TCP FIN flood attack pattern recognition on Internet of Things with rule based signature analysis

7Citations
Citations of this article
28Readers
Mendeley users who have this article in their library.

Abstract

Focus of this research is Transmission Control Protocol (TCP) FIN flood attack pattern recognition in Internet of Things network using rule based signature analysis method. Dataset is created using three traffic scenarios: normal, attack and normal-attack. The process of identification and recognition of TCP FIN flood attack pattern is done by observing and analyzing packet's attributes from raw data (pcap format) through a feature extraction and feature selection processes. Further experiments were conducted using Snort as intrusion detection system (IDS). The evaluation results of the rate of confusion matrix detection against the Snort as IDS show the average percentage of the precision level.

Cite

CITATION STYLE

APA

Stiawan, D., Wahyudi, D., Heryanto, A., Samsuryadi, Idris, M. Y., Muchtar, F., … Budiarto, R. (2019). TCP FIN flood attack pattern recognition on Internet of Things with rule based signature analysis. International Journal of Online and Biomedical Engineering, 15(7), 124–139. https://doi.org/10.3991/ijoe.v15i07.9848

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free