WAHYUDI, DIMAS and Stiawan, Deris (2018) DETEKSI SERANGAN DENIAL OF SERVICE MENGGUNAKAN RULE BASED SIGNATURE ANALYSIS PADA JARINGAN INTERNET OF THINGS. Undergraduate thesis, Sriwijaya University.
Preview |
Text
RAMA_56201_09011281320004_0003047905_01_front_ref.pdf - Accepted Version Available under License Creative Commons Public Domain Dedication. Download (10MB) | Preview |
Text
RAMA_56201_09011281320004_0003047905_02.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (1MB) | Request a copy |
|
Text
RAMA_56201_09011281320004_0003047905_03.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (3MB) | Request a copy |
|
Text
RAMA_56201_09011281320004_0003047905_04.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (5MB) | Request a copy |
|
Text
RAMA_56201_09011281320004_0003047905_05.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (492kB) | Request a copy |
|
Text
RAMA_56201_09011281320004_0003047905_06_ref.pdf - Bibliography Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (416kB) | Request a copy |
|
Text
RAMA_56201_09011281320004_0003047905_07_lamp.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (17MB) | Request a copy |
Abstract
This research focus on pattern recognition of TCP FIN flood and zbassocflood/association flooding attacks on Internet of Things (IoT) network using rule based signature analysis method. The research was conducted on WiFi and IEEE 802.15.4 communication with normal traffic, attack traffic and combined normal – attack traffic, fifteen different datasets were generated from these schemes, consisting of normal datasets, attack datasets and normal-attack datasets. The testing was performanced on two stages, there are : (i) testing with Snort Rules as Intrusion Detection System (IDS), and (ii) testing with rule based signature analysis method using Intrusion Detection Engine (IDE) naive string matching. In this research, the measurement of detection result using confusion matrix detection rate method bases on Snort IDS and Intrusion Detection Engine (IDE) naive string matching are presented. The Snort IDS shows that has average 17,7845% of TPR, 0,0266% FPR, 79,9734% TNR, 62,2155% for FNR and the detection accuracy is 26,3268%. While the Intrusion Detection Engine (IDE) using naive string matching that has average percentage 99,9131% of TPR, 0% FPR, 100% TNR, 0,0869% FNR and the detection accuracy is 99,9199%.
Item Type: | Thesis (Undergraduate) |
---|---|
Uncontrolled Keywords: | TCP FIN flood, zbassocflood / association flooding, Internet of Things (IoT), Snort Intrusion Detection System (IDS), Intrusion Detection Engine (IDE), Naive String Matching |
Subjects: | T Technology > TA Engineering (General). Civil engineering (General) > TA174.A385 Engineering design--Data processing. Manufacturing processes--Data processing. Computer integrated manufacturing systems. Manufacturing processes--Automation. CAD/CAM systems. |
Divisions: | 09-Faculty of Computer Science > 56201-Computer Systems (S1) |
Depositing User: | Mrs Sri Astuti |
Date Deposited: | 02 Oct 2019 01:20 |
Last Modified: | 02 Oct 2019 01:20 |
URI: | http://repository.unsri.ac.id/id/eprint/9947 |
Actions (login required)
View Item |