
                &amp;quot;user&amp;quot;: r.get(&amp;quot;user&amp;quot;, &amp;quot;&amp;quot;),&lt;br /&gt;
                &amp;quot;ip&amp;quot;: r.get(&amp;quot;ip&amp;quot;, &amp;quot;&amp;quot;),&lt;br /&gt;
                &amp;quot;is_failed&amp;quot;: r.get(&amp;quot;is_failed&amp;quot;, 0),&lt;br /&gt;
                &amp;quot;is_invalid_user&amp;quot;: r.get(&amp;quot;is_invalid_user&amp;quot;, 0),&lt;br /&gt;
                &amp;quot;is_accepted&amp;quot;: r.get(&amp;quot;is_accepted&amp;quot;, 0),&lt;br /&gt;
                &amp;quot;is_sudo&amp;quot;: r.get(&amp;quot;is_sudo&amp;quot;, 0),&lt;br /&gt;
                &amp;quot;count_5m_ip&amp;quot;: r.get(&amp;quot;count_5m_ip&amp;quot;, 0),&lt;br /&gt;
                &amp;quot;count_10m_user&amp;quot;: r.get(&amp;quot;count_10m_user&amp;quot;, 0),&lt;br /&gt;
                &amp;quot;msg_len&amp;quot;: r.get(&amp;quot;msg_len&amp;quot;, 0),&lt;br /&gt;
            })&lt;br /&gt;
&lt;br /&gt;
    anom_count = int(np.sum(iso_label == -1))&lt;br /&gt;
    print(f&amp;quot;[OK] Wrote top-{args.top} anomalies -&amp;gt; {outpath}&amp;quot;)&lt;br /&gt;
    print(f&amp;quot;[INFO] Total events: {len(rows)} | IF anomalies flagged: {anom_count}&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
if __name__ == &amp;quot;__main__&amp;quot;:&lt;br /&gt;
    main()&lt;br /&gt;
Jalankan:&lt;br /&gt;
chmod +x scripts/detect_anomalies.py&lt;br /&gt;
./scripts/detect_anomalies.py --features data/auth_features.jsonl --model models/anomali_models.joblib --outcsv output/anomali_top.csv --top 50&lt;br /&gt;
column -s, -t output/anomali_top.csv | head -n 20&lt;br /&gt;
Cara Membaca Hasil&lt;br /&gt;
Di output/anomali_top.csv, fokus ke:&lt;br /&gt;
count_5m_ip tinggi + is_failed=1 → indikasi brute force&lt;br /&gt;
hour sangat dini (mis. 02:00) + is_sudo=1 → aktivitas admin jam aneh&lt;br /&gt;
user=unknown / invalid_user=1 berulang → scanning user&lt;br /&gt;
proc/sshd dominan → serangan ke SSH (umum banget di server publik)&lt;br /&gt;
Tugas mini yang menantang:&lt;br /&gt;
Ambil 10 anomali teratas, lalu tulis analisis 1–2 kalimat per event:&lt;br /&gt;
“Kenapa ini anomali?”&lt;br /&gt;
“Apa tindakan lanjut?” (block IP? cek user? cek sistem?)&lt;br /&gt;
Simulasi Serangan Ringan (Aman untuk Lab)&lt;br /&gt;
Kalau kamu punya VM/host lab sendiri, bisa memicu event gagal login (tanpa merusak):&lt;br /&gt;
Coba login SSH dengan user salah beberapa kali dari client lab.&lt;br /&gt;
Atau buat event sudo beberapa kali.&lt;br /&gt;
Penting: lakukan hanya di lingkungan yang kamu miliki/diizinkan.&lt;br /&gt;
(Opsional) Amankan Model &amp;amp; Output dengan GnuPG&lt;br /&gt;
Tujuannya: hasil deteksi bisa berisi data sensitif (user, IP, pola aktivitas). Minimal, kamu bisa enkripsi file output dan model sebelum dipindah/diupload.&lt;br /&gt;
1. Generate key (sekali saja)&lt;br /&gt;
&lt;br /&gt;
gpg --full-generate-key&lt;br /&gt;
Cek key:&lt;br /&gt;
gpg --list-keys&lt;br /&gt;
2. Enkripsi output CSV&lt;br /&gt;
Misal email key kamu you@example.com:&lt;br /&gt;
gpg --output output/anomali_top.csv.gpg --encrypt --recipient you@example.com output/anomali_top.csv&lt;br /&gt;
Decrypt:&lt;br /&gt;
gpg --output output/anomali_top.csv --decrypt output/anomali_top.csv.gpg&lt;br /&gt;
3. Enkripsi model&lt;br /&gt;
&lt;br /&gt;
gpg --output models/anomali_models.joblib.gpg --encrypt --recipient you@example.com models/anomali_models.joblib&lt;br /&gt;
Skill security yang dinilai: kamu tidak hanya bikin AI, tapi juga mengelola artefak (model/output) dengan aman.&lt;br /&gt;
&lt;br /&gt;
Output yang Wajib Dikumpulkan&lt;br /&gt;
data/auth_features.jsonl (atau ringkasannya)&lt;br /&gt;
models/anomali_models.joblib (atau versi .gpg)&lt;br /&gt;
output/anomali_top.csv (atau versi .gpg)&lt;br /&gt;
...&lt;br /&gt;
Laporan.md singkat berisi:&lt;br /&gt;
deskripsi dataset (berapa event),&lt;br /&gt;
parameter model (contamination, k),&lt;br /&gt;
10 anomali teratas + analisis,&lt;br /&gt;
3 rekomendasi aksi.&lt;br /&gt;
Template laporan cepat:&lt;br /&gt;
# Laporan Modul 10 — AI Deteksi Anomali&lt;br /&gt;
&lt;br /&gt;
## Dataset&lt;br /&gt;
- Sumber: auth.log&lt;br /&gt;
- Jumlah event: ...&lt;br /&gt;
- Rentang waktu: ...&lt;br /&gt;
&lt;br /&gt;
## Model&lt;br /&gt;
- IsolationForest contamination: ...&lt;br /&gt;
- KMeans k: ...&lt;br /&gt;
- Fitur: hour, minute, is_failed, count_5m_ip, ...&lt;br /&gt;
&lt;br /&gt;
## Temuan Top 10&lt;br /&gt;
1) ...&lt;br /&gt;
   - alasan: ...&lt;br /&gt;
   - tindak lanjut: ...&lt;br /&gt;
&lt;br /&gt;
## Rekomendasi&lt;br /&gt;
- ...&lt;br /&gt;
- ...&lt;br /&gt;
- ...&lt;br /&gt;
Challenge Upgrade (Kalau Mau Naik Level)&lt;br /&gt;
Kalau mahasiswa cepat selesai, kasih 1–2 tantangan ini:&lt;br /&gt;
Tambahkan fitur: hari (weekday) dan deteksi “akses weekend”.&lt;br /&gt;
Buat mode “stream”: baca log baru (tail) dan skor on-the-fly.&lt;br /&gt;
Ganti auth.log ke Nginx access log dan buat fitur:&lt;br /&gt;
request per IP per menit,&lt;br /&gt;
status code 404/500 burst,&lt;br /&gt;
path yang jarang muncul.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
&lt;br /&gt;
* [[Keamanan Informasi: Kuliah]]&lt;/div&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
</feed>