DETEKSI SERANGAN DDOS DOS DAN MITM PADA JARINGAN SMARTHOME DENGAN MENGGUNAKAN METODE DECISION TREE

PRATAMA, EDO and Stiawan, Deris and Afifah, Nurul (2025) DETEKSI SERANGAN DDOS DOS DAN MITM PADA JARINGAN SMARTHOME DENGAN MENGGUNAKAN METODE DECISION TREE. Undergraduate thesis, Sriwijaya University.

[thumbnail of RAMA_56201_09011182126007.pdf] Text
RAMA_56201_09011182126007.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (5MB) | Request a copy
[thumbnail of RAMA_56201_09011182126007_TURNITIN.pdf] Text
RAMA_56201_09011182126007_TURNITIN.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (11MB) | Request a copy
[thumbnail of RAMA_56201_09011182126007_0003047905_8958340022_01_front_ref.pdf] Text
RAMA_56201_09011182126007_0003047905_8958340022_01_front_ref.pdf - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (900kB)
[thumbnail of RAMA_56201_09011182126007_0003047905_8958340022_02.pdf] Text
RAMA_56201_09011182126007_0003047905_8958340022_02.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (798kB) | Request a copy
[thumbnail of RAMA_56201_09011182126007_0003047905_8958340022_03.pdf] Text
RAMA_56201_09011182126007_0003047905_8958340022_03.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (534kB) | Request a copy
[thumbnail of RAMA_56201_09011182126007_0003047905_8958340022_04.pdf] Text
RAMA_56201_09011182126007_0003047905_8958340022_04.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (2MB) | Request a copy
[thumbnail of RAMA_56201_09011182126007_0003047905_8958340022_05.pdf] Text
RAMA_56201_09011182126007_0003047905_8958340022_05.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (12kB) | Request a copy
[thumbnail of RAMA_56201_09011182126007_0003047905_8958340022_06_ref.pdf] Text
RAMA_56201_09011182126007_0003047905_8958340022_06_ref.pdf - Bibliography
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (99kB) | Request a copy
[thumbnail of RAMA_56201_09011182126007_0003047905_8958340022_07_lamp.pdf] Text
RAMA_56201_09011182126007_0003047905_8958340022_07_lamp.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (570kB) | Request a copy

Abstract

Smart Home is a form of automation technology designed to facilitate household activities with the help of the Internet of Things (IoT). IoT technology enables objects around us, such as sensors, cameras, and smart devices, to connect to the Internet. However, the advancement of IoT technology also makes it a target for cyberattacks such as Distributed Denial of Service (DDoS), Denial of Service (DoS), and Man-in-the-Middle (MITM) attacks. In this study, the authors conducted a real-world simulation of attacks, including DDoS, DoS, and MITM, on vulnerable Smart Home devices as a form of security testing. The use of information security tools played a crucial role in the success of this testing, employing tools such as CapLoader, Network Miner, Dynamite Lab, and IDS Snort. Additionally, T-Shark was utilized to extract data from .pcap files into .csv format for testing with Machine Learning algorithms, specifically using the Decision Tree model. The results of the study demonstrated that the Decision Tree method with the Gini criterion achieved excellent performance, with the highest F1-scores recorded for the following categories: MITM at 98.68%, Benign at 99.97%, DDoS at 99.99%, and DoS at 99.96%.

Item Type: Thesis (Undergraduate)
Uncontrolled Keywords: Smarthome, DDoS, DoS, MiTM, Snort, T-Shark, Caploader, Network Miner, DynamiteLab, Decision Tree
Subjects: T Technology > T Technology (General) > T57.6-57.97 Operations research. Systems analysis > T57.85 Network systems theory Including network analysis Cf. TS157.5+ Scheduling
Divisions: 09-Faculty of Computer Science > 56201-Computer Systems (S1)
Depositing User: Edo Pratama
Date Deposited: 16 Jan 2025 14:45
Last Modified: 16 Jan 2025 14:45
URI: http://repository.unsri.ac.id/id/eprint/165182

Actions (login required)

View Item View Item