EPRIYADI, EPRIYADI and Stiawan, Deris (2019) UDP FLOOD DDOS ATTACK DETECTION BY THE METHOD OF RULE-BASED SIGNATURES IN REAL-TIME ON NETWORK SDN. Undergraduate thesis, Universitas Sriwijaya.
Text
RAMA_56201_09011281419046.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (2MB) | Request a copy |
|
Text
RAMA_56201_09011281419046_TURNITIN.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (16MB) | Request a copy |
|
Preview |
Text
RAMA_56201_09011281419046_0003047905_01.pdf - Accepted Version Available under License Creative Commons Public Domain Dedication. Download (11MB) | Preview |
Text
RAMA_56201_09011281419046_0003047905_02.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (276kB) | Request a copy |
|
Text
RAMA_56201_09011281419046_0003047905_03.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (271kB) | Request a copy |
|
Text
RAMA_56201_09011281419046_0003047905_04.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (623kB) | Request a copy |
|
Text
RAMA_56201_09011281419046_0003047905_05.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (90kB) | Request a copy |
|
Text
RAMA_56201_09011281419046_0003047905_06_ref.pdf - Bibliography Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (75kB) | Request a copy |
|
Text
RAMA_56201_09011281419046_0003047905_07_lamp.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (184kB) | Request a copy |
Abstract
This research focuses on the UDP Flood DDoS attacks where traffic data is categorized as normal data or anomaly. Packages are sent via UDP packet network is SDN in mininet virtualization using POX Controller. Data extraction was performed to determine the unique attribute that will be used on a Rule-Based algorithm to detect a UDP Flood DDoS attack in a real-time environment. The results obtained in this research in the form of a normal data clustering and data attacks then the accuracy of the grouping will be calculated using the confusion matrix. System IDS that are built using the method of rule-base better in detecting UDP Flood DDoS attack attested with accuracy reaching 98.4% compared with Snort IDS that only 94%.
Item Type: | Thesis (Undergraduate) |
---|---|
Uncontrolled Keywords: | Rule-Based, DDoS, Mininet, SDN, IDS, Confusion Matrix |
Subjects: | T Technology > T Technology (General) > T10.5-11.9 Communication of technical information |
Divisions: | 09-Faculty of Computer Science > 56201-Computer Systems (S1) |
Depositing User: | Users 1685 not found. |
Date Deposited: | 04 Sep 2019 06:56 |
Last Modified: | 04 Sep 2019 06:56 |
URI: | http://repository.unsri.ac.id/id/eprint/6240 |
Actions (login required)
View Item |