Kecerdasan Buatan untuk kKasifikasi Serangan Siber pada Internet of Things Network Traffic

  • Randi Rizal Universitas Siliwangi
  • Nur Widiyasono Universitas Siliwangi
  • Siti Yuliyanti Universitas Siliwangi


Internet of Things (IoT) is an architecture that connects large numbers of smart devices in today's modern global network system. Distributed denial of services (DDoS) attacks are one of the most common types of cyber attacks, targeting servers or networks with the aim of disrupting their normal activities. Although real-time detection and mitigation of DDoS attacks is difficult to achieve, the solution would be invaluable as attacks can cause significant damage. This research utilizes artificial intelligence (AI) to classify attacks on Internet of Things (IoT) network traffic. The resulting classification of DDOS attacks from all types of attacks, namely SYN, ACK, UDP, and UDPplain. The application of a deep learning model with the Convolutional Neural Network (CNN) algorithm is used to classify normal traffic from DDoS cyber attacks. The CNN algorithm performs very well in the classification process with an accuracy of 99%. Next, we plan to build a new model to block or mitigate DDoS attacks based on the output of the CNN classification algorithm used in this research.


Alam, T. M., & Awan, M. J. (2018). Domain Analysis of Information Extraction Techniques. INTERNATIONAL JOURNAL OF MULTIDISCIPLINARY SCIENCES AND ENGINEERING, 9(6).
Al-Masri, E., Kalyanam, K. R., Batts, J., Kim, J., Singh, S., Vo, T., & Yan, C. (2020). Investigating Messaging Protocols for the Internet of Things (IoT). IEEE Access, 8, 94880–94911.
Belli, L., Cilfone, A., Davoli, L., Ferrari, G., Adorni, P., Di Nocera, F., Dall’Olio, A., Pellegrini, C., Mordacci, M., & Bertolotti, E. (2020). IoT-Enabled Smart Sustainable Cities: Challenges and Approaches. Smart Cities, 3(3), 1039–1071.
Goyal, P., Sahoo, A. K., & Sharma, T. K. (2021). Internet of things: Architecture and enabling technologies. Materials Today: Proceedings, 34, 719–735.
Gupta, M., Jain, R., Arora, S., Gupta, A., Javed Awan, M., Chaudhary, G., & Nobanee, H. (2021). AI-enabled COVID-9 Outbreak Analysis and Prediction: Indian States vs. Union Territories. Computers, Materials & Continua, 67(1), 933–950.
Nishanth, N., & Mujeeb, A. (2021). Modeling and Detection of Flooding-Based Denial-of-Service Attack in Wireless Ad Hoc Network Using Bayesian Inference. IEEE Systems Journal, 15(1), 17–26.
Privalov, A., Lukicheva, V., Kotenko, I., & Saenko, I. (2019). Method of Early Detection of Cyber-Attacks on Telecommunication Networks Based on Traffic Analysis by Extreme Filtering. Energies, 12(24), 4768.
Sanmorino, A. (2019). A study for DDOS attack classification method. Journal of Physics: Conference Series, 1175, 012025.
Sestrem Ochôa, I., Reis Quietinho Leithardt, V., Calbusch, L., De Paz Santana, J. F., Delcio Parreira, W., Oriel Seman, L., & Albenes Zeferino, C. (2021). Performance and Security Evaluation on a Blockchain Architecture for License Plate Recognition Systems. Applied Sciences, 11(3), 1255.
Sethi, P., & Sarangi, S. R. (2017). Internet of Things: Architectures, Protocols, and Applications. Journal of Electrical and Computer Engineering, 2017, 1–25.
Vashi, S., Ram, J., Modi, J., Verma, S., & Prakash, C. (2017). Internet of Things (IoT): A vision, architectural elements, and security issues. 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 492–496.
How to Cite
RIZAL, Randi; WIDIYASONO, Nur; YULIYANTI, Siti. Kecerdasan Buatan untuk kKasifikasi Serangan Siber pada Internet of Things Network Traffic. JUMANJI (Jurnal Masyarakat Informatika Unjani), [S.l.], v. 7, n. 2, p. 61-71, nov. 2023. ISSN 2598-8069. Available at: <>. Date accessed: 19 apr. 2024. doi: