UDP FLOOD DDOS ATTACK DETECTION BY THE METHOD OF RULE-BASED SIGNATURES IN REAL-TIME ON NETWORK SDN

EPRIYADI, EPRIYADI and Stiawan, Deris (2019) UDP FLOOD DDOS ATTACK DETECTION BY THE METHOD OF RULE-BASED SIGNATURES IN REAL-TIME ON NETWORK SDN. Undergraduate thesis, Universitas Sriwijaya.

[thumbnail of RAMA_56201_09011281419046.pdf] Text
RAMA_56201_09011281419046.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (2MB) | Request a copy
[thumbnail of RAMA_56201_09011281419046_TURNITIN.pdf] Text
RAMA_56201_09011281419046_TURNITIN.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (16MB) | Request a copy
[thumbnail of RAMA_56201_09011281419046_0003047905_01.pdf]
Preview
Text
RAMA_56201_09011281419046_0003047905_01.pdf - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (11MB) | Preview
[thumbnail of RAMA_56201_09011281419046_0003047905_02.pdf] Text
RAMA_56201_09011281419046_0003047905_02.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (276kB) | Request a copy
[thumbnail of RAMA_56201_09011281419046_0003047905_03.pdf] Text
RAMA_56201_09011281419046_0003047905_03.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (271kB) | Request a copy
[thumbnail of RAMA_56201_09011281419046_0003047905_04.pdf] Text
RAMA_56201_09011281419046_0003047905_04.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (623kB) | Request a copy
[thumbnail of RAMA_56201_09011281419046_0003047905_05.pdf] Text
RAMA_56201_09011281419046_0003047905_05.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (90kB) | Request a copy
[thumbnail of RAMA_56201_09011281419046_0003047905_06_ref.pdf] Text
RAMA_56201_09011281419046_0003047905_06_ref.pdf - Bibliography
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (75kB) | Request a copy
[thumbnail of RAMA_56201_09011281419046_0003047905_07_lamp.pdf] Text
RAMA_56201_09011281419046_0003047905_07_lamp.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (184kB) | Request a copy

Abstract

This research focuses on the UDP Flood DDoS attacks where traffic data is categorized as normal data or anomaly. Packages are sent via UDP packet network is SDN in mininet virtualization using POX Controller. Data extraction was performed to determine the unique attribute that will be used on a Rule-Based algorithm to detect a UDP Flood DDoS attack in a real-time environment. The results obtained in this research in the form of a normal data clustering and data attacks then the accuracy of the grouping will be calculated using the confusion matrix. System IDS that are built using the method of rule-base better in detecting UDP Flood DDoS attack attested with accuracy reaching 98.4% compared with Snort IDS that only 94%.

Item Type: Thesis (Undergraduate)
Uncontrolled Keywords: Rule-Based, DDoS, Mininet, SDN, IDS, Confusion Matrix
Subjects: T Technology > T Technology (General) > T10.5-11.9 Communication of technical information
Divisions: 09-Faculty of Computer Science > 56201-Computer Systems (S1)
Depositing User: Users 1685 not found.
Date Deposited: 04 Sep 2019 06:56
Last Modified: 04 Sep 2019 06:56
URI: http://repository.unsri.ac.id/id/eprint/6240

Actions (login required)

View Item View Item