SISTEM PENCEGAHAN SERANGAN DDOS TCP FLOOD MENGGUNAKAN ALGORITMA INGRESS/EGRESS FILTERING

CAHYADI, MOHAMMAD and Stiawan, Deris and Heryanto, Ahmad (2021) SISTEM PENCEGAHAN SERANGAN DDOS TCP FLOOD MENGGUNAKAN ALGORITMA INGRESS/EGRESS FILTERING. Undergraduate thesis, Sriwijaya University.

[thumbnail of RAMA_56201_09011381621065.pdf] Text
RAMA_56201_09011381621065.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (7MB) | Request a copy
[thumbnail of RAMA_56201_09011381621065_TURNITIN.pdf] Text
RAMA_56201_09011381621065_TURNITIN.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (5MB) | Request a copy
[thumbnail of RAMA_56201_09011381621065_0003047905_0022018703_01_front_ref.pdf]
Preview
Text
RAMA_56201_09011381621065_0003047905_0022018703_01_front_ref.pdf - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (507kB) | Preview
[thumbnail of RAMA_56201_09011381621065_0003047905_0022018703_02.pdf] Text
RAMA_56201_09011381621065_0003047905_0022018703_02.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (196kB) | Request a copy
[thumbnail of RAMA_56201_09011381621065_0003047905_0022018703_03.pdf] Text
RAMA_56201_09011381621065_0003047905_0022018703_03.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (1MB) | Request a copy
[thumbnail of RAMA_56201_09011381621065_0003047905_0022018703_04.pdf] Text
RAMA_56201_09011381621065_0003047905_0022018703_04.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (1MB) | Request a copy
[thumbnail of RAMA_56201_09011381621065_0003047905_0022018703_05.pdf] Text
RAMA_56201_09011381621065_0003047905_0022018703_05.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (18kB) | Request a copy
[thumbnail of RAMA_56201_09011381621065_0003047905_0022018703_06_ref.pdf] Text
RAMA_56201_09011381621065_0003047905_0022018703_06_ref.pdf - Bibliography
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (80kB) | Request a copy
[thumbnail of RAMA_56201_09011381621065_0003047905_0022018703_07_lamp.pdf] Text
RAMA_56201_09011381621065_0003047905_0022018703_07_lamp.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (4MB) | Request a copy

Abstract

DDoS TCP Flood attack is a condition where the attacker exploits the three-way handshaking mechanism of the TCP connection establishment process, where the server will be flooded with requests for SYN packets without being responded by the server. In preventing TCP Flood DDoS attacks, we need a system that will detect the attack pattern and then independently reject packets that indicated as attacks. In this study, the attack prevention system uses a combination of iptables in which the ingress/egress filtering algorithm is applied and Suricata is in charge of rejecting attack packets with known patterns. The packets sent will initially be filtered based on their prefix in iptables, if the packet has a valid prefix then the packet will be analyzed by Suricata which will determine whether the packet is forwarded to the destination IP address or will be rejected, in the end, the captured packet details on the attacker's computer, the prevention system, and the victim's computer will be validated and compared the number of prevention failures. From the results of testing the attack prevention system using the ingress/egress filtering algorithm, in preventing DDoS TCP Flood attacks, the success rate of preventing IP addresses with valid prefixes reaches 93.33%. while prevention for IP addresses with invalid prefixes (Spoofing), ingress/egress filtering managed to prevent all these attack packets.

Item Type: Thesis (Undergraduate)
Uncontrolled Keywords: TCP Flood, Intrusion Prevention System, Ingress/Egress Filtering, iptables, suricata
Subjects: Q Science > QA Mathematics > QA75-76.95 Calculating machines > QA76.9.E94 Computer system performance. Computer Communication Networks. Computer science. Logic design. Operating systems (Computers).
Divisions: 09-Faculty of Computer Science > 56201-Computer Systems (S1)
Depositing User: Mohammad Cahyadi
Date Deposited: 31 Aug 2021 02:34
Last Modified: 31 Aug 2021 02:34
URI: http://repository.unsri.ac.id/id/eprint/52821

Actions (login required)

View Item View Item