SURYANI, MEILINDA EKA and Stiawan, Deris (2018) PENGENALAN POLA SERANGAN PING FLOOD DENGAN ALGORITMA K-MEANS PADA JARINGAN INTERNET of THINGS (IoT). Undergraduate thesis, Sriwijaya University.
Preview |
Text
RAMA_56201_09011181320033_0003047905_01_front_ref.pdf - Accepted Version Available under License Creative Commons Public Domain Dedication. Download (444kB) | Preview |
Preview |
Text
RAMA_56201_09011181320033_0003047905_02.pdf - Accepted Version Available under License Creative Commons Public Domain Dedication. Download (356kB) | Preview |
Text
RAMA_56201_09011181320033_0003047905_03.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (773kB) | Request a copy |
|
Text
RAMA_56201_09011181320033_0003047905_04.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (1MB) | Request a copy |
|
Text
RAMA_56201_09011181320033_0003047905_05.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (11kB) | Request a copy |
|
Text
RAMA_56201_09011181320033_0003047905_06_ref.pdf - Bibliography Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (57kB) | Request a copy |
|
Text
RAMA_56201_09011181320033_0003047905_07_lamp.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (564kB) | Request a copy |
Abstract
This research is focused on pattern recognition of ping flood attack on Internet of Things (IoT). The research was conducted on WiFi communication with normal traffic, attack traffic, and the combination of normal and attack traffic. From the scenario, normal dataset, attack dataset, and a combination of normal and attack dataset are generated. The testing was performed by grouping the datasets into two clusters, namely: (i) normal cluster and (ii) attack cluster, using Weka and implementation of K-Means algorithm. The result of clustering with Weka and implementation of K-Means algorithm shows that has average 95.931 packages in attack cluster, and 4.068 packages in normal cluster. The accuracy of clustering result is then calculated using confusion matrix equation. Based on confusion matrix calculation, the accuracy of clustering using K-Means algorithm is very good, reaching 99,94% with 98,62% true negative rate, 100% true positive rate, 0% false negative rate, and 1,38% false positive rate.
Item Type: | Thesis (Undergraduate) |
---|---|
Uncontrolled Keywords: | Interenet of Things (IoT), Pattern, Ping flood, K-Means, Clustering |
Subjects: | T Technology > T Technology (General) > T58.6-58.62 Management information systems |
Divisions: | 09-Faculty of Computer Science > 56201-Computer Systems (S1) |
Depositing User: | Mrs Sri Astuti |
Date Deposited: | 01 Oct 2019 07:33 |
Last Modified: | 01 Oct 2019 07:38 |
URI: | http://repository.unsri.ac.id/id/eprint/9902 |
Actions (login required)
View Item |