Simulasi Aplikasi untuk Mendeteksi dan Mencegah Serangan DDoS pada Jaringan Berbasis Software Defined Network
(1) Program Studi Teknik Informatika, Universitas Kristen Petra Surabaya
(2) Program Studi Teknik Informatika, Universitas Kristen Petra Surabaya
(3) Program Studi Teknik Informatika, Universitas Kristen Petra Surabaya
(*) Corresponding Author
Abstract
Software Defined Network (SDN) is one of the technological developments in computer networks. Today's computer networks generally use many network devices, where each network device has 2 functionalities, called control plane and forwarding plane. The separation of the two functions through SDN technology has the advantage of having a centralized control plane design is to make configuration and management easier. However, there is also a challenge in the form of a single point of failure that is vulnerable to Distributed Denial of Service (DDoS) attacks. Therefore, SDN requires an Intrusion Detection System (IDS) and an Intrusion Prevention System (IPS) to be able to detect and prevent DDoS attacks. This study aims to determine the level of accuracy and length of time to detect (Mean Time To Detect), as well as length of time to mitigate (Mean Time To Respond) in dealing with variations of DDoS attacks on SDN topology. This study detects in two ways, first using a signature and anomaly which will adopt the Deep Neural Network model to classify, recognize the types and patterns of DDoS attacks from a dataset with several features. The results of simulation testing with 3 types of attacks, namely ICMP Flood, SYN Flood and UDP Flood on SDN, detection with signature-IDS get MTTD and MTTR results of 7.2475 seconds and 11.74 seconds for ICMP attacks, 26.995 seconds and 11.00 seconds for SYN attacks, 20.49 seconds and 3.00 seconds on a UDP attack. While the anomaly-IDS detection does not use calculations based on MTTD and MTTR because the workings of the system can only classify per packet. So it is calculated based on the level of misclassification of the attack packet (False Negative), namely 7 packets out of 445 packets for ICMP attacks, 557 packets out of 940 packets for SYN attacks, and 2 packets out of 3120 packets for UDP attacks. Therefore, for Anomaly-IDS using the Deep Neural Network model, is still yet optimal and needs to be researched and developed further.
Keywords
Full Text:
PDFReferences
Brownlee, J. 2021. How to Choose an Activation Function for Deep Learning. URI= https://machinelearningmastery.com/choose-an-activation-function-for-deep-learning/
Brownlee, J. 2021. Tour of Evaluation Metrics for Imbalanced Classification. URI= https://machinelearningmastery.com/tour-of-evaluation-metrics-for-imbalanced-classification/
Choudhary, S., & Keswani, N. 2020. Analysis of KDD-Cup’99, NSL-KDD and UNSW-NB15 Datasets using Deep Learning in IoT. 167, 1561-1573. DOI=https://doi.org/10.1016/j.procs.2020.03.367
Craven, C. 2020. What Is Software Defined Networking (SDN)? Definition. URI= https://www.sdxcentral.com/networking/sdn/definitions/what-the-definition-of-software-defined-networking-sdn/
EL-Garoui, L., Pierre, S., & Chamberland, S. 2020. A New SDN-Based Routing Protocol for Improving Delay in Smart City Environments. 3(3) 1004-1021. DOI=https://doi.org/10.3390/smartcities3030050
Gupta, A., & Sharma, L. S. 2019. Mitigation of DoS and Port Scan Attacks Using Snort. 7(4), 248-258. DOI=https://doi.org/10.26438/ijcse/v7i4.248258
ITExamAnswers Team. 2020. CyberOps Associate: Module 2 – Fighters in the War Against Cybercrime. URI=https://itexamanswers.net/cyberops-associate-module-2-fighters-in-the-war-against-cybercrime.html
Paquet, C. 2009. Network Security Using Cisco IOS IPS. In Implementing Cisco IOS Network Security (IINS): (CCNA Security exam 640-553) (Authorized Self-Study Guide). Cisco Press. URI= https://www.ciscopress.com/articles/article.asp?p=1336425
Rao, U. H., & Nayak, U. 2014. Intrusion Detection and Prevention Systems. In The InfoSec Handbook (pp. 225-243). Apress, Berkeley, CA. DOI=https://doi.org/10.1007/978-1-4302-6383-8_11
Reddy, T. N., & Kumarappan, A. P. 2018. Intrusion Detection on Software Defined Networking. 7, 330-332. DOI=http://dx.doi.org/10.14419/ijet.v7i3.12.16052
Saporito, G. 2019. A Deeper Dive into the NSL-KDD Data Set. URI=https://towardsdatascience.com/a-deeper-dive-into-the-nsl-kdd-data-set-15c753364657
Weisman, S. 2020. What is a distributed denial of service attack (DDoS) and what can you do about them? URI=https://us.norton.com/internetsecurity-emerging-threats-what-is-a-ddos-attack-30sectech-by-norton.html
Western Governors University. 2020. Neural networks and deep learning explained. URI= https://www.wgu.edu/blog/neural-networks-deep-learning-explained2003.html
Refbacks
- There are currently no refbacks.
Jurnal telah terindeks oleh :