|
|
|
|
LEADER |
01508 am a22002173u 4500 |
001 |
88122 |
042 |
|
|
|a dc
|
100 |
1 |
0 |
|a Stiawan, Deris
|e author
|
700 |
1 |
0 |
|a Wahyudi, Dimas
|e author
|
700 |
1 |
0 |
|a Heryanto, Ahmad
|e author
|
700 |
1 |
0 |
|a Samsuryadi, Samsuryadi
|e author
|
700 |
1 |
0 |
|a Idris, Mohd. Yazid
|e author
|
700 |
1 |
0 |
|a Muchtar, Farkhana
|e author
|
700 |
1 |
0 |
|a Alzahrani, Mohammed Abdullah
|e author
|
700 |
1 |
0 |
|a Budiarto, Rahmat
|e author
|
245 |
0 |
0 |
|a TCP FIN flood attack pattern recognition on internet of things with rule based signature analysis
|
260 |
|
|
|b Kassel University Press GmbH,
|c 2019-04.
|
856 |
|
|
|z Get fulltext
|u http://eprints.utm.my/id/eprint/88122/1/MohdYazidIdris2019_TCPFINFloodAttackPatternRecognition.pdf
|
520 |
|
|
|a Focus of this research is Transmission Control Protocol (TCP) FIN flood attack pattern recognition in Internet of Things network using rule based signature analysis method. Dataset is created using three traffic scenarios: normal, attack and normal-attack. The process of identification and recognition of TCP FIN flood attack pattern is done by observing and analyzing packet's attributes from raw data (pcap format) through a feature extraction and feature selection processes. Further experiments were conducted using Snort as intrusion detection system (IDS). The evaluation results of the rate of confusion matrix detection against the Snort as IDS show the average percentage of the precision level.
|
546 |
|
|
|a en
|
650 |
0 |
4 |
|a QA75 Electronic computers. Computer science
|