PENDETEKSI BOTNET MALWARE DDOS UNTUK MENCEGAH SERANGAN DISTRIBUTED DENIAL OF SERVICES
Abstract
Keywords
Full Text:
PDF hlm 358 - 365References
Farhatun Nisaul Ahadiyah, “Perkembangan Teknologi Infomasi Terhadap Peningkatan Bisnis Online,” INTERDISIPLIN: Journal of Qualitative and Quantitative Research, vol. 1, no. 1, pp. 41–49, 2023, doi: 10.61166/interdisiplin.v1i1.5.
J. F. Lempas and S. Soenarto, “Analysis of learning multimedia development needs for network infrastructure architecture,” IOP Conference Series: Materials Science and Engineering, vol. 1098, no. 5, p. 052090, 2021, doi: 10.1088/1757-899x/1098/5/052090.
A. Chernikova et al., “Cyber Network Resilience Against Self-Propagating Malware Attacks,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 13554 LNCS, no. 2019, pp. 531–550, 2022, doi: 10.1007/978-3-031-17140-6_26.
O. Joy Sonia, U. Kingsley, and J. Sonia, “Analysis of Linux Kernel Iptables for Mitigating DDOS Attacks; A Component-Based Approach,” International Journal of Computer Science and Mathematical Theory, vol. 9, no. September, pp. 10–21, 2023, doi: 10.56201/ijcsmt.v9.no4.2023.pg12.22.
R. Sommese et al., “Investigating the impact of DDoS attacks on DNS infrastructure,” Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC, pp. 51–64, 2022, doi: 10.1145/3517745.3561458.
F. J. Ennemoser, P. Sattler, and J. Zirngibl, “State of the Art of DDoS Mitigation Techniques,” 2022, doi: 10.2313/NET-2022-07-1.
A. Bansal, D. Kapil, Anupriya, S. Agarwal, and V. Kumar Gupta, “Analysis and Detection of various DDoS attacks on Internet of Things Network,” International Journal of Wireless and Microwave Technologies, vol. 12, no. 3, pp. 18–32, 2022, doi: 10.5815/ijwmt.2022.03.02.
B. Tushir, Y. Dalal, B. Dezfouli, and Y. Liu, “A Quantitative Study of DDoS and E-DDoS Attacks on WiFi Smart Home Devices,” IEEE Internet of Things Journal, vol. 8, no. 8, pp. 6282–6292, 2021, doi: 10.1109/JIOT.2020.3026023.
T. A. Tuan, H. V. Long, L. H. Son, R. Kumar, I. Priyadarshini, and N. T. K. Son, “Performance evaluation of Botnet DDoS attack detection using machine learning,” Evolutionary Intelligence, vol. 13, no. 2, pp. 283–294, 2020, doi: 10.1007/s12065-019-00310-w.
K. B. Adedeji, A. M. Abu-Mahfouz, and A. M. Kurien, “DDoS Attack and Detection Methods in Internet-Enabled Networks: Concept, Research Perspectives, and Challenges,” Journal of Sensor and Actuator Networks, vol. 12, no. 4, 2023, doi: 10.3390/jsan12040051.
A. Singh and B. B. Gupta, “Distributed Denial-of-Service (DDoS) Attacks and Defense Mechanisms in Various Web- Enabled Computing Platforms: Issues, Challenges, and Future Research Directions,” International Journal on Semantic Web and Information Systems, vol. 18, no. 1, pp. 1–43, 2022, doi: 10.4018/IJSWIS.297143.
L. F. Eliyan and R. Di Pietro, “DoS and DDoS attacks in Software Defined Networks: A survey of existing solutions and research challenges,” Future Generation Computer Systems, vol. 122, pp. 149–171, 2021, doi: 10.1016/j.future.2021.03.011.
S. Slamet, “Network Behavior Analysis (NBA) Untuk Mendeteksi Trafik Serangan Dalam Jaringan Komputer,” SPIRIT, vol. 15, no. 2, pp. 131–142, 2023, [Online]. Available: http://jurnal.stmik-yadika.ac.id/index.php/spirit/article/view/322/301.
S. Sadrhaghighi, M. Dolati, M. Ghaderi, and A. Khonsari, “SoftTap: A Software-Defined TAP via Switch-Based Traffic Mirroring,” Proceedings of the 2021 IEEE Conference on Network Softwarization: Accelerating Network Softwarization in the Cognitive Age, NetSoft 2021, pp. 303–311, 2021, doi: 10.1109/NetSoft51509.2021.9492588.
S. Slamet, “Taksonomi Pertahanan Cyber Security Menggunakan Model Cyber Kill Chain,” Spirit, vol. 16, no. 1, pp. 232–245, 2024, doi: 10.53567/spirit.v16i1.332.
S. Bessid et al., “Smart Ports Design Features Analysis : A Systematic Literature Review To cite this version : HAL Id : hal-03177580 Smart Ports Design Features Analysis : A Systematic Literature Review,” 2021.
A. V. Kachavimath, S. V. Nazare, and S. S. Akki, “Distributed Denial of Service Attack Detection using Naïve Bayes and K-Nearest Neighbor for Network Forensics,” 2nd International Conference on Innovative Mechanisms for Industry Applications, ICIMIA 2020 - Conference Proceedings, no. May, pp. 711–717, 2020, doi: 10.1109/ICIMIA48430.2020.9074929
DOI: http://dx.doi.org/10.53567/spirit.v16i2.361
Refbacks
- There are currently no refbacks.
Copyright (c) 2024 Slamet Slamet
This work is licensed under a Creative Commons Attribution 4.0 International License.
Diindeks Oleh:
SPIRIT : Sarana Penunjang Informasi Terkini
Diterbitkan oleh Teknologi Informasi Institut Teknologi dan Bisnis Yadika Pasuruan
Alamat Redaksi: Jl. Bader No.9, Kwangsan, Kalirejo, Kec. Bangil, Pasuruan, Jawa Timur 67153
Telp/Fax: (0343) 742070 , Email : lppm@stmik-yadika.ac.id
Google Maps : Klik Disini
Karya ini dilisensikan di bawah Lisensi Internasional Creative Commons Atribusi 4.0 .