PENGEMBANGAN MODEL DECISION TREE UNTUK SERANGAN DISTRIBUTED DENIAL OF SERVICE

Authors

  • Agus Tedyyana Politeknik Negeri Bengkalis
  • Afis Julianto Politeknik Negeri Bengkalis
  • Dedi Hermawan Politeknik Negeri Bengkalis
  • M Afridon Politeknik Negeri Bengkalis
  • Faisal Riza Politeknik Negeri Bengkalis

Keywords:

Cyber security, DDoS, Decision Tree, Machine Learning, Intrusion Detection

Abstract

In the growing digital age, distributed denial of service (DDoS) attacks have become one of the most pressing and destructive cyber security threats. To address this, the research developed and implemented the Decision Tree model to detect DDoS attacks effectively. An intrusion detection system integrates the model, utilizing machine learning technology to analyze TCP data flows in real-time, with the aim of enhancing network detection capabilities and bolstering security measures against DDoS attacks. We built the Decision Tree model using the NF-UQ-NIDS dataset, which includes network traffic data representative of both DDoS attacks and normal traffic. Early data analysis using Wireshark provides additional insight into attack patterns, which helps with model calibration and validation. The developed system effectively identified attacks and sent real-time notifications via Telegram, facilitating prompt action from the security team. The results of this study show that the integration of machine learning into network security systems offers a significant improvement in the speed and accuracy of attack detection, showing enormous potential for further applications in a dynamic and diverse environment. Recommendations for further research include developing hybrid algorithms, implementing automated responses, and expanding notification platforms to strengthen the cyber security architecture against DDoS attacks and similar threats.

References

-, B. M., -, S. A., -, A. S., & -, R. K. (2023). Exploring Wireshark For Network Traffic Analysis. International Journal For Multidisciplinary Research, 5(6). https://doi.org/10.36948/ijfmr.2023.v05i06.8876

Black, S., & Kim, Y. (2022). An Overview on Detection and Prevention of Application Layer DDoS Attacks. 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), 0791–0800. https://doi.org/10.1109/CCWC54503.2022.9720741

Budiman, imam. (2022). National Cyber Defense Of The Indonesian Government In Protecting The Society. Jurnal Mandala Jurnal Ilmu Hubungan Internasional, 231–243. https://doi.org/10.33822/mjihi.v5i2.4894

Hernández, V. A. S., Monroy, R., Medina-Pérez, M. A., Loyola-González, O., & Herrera, F. (2022). A Practical Tutorial for Decision Tree Induction. ACM Computing Surveys, 54(1), 1–38. https://doi.org/10.1145/3429739

Kowal, D. R. (2022). Fast, Optimal, and Targeted Predictions Using Parameterized Decision Analysis. Journal of the American Statistical Association, 117(540), 1875–1886. https://doi.org/10.1080/01621459.2021.1891926

Ma, Y., Sung, K.-W., & Ahn, H.-J. (2023). N- and F-Co-Doped Carbon Quantum Dots Coated on a Ni Foam Substrate as Current Collector for Highly Stable Li-Air Batteries. International Journal of Energy Research, 2023, 1–11. https://doi.org/10.1155/2023/5310171

P, V., V, P., & K, U. (2021). IMPACTS OF CYBER CRIME ON INTERNET BANKING. International Journal of Engineering Technology and Management Sciences, 5(2). https://doi.org/10.46647/ijetms.2021.v05i02.005

Rao, G. S., & Subbarao, P. K. (2023). A Novel Approach for Detection of DoS / DDoS Attack in Network Environment using Ensemble Machine Learning Model. International Journal on Recent and Innovation Trends in Computing and Communication, 11(9), 244–253. https://doi.org/10.17762/ijritcc.v11i9.8340

Tedyyana, A., Ghazali, O., & Purbo, O. W. (2024). Machine learning for network defense: automated DDoS detection with telegram notification integration. Indonesian Journal of Electrical Engineering and Computer Science, 34(2), 1102. https://doi.org/10.11591/ijeecs.v34.i2.pp1102-1109

Tsobdjou, L. D., Pierre, S., & Quintero, A. (2022). An Online Entropy-Based DDoS Flooding Attack Detection System With Dynamic Threshold. IEEE Transactions on Network and Service Management, 19(2), 1679–1689. https://doi.org/10.1109/TNSM.2022.3142254

Yacouby, R., & Axman, D. (2020). Probabilistic Extension of Precision, Recall, and F1 Score for More Thorough Evaluation of Classification Models. Proceedings of the First Workshop on Evaluation and Comparison of NLP Systems, 79–91. https://doi.org/10.18653/v1/2020.eval4nlp-1.9

Zhang, C., Soda, P., Bi, J., Fan, G., Almpanidis, G., García, S., & Ding, W. (2022). An empirical study on the joint impact of feature selection and data resampling on imbalance classification. Applied Intelligence. https://doi.org/10.1007/s10489-022-03772-1

Downloads

Published

2024-10-15

How to Cite

Agus Tedyyana, Afis Julianto, Dedi Hermawan, M Afridon, & Faisal Riza. (2024). PENGEMBANGAN MODEL DECISION TREE UNTUK SERANGAN DISTRIBUTED DENIAL OF SERVICE. Prosiding Seminar Nasional Terapan Riset Inovatif (SENTRINOV), 10(1), 49 - 56. Retrieved from http://proceeding.isas.or.id/index.php/sentrinov/article/view/1570