PENGENALAN POLA SERANGAN TCP SYN FLOOD DDOS PADA JARINGAN INTERNET OF THINGS (IOT) MENGGUNAKAN METODE RULE BASED SIGNATURE ANALYSIS

KUSDUANDI, AHMAD RAMDHONI and Stiawan, Deris (2022) PENGENALAN POLA SERANGAN TCP SYN FLOOD DDOS PADA JARINGAN INTERNET OF THINGS (IOT) MENGGUNAKAN METODE RULE BASED SIGNATURE ANALYSIS. Undergraduate thesis, Sriwijaya University.

[thumbnail of RAMA_56201_09011181823027.pdf] Text
RAMA_56201_09011181823027.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (3MB) | Request a copy
[thumbnail of RAMA_56201_09011181823027_TURNITIN.pdf] Text
RAMA_56201_09011181823027_TURNITIN.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (7MB) | Request a copy
[thumbnail of RAMA_56201_09011181823027_0003047905_01_front_ref.pdf]
Preview
Text
RAMA_56201_09011181823027_0003047905_01_front_ref.pdf - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (651kB) | Preview
[thumbnail of RAMA_56201_09011181823027_0003047905_02.pdf] Text
RAMA_56201_09011181823027_0003047905_02.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (570kB) | Request a copy
[thumbnail of RAMA_56201_09011181823027_0003047905_03.pdf] Text
RAMA_56201_09011181823027_0003047905_03.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (249kB) | Request a copy
[thumbnail of RAMA_56201_09011181823027_0003047905_04.pdf] Text
RAMA_56201_09011181823027_0003047905_04.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (1MB) | Request a copy
[thumbnail of RAMA_56201_09011181823027_0003047905_05.pdf] Text
RAMA_56201_09011181823027_0003047905_05.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (63kB) | Request a copy
[thumbnail of RAMA_56201_09011181823027_0003047905_06_ref.pdf] Text
RAMA_56201_09011181823027_0003047905_06_ref.pdf - Bibliography
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (131kB) | Request a copy
[thumbnail of RAMA_56201_09011181823027_0003047905_07_lamp.pdf] Text
RAMA_56201_09011181823027_0003047905_07_lamp.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (344kB) | Request a copy

Abstract

Security on the Internet of Thinngs network is still vulnerable to many attacks that are intended to disrupt network communications. Attacks on the Internet of Things (IoT) network can be established at all IoT layers, attacks can occur through RFID communication, IEE 802.15.4 or Zigbee, WiFi, as well as Bluetooth, and nodes (sensors). Distribution Denial of Service (DDoS) is one of the major threats to network security. One of the DDoS attacks on the Internet of Things (IoT) network is TCP SYN Flood DDoS, this attack works by exploiting weaknesses in the TCP protocol, by flooding Syn packets to the server so that the server runs out of resources and makes the server work optimally. Therefore, it is very important to understand the attack pattern on one TCP SYN Flood DDoS attack . One method that has the potential to do pattern recognition is to use the method of Rule Based Signature Analysis . This method recognizes attack patterns by looking for unique attributes on attack packets, so that between attack packets and normal packets can be distinguished. This study uses a dataset called ToN_IoT developed by the Cyber Range Laboratory at UNSW. Rule Based Signature Analysis method will be implemented on IDS using snort. The results of this method obtain the value of Ture Positive Rate (TPR) of 60.9844259% , the value of False Positive Rate (FPR) of 0.037595%, the value of True Negative Rate (TNR) of 99.9624045%, the value of False Negative Rate (FPR) of 39.00212%, the value of precision of 99.971832%, the value of Non-Precision of 53.952001% the accuracy value reaches 73.221971%..

Item Type: Thesis (Undergraduate)
Uncontrolled Keywords: Internet of Things, Distributed Denial of Service, Signature Based Analysis, TCP Syn Flood, Intrusion Detection System
Subjects: T Technology > T Technology (General) > T1-995 Technology (General)
Divisions: 09-Faculty of Computer Science > 56201-Computer Systems (S1)
Depositing User: Ahmad Ramdhoni Kusduandi
Date Deposited: 30 Aug 2022 04:51
Last Modified: 30 Aug 2022 04:51
URI: http://repository.unsri.ac.id/id/eprint/78075

Actions (login required)

View Item View Item