A Classification Data Packets Using the Threshold Method for Detection of DDoS

Computer communication is done by first synchronizing one computer with another computer. This synchronization contains Data Packages which can be detrimental if done continuously, it will be categorized as an attack. This type of attack, when performed against a target by many computers, is called...

Full description

Saved in:
Bibliographic Details
Main Authors: Sukma Aji, Davito Rasendriya Rizqullah Putra, Imam Riadi, Abdul Fadlil, Muhammad Nur Faiz, Arif Wirawan Muhammad, Santi Purwaningrum, Laura Sari
Format: Article
Language:English
Published: Pusat Penelitian dan Pengabdian Masyarakat (P3M), Politeknik Negeri Cilacap 2024-06-01
Series:Journal of Innovation Information Technology and Application
Subjects:
Online Access:https://ejournal.pnc.ac.id/index.php/jinita/article/view/2224
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Computer communication is done by first synchronizing one computer with another computer. This synchronization contains Data Packages which can be detrimental if done continuously, it will be categorized as an attack. This type of attack, when performed against a target by many computers, is called a distributed denial of service (DDoS) attack. Technology and the Internet are growing rapidly, so many DDoS attack applications result in these attacks still being a serious threat. This research aims to apply the Threshold method in detecting DDoS attacks. The Threshold method is used to process numeric attributes so obtained from the logfile in a computer network so that data packages can be classified into 2, namely normal access and attack access. Classification results using the Threshold method after going through the fitting process, namely detecting 8 IP Addresses as computer network users and 6 IP addresses as perpetrators of DDoS attacks with optimal accuracy.
ISSN:2716-0858
2715-9248