Kecerdasan Buatan untuk kKasifikasi Serangan Siber pada Internet of Things Network Traffic
Abstract
Internet of Things (IoT) is an architecture that connects large numbers of smart devices in today's modern global network system. Distributed denial of services (DDoS) attacks are one of the most common types of cyber attacks, targeting servers or networks with the aim of disrupting their normal activities. Although real-time detection and mitigation of DDoS attacks is difficult to achieve, the solution would be invaluable as attacks can cause significant damage. This research utilizes artificial intelligence (AI) to classify attacks on Internet of Things (IoT) network traffic. The resulting classification of DDOS attacks from all types of attacks, namely SYN, ACK, UDP, and UDPplain. The application of a deep learning model with the Convolutional Neural Network (CNN) algorithm is used to classify normal traffic from DDoS cyber attacks. The CNN algorithm performs very well in the classification process with an accuracy of 99%. Next, we plan to build a new model to block or mitigate DDoS attacks based on the output of the CNN classification algorithm used in this research.
References
Al-Masri, E., Kalyanam, K. R., Batts, J., Kim, J., Singh, S., Vo, T., & Yan, C. (2020). Investigating Messaging Protocols for the Internet of Things (IoT). IEEE Access, 8, 94880–94911. https://doi.org/10.1109/ACCESS.2020.2993363
Belli, L., Cilfone, A., Davoli, L., Ferrari, G., Adorni, P., Di Nocera, F., Dall’Olio, A., Pellegrini, C., Mordacci, M., & Bertolotti, E. (2020). IoT-Enabled Smart Sustainable Cities: Challenges and Approaches. Smart Cities, 3(3), 1039–1071. https://doi.org/10.3390/smartcities3030052
Goyal, P., Sahoo, A. K., & Sharma, T. K. (2021). Internet of things: Architecture and enabling technologies. Materials Today: Proceedings, 34, 719–735. https://doi.org/10.1016/j.matpr.2020.04.678
Gupta, M., Jain, R., Arora, S., Gupta, A., Javed Awan, M., Chaudhary, G., & Nobanee, H. (2021). AI-enabled COVID-9 Outbreak Analysis and Prediction: Indian States vs. Union Territories. Computers, Materials & Continua, 67(1), 933–950. https://doi.org/10.32604/cmc.2021.014221
Nishanth, N., & Mujeeb, A. (2021). Modeling and Detection of Flooding-Based Denial-of-Service Attack in Wireless Ad Hoc Network Using Bayesian Inference. IEEE Systems Journal, 15(1), 17–26. https://doi.org/10.1109/JSYST.2020.2984797
Privalov, A., Lukicheva, V., Kotenko, I., & Saenko, I. (2019). Method of Early Detection of Cyber-Attacks on Telecommunication Networks Based on Traffic Analysis by Extreme Filtering. Energies, 12(24), 4768. https://doi.org/10.3390/en12244768
Sanmorino, A. (2019). A study for DDOS attack classification method. Journal of Physics: Conference Series, 1175, 012025. https://doi.org/10.1088/1742-6596/1175/1/012025
Sestrem Ochôa, I., Reis Quietinho Leithardt, V., Calbusch, L., De Paz Santana, J. F., Delcio Parreira, W., Oriel Seman, L., & Albenes Zeferino, C. (2021). Performance and Security Evaluation on a Blockchain Architecture for License Plate Recognition Systems. Applied Sciences, 11(3), 1255. https://doi.org/10.3390/app11031255
Sethi, P., & Sarangi, S. R. (2017). Internet of Things: Architectures, Protocols, and Applications. Journal of Electrical and Computer Engineering, 2017, 1–25. https://doi.org/10.1155/2017/9324035
Vashi, S., Ram, J., Modi, J., Verma, S., & Prakash, C. (2017). Internet of Things (IoT): A vision, architectural elements, and security issues. 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 492–496. https://doi.org/10.1109/I-SMAC.2017.8058399