ANDIKA, RIKI and Stiawan, Deris (2018) PENGENALAN POLA SERANGAN DENIAL OF SERVICE (UDP FLOOD) PADA JARINGAN INTERNET OF THINGS (IOT) DENGAN ALGORITMA DECISION TREE C4.5. Undergraduate thesis, Sriwijaya University.
Preview |
Text
RAMA_56201_09011181320015_0003047905_01_front_ref.pdf - Accepted Version Available under License Creative Commons Public Domain Dedication. Download (1MB) | Preview |
Text
RAMA_56201_09011181320015_0003047905_02.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (823kB) | Request a copy |
|
Text
RAMA_56201_09011181320015_0003047905_03.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (1MB) | Request a copy |
|
Text
RAMA_56201_09011181320015_0003047905_04.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (4MB) | Request a copy |
|
Text
RAMA_56201_09011181320015_0003047905_05.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (128kB) | Request a copy |
|
Text
RAMA_56201_09011181320015_0003047905_06_ref.pdf - Bibliography Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (208kB) | Request a copy |
|
Text
RAMA_56201_09011181320015_0003047905_07_lamp.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (444kB) | Request a copy |
Abstract
Recognition of attack pattern is one of the way that can be used to be able to detect attacks that occur on the network. The attacks can be identified by pattern is the denial of service (udp flood) that occurs on the internet of things, the internet of things network built in this research has seven nodes with sensor data which is then sent to the server, using the protocol and xbee protocol. Denial of service attack (upd flood) is a connectionless attack that floats so it can make the network busy with abnormal traffic. The pattern of denial service (udp flood) can be identified by several parameters such as IP time to live, IP length, UDP length and payload. In this research using the C4.5 decision tree algorithm that is used to classify normal data and attack data to obtain effective results with the final research obtained an accuracy value of 99.98% precision of 99.99% and a recall value of 100%.
Item Type: | Thesis (Undergraduate) |
---|---|
Uncontrolled Keywords: | C4.5 decision tree, Denial of service, Flood, Internet of things, Pattern Recognition. |
Subjects: | T Technology > TJ Mechanical engineering and machinery > TJ1125-1345 Machine shops and machine shop practice > TJ1180 Machining, Ceramic materials--Machining-Strength of materials-Machine tools-Design and construction > TJ1180.I34 Machining-Machine tools-Numerical control-Computer integrated manufacturing systems-Artificial intelligence |
Divisions: | 09-Faculty of Computer Science > 56201-Computer Systems (S1) |
Depositing User: | Mrs Sri Astuti |
Date Deposited: | 01 Oct 2019 06:56 |
Last Modified: | 01 Oct 2019 06:56 |
URI: | http://repository.unsri.ac.id/id/eprint/9893 |
Actions (login required)
View Item |