1. TCP FIN Flood Attack Pattern Recognition on Internet of Things with Rule Based Signature Analysis
- Author
-
Rahmat Budiarto, Mohammad Yazid Bin Idris, Ahmad Heryanto, Farkhana Muchtar, Mohammed Abdullah Alzahrani, Dimas Wahyudi, Deris Stiawan, and Samsuryadi Samsuryadi
- Subjects
Computer science ,Network packet ,business.industry ,Computer applications to medicine. Medical informatics ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Feature extraction ,R858-859.7 ,General Engineering ,Confusion matrix ,Rule-based system ,Feature selection ,Pattern recognition ,Signature (logic) ,Identification (information) ,Pattern recognition (psychology) ,Artificial intelligence ,business - Abstract
Focus of this research is TCP FIN flood attack pattern recognition in Internet of Things (IoT) network using rule based signature analysis method. Dataset is taken based on three scenario normal, attack and normal-attack. The process of identification and recognition of TCP FIN flood attack pattern is done based on observation and analysis of packet attribute from raw data (pcap) using a feature extraction and feature selection method. Further testing was conducted using snort as an IDS. The results of the confusion matrix detection rate evaluation against the snort as IDS show the average percentage of the precision level.
- Published
- 2019
- Full Text
- View/download PDF