KUSDUANDI, AHMAD RAMDHONI and Stiawan, Deris (2022) PENGENALAN POLA SERANGAN TCP SYN FLOOD DDOS PADA JARINGAN INTERNET OF THINGS (IOT) MENGGUNAKAN METODE RULE BASED SIGNATURE ANALYSIS. Undergraduate thesis, Sriwijaya University.
Text
RAMA_56201_09011181823027.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (3MB) | Request a copy |
|
Text
RAMA_56201_09011181823027_TURNITIN.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (7MB) | Request a copy |
|
Preview |
Text
RAMA_56201_09011181823027_0003047905_01_front_ref.pdf - Accepted Version Available under License Creative Commons Public Domain Dedication. Download (651kB) | Preview |
Text
RAMA_56201_09011181823027_0003047905_02.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (570kB) | Request a copy |
|
Text
RAMA_56201_09011181823027_0003047905_03.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (249kB) | Request a copy |
|
Text
RAMA_56201_09011181823027_0003047905_04.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (1MB) | Request a copy |
|
Text
RAMA_56201_09011181823027_0003047905_05.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (63kB) | Request a copy |
|
Text
RAMA_56201_09011181823027_0003047905_06_ref.pdf - Bibliography Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (131kB) | Request a copy |
|
Text
RAMA_56201_09011181823027_0003047905_07_lamp.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (344kB) | Request a copy |
Abstract
Security on the Internet of Thinngs network is still vulnerable to many attacks that are intended to disrupt network communications. Attacks on the Internet of Things (IoT) network can be established at all IoT layers, attacks can occur through RFID communication, IEE 802.15.4 or Zigbee, WiFi, as well as Bluetooth, and nodes (sensors). Distribution Denial of Service (DDoS) is one of the major threats to network security. One of the DDoS attacks on the Internet of Things (IoT) network is TCP SYN Flood DDoS, this attack works by exploiting weaknesses in the TCP protocol, by flooding Syn packets to the server so that the server runs out of resources and makes the server work optimally. Therefore, it is very important to understand the attack pattern on one TCP SYN Flood DDoS attack . One method that has the potential to do pattern recognition is to use the method of Rule Based Signature Analysis . This method recognizes attack patterns by looking for unique attributes on attack packets, so that between attack packets and normal packets can be distinguished. This study uses a dataset called ToN_IoT developed by the Cyber Range Laboratory at UNSW. Rule Based Signature Analysis method will be implemented on IDS using snort. The results of this method obtain the value of Ture Positive Rate (TPR) of 60.9844259% , the value of False Positive Rate (FPR) of 0.037595%, the value of True Negative Rate (TNR) of 99.9624045%, the value of False Negative Rate (FPR) of 39.00212%, the value of precision of 99.971832%, the value of Non-Precision of 53.952001% the accuracy value reaches 73.221971%..
Item Type: | Thesis (Undergraduate) |
---|---|
Uncontrolled Keywords: | Internet of Things, Distributed Denial of Service, Signature Based Analysis, TCP Syn Flood, Intrusion Detection System |
Subjects: | T Technology > T Technology (General) > T1-995 Technology (General) |
Divisions: | 09-Faculty of Computer Science > 56201-Computer Systems (S1) |
Depositing User: | Ahmad Ramdhoni Kusduandi |
Date Deposited: | 30 Aug 2022 04:51 |
Last Modified: | 30 Aug 2022 04:51 |
URI: | http://repository.unsri.ac.id/id/eprint/78075 |
Actions (login required)
View Item |