DETEKSI MAN IN THE MIDDLE (MITM) ATTACK PADA SMARTHOME DENGAN MENGGUNAKAN DECISION TREE

PEBRIAN, BAYU AKBAR and Stiawan, Deris and Exaudi, Kemahyanto (2024) DETEKSI MAN IN THE MIDDLE (MITM) ATTACK PADA SMARTHOME DENGAN MENGGUNAKAN DECISION TREE. Undergraduate thesis, Sriwijaya University.

[thumbnail of RAMA_56201_09011382025109.pdf] Text
RAMA_56201_09011382025109.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (2MB) | Request a copy
[thumbnail of RAMA_56201_09011382025109_TURNITIN.pdf] Text
RAMA_56201_09011382025109_TURNITIN.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (3MB) | Request a copy
[thumbnail of RAMA_56201_09011382025109_0003047905_0025058403_01_front_ref.pdf] Text
RAMA_56201_09011382025109_0003047905_0025058403_01_front_ref.pdf - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (857kB)
[thumbnail of RAMA_56201_09011382025109_0003047905_0025058403_02.pdf] Text
RAMA_56201_09011382025109_0003047905_0025058403_02.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (251kB) | Request a copy
[thumbnail of RAMA_56201_09011382025109_0003047905_0025058403_03.pdf] Text
RAMA_56201_09011382025109_0003047905_0025058403_03.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (337kB) | Request a copy
[thumbnail of RAMA_56201_09011382025109_0003047905_0025058403_04.pdf] Text
RAMA_56201_09011382025109_0003047905_0025058403_04.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (1MB) | Request a copy
[thumbnail of RAMA_56201_09011382025109_0003047905_0025058403_05.pdf] Text
RAMA_56201_09011382025109_0003047905_0025058403_05.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (35kB) | Request a copy
[thumbnail of RAMA_56201_09011382025109_0003047905_0025058403_06_ref.pdf] Text
RAMA_56201_09011382025109_0003047905_0025058403_06_ref.pdf - Bibliography
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (100kB) | Request a copy
[thumbnail of RAMA_56201_09011382025109_0003047905_0025058403_07_lamp.pdf] Text
RAMA_56201_09011382025109_0003047905_0025058403_07_lamp.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (539kB) | Request a copy

Abstract

Man In The Middle type of attack in which the attacker secretly infiltrates and monitors, modifies the communication between two parties without their knowledge. and can change the mac address of the attacked device. In this study using a dataset from COMNETS Smarthome which consists of two types of classes, namely, benign and mitm to detect man in the middle attacks arp poisoning using the Decision Tree method. The Decision Tree method uses two types of criteria, namely, gini and entropy. The results of this study prove that the Decision Tree method using the gini criterion is able to detect man in the middle attacks by achieving the best performance with an accuracy rate of 99.22%, precision of 99.64%, recall of 99.50%, and f1-score of 99.57%.

Item Type: Thesis (Undergraduate)
Uncontrolled Keywords: Man In The Middle Attack, Decision Tree, ARP Poisoning
Subjects: Q Science > Q Science (General) > Q334-342 Computer science. Artificial intelligence. Algorithms. Robotics. Automation.
Divisions: 09-Faculty of Computer Science > 56201-Computer Systems (S1)
Depositing User: Bayu Akbar Pebrian
Date Deposited: 10 Jul 2024 07:51
Last Modified: 10 Jul 2024 07:51
URI: http://repository.unsri.ac.id/id/eprint/150205

Actions (login required)

View Item View Item