NUZULASTRI, SARI and Stiawan, Deris and Satria, Hadipurnawan (2024) CLUSTERING SERANGAN MAN IN THE MIDDLE (MITM) PADA BLOCKCHAIN BERBASIS CHAIN DAN GRAPH DI JARINGAN INTERNET OF THINGS (IOT) MENGGUNAKAN K-MEANS. Masters thesis, Sriwijaya University.
Text
RAMA_55101_09012682125020.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (5MB) |
|
Text
RAMA_55101_09012682125020_TURNITIN.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (9MB) |
|
Text
RAMA_55101_09012682125020_0003047905_0018048003_01_front_ref.pdf - Accepted Version Available under License Creative Commons Public Domain Dedication. Download (1MB) |
|
Text
RAMA_55101_09012682125020_0003047905_0018048003_02.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (538kB) |
|
Text
RAMA_55101_09012682125020_0003047905_0018048003_03.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (272kB) |
|
Text
RAMA_55101_09012682125020_0003047905_0018048003_04.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (544kB) |
|
Text
RAMA_55101_09012682125020_0003047905_0018048003_05.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (36kB) |
|
Text
RAMA_55101_09012682125020_0003047905_0018048003_06_ref.pdf - Bibliography Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (113kB) |
|
Text
RAMA_55101_09012682125020_0003047905_0018048003_07_lamp.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (3MB) |
Abstract
Network security on Internet of Thing (IoT) devices in the IoT development process may open rooms for hackers and other problems if not properly protected, particularly in the addition of internet connectivity to computing device systems that are interrelated in transferring data automatically over the network. This study implements network detection on IoT network security resembles security systems from man in the middle (MITM) attacks on blockchains. Security systems exist on blockchains are decentralized and have peer to peer characteristics which are categorized into several parts based on the type of architecture that suits their use cases such as blockchain chain based and graph based. This study uses the principal component analysis (PCA) to extract features from the transaction data processing on the blockchain process and produces 9 features before the K- Means algorithm with the elbow technique was used for classifying the types of MITM attacks on IoT networks and comparing the types of blockchain chain-based and graph-based architectures in the form of visualizations as well. Experimental results shows 97.16% of normal data and 2.84% of MITM attack data were observered.
Item Type: | Thesis (Masters) |
---|---|
Subjects: | Q Science > QA Mathematics > QA75-76.95 Calculating machines > QA75 Electronic computers. Computer science |
Divisions: | 09-Faculty of Computer Science > 55101-Informatics (S2) |
Depositing User: | Sari Nuzulastari |
Date Deposited: | 22 Jan 2024 13:14 |
Last Modified: | 22 Jan 2024 13:14 |
URI: | http://repository.unsri.ac.id/id/eprint/139311 |
Actions (login required)
View Item |