SISTEM DETEKSI MAN IN THE MIDDLE (MITM) ATTACK PADA JARINGAN SUPERVISORY CONTROL AND DATA ACQUISITION (SCADA) MENGGUNAKAN ARTIFICIAL NEURAL NETWORK

YASPRANIKA, YOGI and Stiawan, Deris and Heryanto, Ahmad (2020) SISTEM DETEKSI MAN IN THE MIDDLE (MITM) ATTACK PADA JARINGAN SUPERVISORY CONTROL AND DATA ACQUISITION (SCADA) MENGGUNAKAN ARTIFICIAL NEURAL NETWORK. Undergraduate thesis, Sriwijaya University.

[thumbnail of RAMA_56201_09011181621121.pdf] Text
RAMA_56201_09011181621121.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (8MB) | Request a copy
[thumbnail of RAMA_56201_09011181621121_turnitin.pdf] Text
RAMA_56201_09011181621121_turnitin.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (10MB) | Request a copy
[thumbnail of RAMA_56201_09011181621121_0003047905_0022018703_01_front_ref.pdf]
Preview
Text
RAMA_56201_09011181621121_0003047905_0022018703_01_front_ref.pdf - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (572kB) | Preview
[thumbnail of RAMA_56201_09011181621121_0003047905_0022018703_02.pdf] Text
RAMA_56201_09011181621121_0003047905_0022018703_02.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (865kB) | Request a copy
[thumbnail of RAMA_56201_09011181621121_0003047905_0022018703_03.pdf] Text
RAMA_56201_09011181621121_0003047905_0022018703_03.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (1MB) | Request a copy
[thumbnail of RAMA_56201_09011181621121_0003047905_0022018703_04.pdf] Text
RAMA_56201_09011181621121_0003047905_0022018703_04.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (1MB) | Request a copy
[thumbnail of RAMA_56201_09011181621121_0003047905_0022018703_05.pdf] Text
RAMA_56201_09011181621121_0003047905_0022018703_05.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (197kB) | Request a copy
[thumbnail of RAMA_56201_09011181621121_0003047905_0022018703_06_ref.pdf] Text
RAMA_56201_09011181621121_0003047905_0022018703_06_ref.pdf - Bibliography
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (392kB) | Request a copy
[thumbnail of RAMA_56201_09011181621121_0003047905_0022018703_07_lamp.pdf] Text
RAMA_56201_09011181621121_0003047905_0022018703_07_lamp.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (951kB) | Request a copy

Abstract

Supervisory Control and Data Acquisition is hardware that functions to control geographically dispersed industrial systems, where a centralized data acquisition needed in the operation of the system. IEC 60870-5-104 is one of the protocols used in Scada communication, this protocol has vulnerabilities security in the application layer and data link layer. Man in the Middle attacks has a very high risk of the Scada network, where these attacks can take over the communication between devices that communicate unnoticed. The detection system program in this research uses artificial Neural Networks to distinguish attack packages and normal packages. Detection results are evaluated with the Confusion Matrix to determine the accuracy of MITM ttack detection. From the results of this research, an accuracy of 99.91% was obtained with a TPR value of 100% and an FPR value of around 0.18% for error detection, while TNR ranged between 99.85% and FNR 0%.

Item Type: Thesis (Undergraduate)
Uncontrolled Keywords: Supervisory Control And Data Acquisition, Man In The Middle, Instrusion Detection System, Confusion Matrix
Subjects: Q Science > QA Mathematics > QA75-76.95 Calculating machines > QA76.9.A25 Computer security. Systems and Data Security.
T Technology > T Technology (General) > T58.5-58.64 Information technology > T58.5 General works Management information systems Cf. HD30.213 Industrial management Cf. HF5549.5.C6+ Communication in personnel management Cf. TS158.6 Automatic data collection systems (Production control)
Divisions: 09-Faculty of Computer Science > 56201-Computer Systems (S1)
Depositing User: Users 8322 not found.
Date Deposited: 29 Sep 2020 04:54
Last Modified: 29 Sep 2020 04:54
URI: http://repository.unsri.ac.id/id/eprint/35878

Actions (login required)

View Item View Item