TCP FIN flood attack pattern recognition on internet of things with rule based signature analysis

Focus of this research is Transmission Control Protocol (TCP) FIN flood attack pattern recognition in Internet of Things network using rule based signature analysis method. Dataset is created using three traffic scenarios: normal, attack and normal-attack. The process of identification and recogniti...

Full description

Saved in:
Bibliographic Details
Main Authors: Stiawan, Deris, Wahyudi, Dimas, Heryanto, Ahmad, Samsuryadi, Samsuryadi, Idris, Mohd. Yazid, Muchtar, Farkhana, Alzahrani, Mohammed Abdullah, Budiarto, Rahmat
Format: Article
Language:English
Published: Kassel University Press GmbH 2019
Subjects:
Online Access:http://eprints.utm.my/id/eprint/88122/1/MohdYazidIdris2019_TCPFINFloodAttackPatternRecognition.pdf
http://eprints.utm.my/id/eprint/88122/
http://dx.doi.org/10.3991/ijoe.v15i07.9848
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
Language: English
id my.utm.88122
record_format eprints
spelling my.utm.881222020-12-14T23:07:37Z http://eprints.utm.my/id/eprint/88122/ TCP FIN flood attack pattern recognition on internet of things with rule based signature analysis Stiawan, Deris Wahyudi, Dimas Heryanto, Ahmad Samsuryadi, Samsuryadi Idris, Mohd. Yazid Muchtar, Farkhana Alzahrani, Mohammed Abdullah Budiarto, Rahmat QA75 Electronic computers. Computer science Focus of this research is Transmission Control Protocol (TCP) FIN flood attack pattern recognition in Internet of Things network using rule based signature analysis method. Dataset is created using three traffic scenarios: normal, attack and normal-attack. The process of identification and recognition of TCP FIN flood attack pattern is done by observing and analyzing packet's attributes from raw data (pcap format) through a feature extraction and feature selection processes. Further experiments were conducted using Snort as intrusion detection system (IDS). The evaluation results of the rate of confusion matrix detection against the Snort as IDS show the average percentage of the precision level. Kassel University Press GmbH 2019-04 Article PeerReviewed application/pdf en http://eprints.utm.my/id/eprint/88122/1/MohdYazidIdris2019_TCPFINFloodAttackPatternRecognition.pdf Stiawan, Deris and Wahyudi, Dimas and Heryanto, Ahmad and Samsuryadi, Samsuryadi and Idris, Mohd. Yazid and Muchtar, Farkhana and Alzahrani, Mohammed Abdullah and Budiarto, Rahmat (2019) TCP FIN flood attack pattern recognition on internet of things with rule based signature analysis. International Journal Of Online And Biomedical Engineering (IJOE), 15 (7). pp. 124-139. ISSN 2626-8493 http://dx.doi.org/10.3991/ijoe.v15i07.9848 DOI:10.3991/ijoe.v15i07.9848
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Stiawan, Deris
Wahyudi, Dimas
Heryanto, Ahmad
Samsuryadi, Samsuryadi
Idris, Mohd. Yazid
Muchtar, Farkhana
Alzahrani, Mohammed Abdullah
Budiarto, Rahmat
TCP FIN flood attack pattern recognition on internet of things with rule based signature analysis
description Focus of this research is Transmission Control Protocol (TCP) FIN flood attack pattern recognition in Internet of Things network using rule based signature analysis method. Dataset is created using three traffic scenarios: normal, attack and normal-attack. The process of identification and recognition of TCP FIN flood attack pattern is done by observing and analyzing packet's attributes from raw data (pcap format) through a feature extraction and feature selection processes. Further experiments were conducted using Snort as intrusion detection system (IDS). The evaluation results of the rate of confusion matrix detection against the Snort as IDS show the average percentage of the precision level.
format Article
author Stiawan, Deris
Wahyudi, Dimas
Heryanto, Ahmad
Samsuryadi, Samsuryadi
Idris, Mohd. Yazid
Muchtar, Farkhana
Alzahrani, Mohammed Abdullah
Budiarto, Rahmat
author_facet Stiawan, Deris
Wahyudi, Dimas
Heryanto, Ahmad
Samsuryadi, Samsuryadi
Idris, Mohd. Yazid
Muchtar, Farkhana
Alzahrani, Mohammed Abdullah
Budiarto, Rahmat
author_sort Stiawan, Deris
title TCP FIN flood attack pattern recognition on internet of things with rule based signature analysis
title_short TCP FIN flood attack pattern recognition on internet of things with rule based signature analysis
title_full TCP FIN flood attack pattern recognition on internet of things with rule based signature analysis
title_fullStr TCP FIN flood attack pattern recognition on internet of things with rule based signature analysis
title_full_unstemmed TCP FIN flood attack pattern recognition on internet of things with rule based signature analysis
title_sort tcp fin flood attack pattern recognition on internet of things with rule based signature analysis
publisher Kassel University Press GmbH
publishDate 2019
url http://eprints.utm.my/id/eprint/88122/1/MohdYazidIdris2019_TCPFINFloodAttackPatternRecognition.pdf
http://eprints.utm.my/id/eprint/88122/
http://dx.doi.org/10.3991/ijoe.v15i07.9848
_version_ 1687393528573853696