PENDETEKSI BOTNET MALWARE DDOS UNTUK MENCEGAH SERANGAN DISTRIBUTED DENIAL OF SERVICES

Slamet Slamet

Abstract


Jaringan komputer berskala besar membutuhkan model deteksi dan respons yang efektif terhadap serangan DDoS. Berdasarkan kemajuan infrastruktur jaringan seperti server, switch, router atau peralatan jaringan lainnya, trafik serangan DDoS yang berasal dari sistem yang terinfeksi malware mampu melumpuhkan jaringan internal organisasi dan telah menjadi ancaman yang signifikan. Penelitian ini menghitung dan mencocokkan sejumlah atribut paket di dalam jaringan internal dan menganalisis atribut anomali sebagai pendeteksi serangan botnet Malware DDoS. Akurasi deteksi dan kinerja trafik yang dikumpulkan secara real time pada jaringan utama dianalisis menggunakan algoritma pendeteksi Botnet Malware DDoS. Hasilnya, serangan DDoS pada jaringan internal terdeteksi secara real time dengan banyaknya botnet DDoS yang tidak terkonfirmasi. Dengan mendeteksi host yang terinfeksi malware secara real-time, rencana tindak lanjut dapat dilakukan sebelum penghentian intrusi pada jaringan internal yang disebabkan oleh lalu lintas serangan DDoS berskala besar

Keywords


Serangan DDoS, Deteksi, Botnet Malware

Full Text:

PDF hlm 358 - 365

References


Farhatun Nisaul Ahadiyah, “Perkembangan Teknologi Infomasi Terhadap Peningkatan Bisnis Online,” INTERDISIPLIN: Journal of Qualitative and Quantitative Research, vol. 1, no. 1, pp. 41–49, 2023, doi: 10.61166/interdisiplin.v1i1.5.

J. F. Lempas and S. Soenarto, “Analysis of learning multimedia development needs for network infrastructure architecture,” IOP Conference Series: Materials Science and Engineering, vol. 1098, no. 5, p. 052090, 2021, doi: 10.1088/1757-899x/1098/5/052090.

A. Chernikova et al., “Cyber Network Resilience Against Self-Propagating Malware Attacks,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 13554 LNCS, no. 2019, pp. 531–550, 2022, doi: 10.1007/978-3-031-17140-6_26.

O. Joy Sonia, U. Kingsley, and J. Sonia, “Analysis of Linux Kernel Iptables for Mitigating DDOS Attacks; A Component-Based Approach,” International Journal of Computer Science and Mathematical Theory, vol. 9, no. September, pp. 10–21, 2023, doi: 10.56201/ijcsmt.v9.no4.2023.pg12.22.

R. Sommese et al., “Investigating the impact of DDoS attacks on DNS infrastructure,” Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC, pp. 51–64, 2022, doi: 10.1145/3517745.3561458.

F. J. Ennemoser, P. Sattler, and J. Zirngibl, “State of the Art of DDoS Mitigation Techniques,” 2022, doi: 10.2313/NET-2022-07-1.

A. Bansal, D. Kapil, Anupriya, S. Agarwal, and V. Kumar Gupta, “Analysis and Detection of various DDoS attacks on Internet of Things Network,” International Journal of Wireless and Microwave Technologies, vol. 12, no. 3, pp. 18–32, 2022, doi: 10.5815/ijwmt.2022.03.02.

B. Tushir, Y. Dalal, B. Dezfouli, and Y. Liu, “A Quantitative Study of DDoS and E-DDoS Attacks on WiFi Smart Home Devices,” IEEE Internet of Things Journal, vol. 8, no. 8, pp. 6282–6292, 2021, doi: 10.1109/JIOT.2020.3026023.

T. A. Tuan, H. V. Long, L. H. Son, R. Kumar, I. Priyadarshini, and N. T. K. Son, “Performance evaluation of Botnet DDoS attack detection using machine learning,” Evolutionary Intelligence, vol. 13, no. 2, pp. 283–294, 2020, doi: 10.1007/s12065-019-00310-w.

K. B. Adedeji, A. M. Abu-Mahfouz, and A. M. Kurien, “DDoS Attack and Detection Methods in Internet-Enabled Networks: Concept, Research Perspectives, and Challenges,” Journal of Sensor and Actuator Networks, vol. 12, no. 4, 2023, doi: 10.3390/jsan12040051.

A. Singh and B. B. Gupta, “Distributed Denial-of-Service (DDoS) Attacks and Defense Mechanisms in Various Web- Enabled Computing Platforms: Issues, Challenges, and Future Research Directions,” International Journal on Semantic Web and Information Systems, vol. 18, no. 1, pp. 1–43, 2022, doi: 10.4018/IJSWIS.297143.

L. F. Eliyan and R. Di Pietro, “DoS and DDoS attacks in Software Defined Networks: A survey of existing solutions and research challenges,” Future Generation Computer Systems, vol. 122, pp. 149–171, 2021, doi: 10.1016/j.future.2021.03.011.

S. Slamet, “Network Behavior Analysis (NBA) Untuk Mendeteksi Trafik Serangan Dalam Jaringan Komputer,” SPIRIT, vol. 15, no. 2, pp. 131–142, 2023, [Online]. Available: http://jurnal.stmik-yadika.ac.id/index.php/spirit/article/view/322/301.

S. Sadrhaghighi, M. Dolati, M. Ghaderi, and A. Khonsari, “SoftTap: A Software-Defined TAP via Switch-Based Traffic Mirroring,” Proceedings of the 2021 IEEE Conference on Network Softwarization: Accelerating Network Softwarization in the Cognitive Age, NetSoft 2021, pp. 303–311, 2021, doi: 10.1109/NetSoft51509.2021.9492588.

S. Slamet, “Taksonomi Pertahanan Cyber Security Menggunakan Model Cyber Kill Chain,” Spirit, vol. 16, no. 1, pp. 232–245, 2024, doi: 10.53567/spirit.v16i1.332.

S. Bessid et al., “Smart Ports Design Features Analysis : A Systematic Literature Review To cite this version : HAL Id : hal-03177580 Smart Ports Design Features Analysis : A Systematic Literature Review,” 2021.

A. V. Kachavimath, S. V. Nazare, and S. S. Akki, “Distributed Denial of Service Attack Detection using Naïve Bayes and K-Nearest Neighbor for Network Forensics,” 2nd International Conference on Innovative Mechanisms for Industry Applications, ICIMIA 2020 - Conference Proceedings, no. May, pp. 711–717, 2020, doi: 10.1109/ICIMIA48430.2020.9074929




DOI: http://dx.doi.org/10.53567/spirit.v16i2.361

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 Slamet Slamet

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.


 

Diindeks Oleh:



SPIRIT : Sarana Penunjang Informasi Terkini

Diterbitkan oleh Teknologi Informasi Institut Teknologi dan Bisnis Yadika Pasuruan
Alamat Redaksi: Jl. Bader No.9, Kwangsan, Kalirejo, Kec. Bangil, Pasuruan, Jawa Timur 67153
Telp/Fax: (0343) 742070 , Email : lppm@stmik-yadika.ac.id
Google Maps :  Klik Disini


 Creative Commons License
Karya ini dilisensikan di bawah  Lisensi Internasional Creative Commons Atribusi 4.0 .