DETEKSI SERANGAN DDOS PADA JARINGAN SMART HOME IPV6 MENGGUNAKAN METODE RANDOM FOREST

YUDHA, ARDI TRI and Stiawan, Deris and Hermansyah, Adi (2025) DETEKSI SERANGAN DDOS PADA JARINGAN SMART HOME IPV6 MENGGUNAKAN METODE RANDOM FOREST. Undergraduate thesis, Sriwijaya University.

[thumbnail of RAMA_56201_09011282126043_cover.jpg]
Preview
Image
RAMA_56201_09011282126043_cover.jpg - Cover Image
Available under License Creative Commons Public Domain Dedication.

Download (238kB) | Preview
[thumbnail of RAMA_56201_09011282126043.pdf] Text
RAMA_56201_09011282126043.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (2MB) | Request a copy
[thumbnail of RAMA_56201_09011282126043_TURNITIN.pdf] Text
RAMA_56201_09011282126043_TURNITIN.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (5MB) | Request a copy
[thumbnail of RAMA_56201_09011282126043_0003047905_0030048909_01_front_ref.pdf] Text
RAMA_56201_09011282126043_0003047905_0030048909_01_front_ref.pdf - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (856kB)
[thumbnail of RAMA_56201_09011282126043_0003047905_0030048909_02.pdf] Text
RAMA_56201_09011282126043_0003047905_0030048909_02.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (522kB) | Request a copy
[thumbnail of RAMA_56201_09011282126043_0003047905_0030048909_03.pdf] Text
RAMA_56201_09011282126043_0003047905_0030048909_03.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (545kB) | Request a copy
[thumbnail of RAMA_56201_09011282126043_0003047905_0030048909_04.pdf] Text
RAMA_56201_09011282126043_0003047905_0030048909_04.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (1MB) | Request a copy
[thumbnail of RAMA_56201_09011282126043_0003047905_0030048909_05.pdf] Text
RAMA_56201_09011282126043_0003047905_0030048909_05.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (2MB) | Request a copy
[thumbnail of RAMA_56201_09011282126043_0003047905_0030048909_06_ref.pdf] Text
RAMA_56201_09011282126043_0003047905_0030048909_06_ref.pdf - Bibliography
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (185kB) | Request a copy
[thumbnail of RAMA_56201_09011282126043_0003047905_0030048909_07_lamp.pdf] Text
RAMA_56201_09011282126043_0003047905_0030048909_07_lamp.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (402kB) | Request a copy

Abstract

DDoS attacks are one of the most common network security threats on the internet. This attack utilizes various sources to send excessive traffic to a server, resulting in system disruption. This makes DDoS a serious threat to IPv6-based topologies and infrastructure. This study uses a dataset from COMNETS Smart Home IPv6, which consists of two types of classes, namely benign and DDoS, to detect DDoS attacks using the Random Forest method. The results of the study show that the Random Forest method is an effective technique in detecting DDoS attacks and has good overall performance with an accuracy of 90.74%, precision 100%, recall 81.60% and f1_score 89.87%.

Item Type: Thesis (Undergraduate)
Subjects: T Technology > T Technology (General) > T57.6-57.97 Operations research. Systems analysis > T57.85 Network systems theory Including network analysis Cf. TS157.5+ Scheduling
Divisions: 09-Faculty of Computer Science > 56201-Computer Systems (S1)
Depositing User: Ardi Tri Yudha
Date Deposited: 25 Mar 2025 01:51
Last Modified: 25 Mar 2025 01:51
URI: http://repository.unsri.ac.id/id/eprint/170026

Actions (login required)

View Item View Item