Analysis of DDoS Attack Detection Using Neural Network Backpropagation Approach
Abstract
Keywords
Full Text:
PDFReferences
P. Potocnik, Neural Networks: MATLAB examples Neural. Neural Networks course (practical examples), 2012.
B. C, Panduan Penanganan Insiden Keamanan Jaringan. Indonesia: CSIRT-Badan Pengkajian dan Penerapan Teknologi, 2014.
S. N. Hutagalung, “MENGGUNAKAN APLIKASI MATLAB METODE SIMULINK Siti Nurhabibah Hutagalung Jurusan Teknik Informatika, STMIK Budi Darma,” J. Sci. Soc. Res., vol. 1, no. 1, pp. 30–35, 2018.
I. Parinduri, “MODEL DAN SIMULASI RANGKAIAN RLC MENGGUNAKAN APLIKASI MATLAB METODE SIMULINK,” J. Sci. Soc. Res., vol. 1, no. 1, pp. 42–47, 2018.
M. Chambali, A. W. Muhammad, and Harsono, “Klasifikasi Paket Jaringan Berbasis Analisis Statistik dan Neural Network,” J. Pengemb. IT, vol. 3, no. 1, pp. 67–70, 2018.
J. T. Syafiie Nur LuthfieInformatika and U. Gunadarma, “Implementasi Jaringan Saraf Tiruan Backpropagation Pada Aplikasi Pengenalan Wajah Dengan Jarak Yang Berbeda Menggunakan MATLAB 7.0,” Universitas Gunadarma, 2007.
P. Gasti, G. Tsudik, E. Uzun, and L. Zhang, “DoS and DDoS in named data networking,” Proc. - Int. Conf. Comput. Commun. Networks, ICCCN, 2013, doi: 10.1109/ICCCN.2013.6614127.
J. Chris, J. Sihombing, D. P. Kartikasari, and A. Bhawiyuga, “Implementasi Sistem Deteksi dan Mitigasi Serangan Distributed Denial of Service (DDoS) menggunakan SVM Classifier pada Arsitektur Software- Defined Network (SDN),” J. Pengemb. Teknol. Inf. dan Ilmu Komput., vol. 3, no. 10, pp. 9608–9613, 2019.
A. W. Muhammad, I. Riadi, and S. Sunardi, “Deteksi Serangan DDoS Menggunakan Neural Network dengan Fungsi Fixed Moving Average Window,” JISKA (Jurnal Inform. Sunan Kalijaga), vol. 1, no. 3, p. 115, 2017, doi: 10.14421/jiska.2017.13-03.
N. A. Tindriyani, “IMPLEMENTASI NEURAL NETWORK PADA MATLAB UNTUK PERAMALAN KONSUMSI BEBAN LISTRIK KABUPATEN PONOROGO JAWA TIMUR,” Universitas Negeri Semarang, 2017.
Y. Pan, Y. Wang, P. Zhou, Y. Yan, and D. Guo, “Activation functions selection for BP neural network model of ground surface roughness,” J. Intell. Manuf., vol. 31, no. 8, pp. 1825–1836, 2020, doi: 10.1007/s10845-020-01538-5.
F. Pramudhito, Y. Purwanto, and A. Novianty, “PERBANDINGAN METODE SAMPLING DAN DIMENSIONALITY REDUCTION UNTUK MEREDUKSI KOMPLEKSITAS ALGORITMA DETEKSI PADA DDOS,” in e-Proceeding of Engineering, 2017, vol. 4, no. 1, pp. 924–931.
A. Tjolleng, Pengantar pemrograman MATLAB: Panduan praktis belajar MATLAB. Jakarta: Elex Media Komputindo, 2017.
I. ADESTY, “PENERAPAN INTRUSION PREVENTION SYSTEM SEBAGAI PENGAMANAN DARI SERANGAN DDoS (DISTRIBUTED DENIAL OF SERVICE),” INSTITUT TEKNOLOGI TELKOM PURWOKERTO, 2019.
M. A. Kurniawan, “Penerapan Metode Feed Forward Neural Network (Ffnn) Backpropagation Untuk,” UNIVERSITAS NEGERI SEMARANG, 2017.
S. Dwiyatno, A. P. Sari, A. Irawan, and S. Safig, “PENDETEKSI SERANGAN DDoS (DISTRIBUTED DENIAL OF SERVICE) MENGGUNAKAN HONEYPOT DI PT. TORINI JAYA ABADI,” J. Sist. Inf. dan Inform., vol. 2, no. 2, pp. 64–80, 2019, doi: 10.47080/simika.v2i2.606.
M. S. Elsayed, N. A. Le-Khac, S. Dev, and A. D. Jurcut, “DDoSNet: A Deep-Learning Model for Detecting Network Attacks,” in Proceedings - 21st IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2020, 2020, pp. 391–396, doi: 10.1109/WoWMoM49955.2020.00072.
J. Li, Y. Liu, and L. Gu, “DDoS attack detection based on neural network,” 2010 2nd Int. Symp. Aware Comput., pp. 196–199, 2010, doi: 10.1109/ISAC.2010.5670479.
S. Karsoliya, “Approximating Number of Hidden layer neurons in Multiple Hidden Layer BPNN Architecture,” Int. J. Eng. Trends Technol., vol. 3, no. 6, pp. 714–717, 2012.
H. Effendi, “Aplikasi Logika Fuzzy untuk Peramalan Beban Listrik Jangka Pendek Menggunakan Matlab,” Sainstek, vol. 12, no. 1, pp. 52–58, 2009, [Online]. Available: http://ejournal.unp.ac.id/index.php/sainstek/article/view/149.
B. Mardiyanto, T. Indriyani, and I. M. Suartana, “Analisis Dan Implementasi Honeypot Dalam Mendeteksi Serangan Distributed Denial-Of-Services (DDOS) Pada Jaringan Wireless,” Integer J., vol. 1, no. 2, pp. 32–42, 2016.
A. W. Muhammad, “Analisis Statistik Log Jaringan Untuk Deteksi Serangan Ddos Berbasis Neural Network,” J. Ilm. Ilk., vol. 8, no. 3, pp. 220–225, 2016, doi: 10.33096/ilkom.v8i3.76.220-225.
DOI: https://doi.org/10.24114/cess.v7i1.27090
Article Metrics
Abstract view : 366 timesPDF - 409 times
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 4.0 International License.
CESS (Journal of Computer Engineering, System and Science)
CESS (Journal of Computer Engineering, System and Science) is licensed under a Creative Commons Attribution 4.0 International License