IDS Performance Analysis using Anomaly-based Detection Method for DOS Attack

被引:4
作者
Fadhlillah, Aghnia [1 ]
Karna, Nyoman [1 ]
Irawan, Arif [1 ]
机构
[1] Telkom Univ, Sch Elect Engn, Bandung, Indonesia
来源
2020 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND INTELLIGENCE SYSTEM (IOTAIS) | 2021年
关键词
Intrusion Detection System; Anomaly-based; Cybersecurity; Denial of Service;
D O I
10.1109/IoTaIS50849.2021.9359719
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion Detection System (IDS) is a system that could detect suspicious activity in a network. Two approaches are known for IDS, namely signature-based and anomaly-based. The anomaly-based detection method was chosen to detect suspicious and abnormal activity for the system that cannot be performed by the signature-based method. In this study, attack testing was carried out using three DoS tools, namely the LOIC, Torshammer, and Xerxes tools, with a test scenario using IDS and without IDS. From the test results that have been carried out, IDS has successfully detected the attacks that were sent, for the delivery of the most consecutive attack packages, namely Torshammer, Xerxes, and LOIC. In the detection of Torshammer attack tools on the target FTP Server, 9421 packages were obtained, for Xerxes tools as many as 10618 packages and LOIC tools as many as 6115 packages. Meanwhile, attacks on the target Web Server for Torshammer tools were 299 packages, for Xerxes tools as many as 530 packages, and for LOIC tools as many as 103 packages. The accuracy of the IDS performance results is 88.66%, the precision is 88.58% and the false positive rate is 63.17%.
引用
收藏
页码:18 / 22
页数:5
相关论文
共 11 条
[1]  
[Anonymous], 2016, 2016 3 INT C ADV COM, DOI DOI 10.1109/ICACCS.2016.7586351
[2]  
Gaddam R, 2017, PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), P10, DOI 10.1109/ICICCT.2017.7975177
[3]  
Gulshan K, 2014, Int J Comput Sci Mobile Appl, V2, P11
[4]  
Media S, 2019, TORSH
[5]  
Potteti Sumalatha, 2017, 2017 International Conference on Trends in Electronics and Informatics (ICEI). Proceedings, P613, DOI 10.1109/ICOEI.2017.8300775
[6]  
Putra R., 2018, EPROCEEDINGS ENG
[7]  
sepehrdaddev, 2018, XERX
[8]  
Silalahi D., 2017, 2017 INT C DATA SOFT, P1
[9]  
Sleshdot Media, 2019, LOIC
[10]  
Thomas T, 2005, NETWORK SECURITY 1 S, V1st