PRADIKA, FAJAR and Stiawan, Stiawan and Afifah, Nurul (2025) DETEKSI SERANGAN MAN IN THE MIDDLE (MITM) PADA PROTOKOL JARINGAN IEC 61850 SUPERVISORY CONTROL AND DATA ACQUISITION (SCADA) DENGAN MENGGUNAKAN METODE LONG SHORT TERM MEMORY (LSTM). Undergraduate thesis, Sriwijaya University.
![]() ![]() Preview |
Image
RAMA_56201_09011282126045_Cover.jpg - Cover Image Available under License Creative Commons Public Domain Dedication. Download (338kB) | Preview |
![]() |
Text
RAMA_56201_09011282126045.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (2MB) | Request a copy |
![]() |
Text
RAMA_56201_09011282126045_TURNITIN.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (8MB) | Request a copy |
![]() |
Text
RAMA_56201_09011282126045_0003047905_0010119206_01_front_ref.pdf - Accepted Version Available under License Creative Commons Public Domain Dedication. Download (676kB) |
![]() |
Text
RAMA_56201_09011282126045_0003047905_0010119206_02.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (600kB) | Request a copy |
![]() |
Text
RAMA_56201_09011282126045_0003047905_0010119206_03.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (543kB) | Request a copy |
![]() |
Text
RAMA_56201_09011282126045_0003047905_0010119206_04.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (1MB) | Request a copy |
![]() |
Text
RAMA_56201_09011282126045_0003047905_0010119206_05.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (217kB) | Request a copy |
![]() |
Text
RAMA_56201_09011282126045_0003047905_0010119206_06_ref.pdf - Bibliography Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (202kB) | Request a copy |
![]() |
Text
RAMA_56201_09011282126045_0003047905_0010119206_07_lamp.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (312kB) | Request a copy |
Abstract
A Man-in-the-Middle (MITM) attack is a security threat in network communication that allows an attacker to intercept and modify data transmitted between two devices. This attack can disrupt SCADA-based power systems and occurs in the IEC 61850 communication protocol, particularly in the Generic Object-Oriented Substation Event (GOOSE) protocol.This study utilizes a dataset obtained from MITM attack simulations, consisting of two classes: normal and attack. The Long Short-Term Memory (LSTM) method is applied to detect MITM attacks in the GOOSE protocol.The results show that the LSTM method is effective in detecting MITM attacks with good performance.The best and most stable model configuration was achieved with an 80:20 data split and 200 epochs, yielding an accuracy of 95.96%, precision of 93.33%, recall of 99.19%, and an F1-score of 96.17%. Keyword : Supervisory Control and Data Acquisition, Man In The Middle, IEC 61850, Long Short Term Memory
Item Type: | Thesis (Undergraduate) |
---|---|
Uncontrolled Keywords: | Supervisory Control and Data Acquisition, Man In The Middle, IEC 61850, Long Short Term Memory |
Subjects: | Q Science > Q Science (General) > Q334-342 Computer science. Artificial intelligence. Algorithms. Robotics. Automation. |
Divisions: | 09-Faculty of Computer Science > 56201-Computer Systems (S1) |
Depositing User: | Fajar Pradika |
Date Deposited: | 07 Jul 2025 02:45 |
Last Modified: | 07 Jul 2025 02:45 |
URI: | http://repository.unsri.ac.id/id/eprint/176874 |
Actions (login required)
![]() |
View Item |