Text
DETEKSI SERANGAN UDP FLOOD MENGGUNAKAN METODE RATE-BASED THRESHOLDING PADA JARINGAN LLN
The advancement of the Internet of Things (IoT) presents new challenges in network security, especially in Low-Power and Lossy Networks (LLN) which are vulnerable to Denial-of-Service (DoS) attacks, such as UDP flood attacks. This attack disrupts network performance by flooding the target with a large number of UDP packets. This study uses the rate-based thresholding method to detect UDP flood attacks. This method works by monitoring the number of packets received in a certain time interval, comparing it to a threshold, and providing an alert if the threshold is exceeded. Simulations were conducted using Contiki Cooja in three experimental scenarios with different topologies, involving 9 to 25 nodes. The results showed that this method achieved an average attack detection accuracy of 95%. In the power consumption test, the threshold method resulted in a small increase in power consumption, which was only 1%-3% compared to the condition without detection, depending on the number of nodes used.
Inventory Code | Barcode | Call Number | Location | Status |
---|---|---|---|---|
2507000178 | T163192 | T1631922024 | Central Library (REFERENCE) | Available but not for loan - Not for Loan |
No other version available