Deteksi Serangan Distributed Denia of Services (DDOS) Berbasis HTTP Menggunakan Metode Fuzzy Sugeno
DOI:
https://doi.org/10.14421/jiska.2020.43-03Abstract
Distributed Denial of Services (DDOS) is a type of attack that exploits the web. This attack causes the server to go down and a system error. Thus, early detection of DDOS attacks is fundamental. The purpose of this paper is to develop applications that are capable of detecting HTTP-based DDOS attacks. This paper uses the sugeno fuzzy method for a systematic approach. From several studies that have been conducted, the researchers identified that the optimal input variables included the number of users, number of packages, number of lengths / users, and length of packages. Data processing used MATLAB software. The validity of the test uses the formula for the level of accuracy as in equation (3), resulting in an application that is able to detect HTTP-based DDOS attacks using sugeno fuzzy method with an accuracy rate of up to 90%.References
Adrian, R., & Isnianto, H. N. (2016). Analisa Pengaruh Variasi Serangan DDOS pada Performa Router. Seminar Nasional Teknologi Terapan.
Kulkolj, D. (2002). Design of Adaptive Takagi-Sugeno-Kang Fuzzy Model. Applied Soft Computing, 89-103.
Kusumadewi, S., & Purnomo, H. (2010). Aplikasi Logika Fuzzy untuk Pendukung Keputusan. Yogyakarta: Graha Ilmu.
Muhammad, A. W., & Alameka, F. (2017). Integrasi Normalized Relative Network Entropy dan Neural Network Backpropagation (BP). JURTI, 1-6.
Muhammad, A. W., Riadi, I., & Sunardi. (2016). Analisis Statistika Log Jaringan untuk Deteksi Serangan DDOS Berbasis Neural Network. Jurnal Ilmiah ILKOM.
Petkovic, M., Basicevic, I., Kukolj, D., & Popovic, M. (2015). Evaluation of Takagi-Sugeno-Kang Fuzzy Method in Entropy-based Detection of DDoS Attacks. Computer Science and Information Systems, 139-162.
Rahakbauw, D. L. (2015). Penerapan Logika Fuzzy Metode Sugeno untuk Menentukan Jumlah Produksi Roti Berdasarkan Data Persediaan dan Jumlah Pertanian. Jurnal Ilmu Matematika dan Ilmu Terapan, 121-134.
Rumare, R. R., Ciptaningtyas, H. T., & Santoso, B. J. (2017). Aplikasi Pendeteksi Serangan pada HTTP Menggunakan N-Gram. Jurnal Teknik ITS.
Sihombing, R. O., & Zulfin, M. (n.d.). Analisis Kinerja Trafik Web Browser dengan Wireshark Network Protocol Analyzer pada Sistem Client-Server.
Simanjuntak, P., Suharyanto, C. E., & Khairiyah, R. (2018). Fuzzy Sugeno untuk Menentukan Penilaian kompetensi Karyawan PT. Scheinder Batam. Information Sytem Developtment, 2.
Siregar, J. J. (n.d.). Analisis Exploitasi Keamanan Web Denial of Services Attack.
Sugianto, D. (2003). LDL Membangun Website dengan PHP. Jakarta: D@takom.
Wardhana, L., & Makodian, N. (2010). Teknologi Wireless COmmunication dan Wireless Broadcast. Jakarta: Andi Offset.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms as stated in http://creativecommons.org/licenses/by-nc/4.0
a. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
b. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
c. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.