Simulasi Aplikasi untuk Mendeteksi dan Mencegah Serangan DDoS pada Jaringan Berbasis Software Defined Network

Sugiyanto Goutama(1*), Agustinus Noertjahyana(2), Henry Novianus Palit(3),


(1) Program Studi Teknik Informatika, Universitas Kristen Petra Surabaya
(2) Program Studi Teknik Informatika, Universitas Kristen Petra Surabaya
(3) Program Studi Teknik Informatika, Universitas Kristen Petra Surabaya
(*) Corresponding Author

Abstract


Software Defined Network (SDN) is one of the technological developments in computer networks. Today's computer networks generally use many network devices, where each network device has 2 functionalities, called control plane and forwarding plane. The separation of the two functions through SDN technology has the advantage of having a centralized control plane design is to make configuration and management easier. However, there is also a challenge in the form of a single point of failure that is vulnerable to Distributed Denial of Service (DDoS) attacks. Therefore, SDN requires an Intrusion Detection System (IDS) and an Intrusion Prevention System (IPS) to be able to detect and prevent DDoS attacks. This study aims to determine the level of accuracy and length of time to detect (Mean Time To Detect), as well as length of time to mitigate (Mean Time To Respond) in dealing with variations of DDoS attacks on SDN topology. This study detects in two ways, first using a signature and anomaly which will adopt the Deep Neural Network model to classify, recognize the types and patterns of DDoS attacks from a dataset with several features. The results of simulation testing with 3 types of attacks, namely ICMP Flood, SYN Flood and UDP Flood on SDN, detection with signature-IDS get MTTD and MTTR results of 7.2475 seconds and 11.74 seconds for ICMP attacks, 26.995 seconds and 11.00 seconds for SYN attacks, 20.49 seconds and 3.00 seconds on a UDP attack. While the anomaly-IDS detection does not use calculations based on MTTD and MTTR because the workings of the system can only classify per packet. So it is calculated based on the level of misclassification of the attack packet (False Negative), namely 7 packets out of 445 packets for ICMP attacks, 557 packets out of 940 packets for SYN attacks, and 2 packets out of 3120 packets for UDP attacks. Therefore, for Anomaly-IDS using the Deep Neural Network model, is still yet optimal and needs to be researched and developed further.


Keywords


Software Defined Network (SDN); IDS; IPS; DDoS; Mean Time To Detect; Mean Time To Respond

Full Text:

PDF

References


Brownlee, J. 2021. How to Choose an Activation Function for Deep Learning. URI= https://machinelearningmastery.com/choose-an-activation-function-for-deep-learning/

Brownlee, J. 2021. Tour of Evaluation Metrics for Imbalanced Classification. URI= https://machinelearningmastery.com/tour-of-evaluation-metrics-for-imbalanced-classification/

Choudhary, S., & Keswani, N. 2020. Analysis of KDD-Cup’99, NSL-KDD and UNSW-NB15 Datasets using Deep Learning in IoT. 167, 1561-1573. DOI=https://doi.org/10.1016/j.procs.2020.03.367

Craven, C. 2020. What Is Software Defined Networking (SDN)? Definition. URI= https://www.sdxcentral.com/networking/sdn/definitions/what-the-definition-of-software-defined-networking-sdn/

EL-Garoui, L., Pierre, S., & Chamberland, S. 2020. A New SDN-Based Routing Protocol for Improving Delay in Smart City Environments. 3(3) 1004-1021. DOI=https://doi.org/10.3390/smartcities3030050

Gupta, A., & Sharma, L. S. 2019. Mitigation of DoS and Port Scan Attacks Using Snort. 7(4), 248-258. DOI=https://doi.org/10.26438/ijcse/v7i4.248258

ITExamAnswers Team. 2020. CyberOps Associate: Module 2 – Fighters in the War Against Cybercrime. URI=https://itexamanswers.net/cyberops-associate-module-2-fighters-in-the-war-against-cybercrime.html

Paquet, C. 2009. Network Security Using Cisco IOS IPS. In Implementing Cisco IOS Network Security (IINS): (CCNA Security exam 640-553) (Authorized Self-Study Guide). Cisco Press. URI= https://www.ciscopress.com/articles/article.asp?p=1336425

Rao, U. H., & Nayak, U. 2014. Intrusion Detection and Prevention Systems. In The InfoSec Handbook (pp. 225-243). Apress, Berkeley, CA. DOI=https://doi.org/10.1007/978-1-4302-6383-8_11

Reddy, T. N., & Kumarappan, A. P. 2018. Intrusion Detection on Software Defined Networking. 7, 330-332. DOI=http://dx.doi.org/10.14419/ijet.v7i3.12.16052

Saporito, G. 2019. A Deeper Dive into the NSL-KDD Data Set. URI=https://towardsdatascience.com/a-deeper-dive-into-the-nsl-kdd-data-set-15c753364657

Weisman, S. 2020. What is a distributed denial of service attack (DDoS) and what can you do about them? URI=https://us.norton.com/internetsecurity-emerging-threats-what-is-a-ddos-attack-30sectech-by-norton.html

Western Governors University. 2020. Neural networks and deep learning explained. URI= https://www.wgu.edu/blog/neural-networks-deep-learning-explained2003.html


Refbacks

  • There are currently no refbacks.


Jurnal telah terindeks oleh :