التفاصيل البيبلوغرافية
العنوان: |
Ping Flood Attack Pattern Recognition on Internet of Things Network Dataset |
المؤلفون: |
Stiawan, Deris, Heryanto, Ahmad, Suryani, Meilinda Eka, Septian, Tri Wanda, Andika, Riki, Wahyudi, Dimas, Wahyudi, Johan |
بيانات النشر: |
Zenodo |
سنة النشر: |
2018 |
المجموعة: |
Zenodo |
مصطلحات موضوعية: |
Internet of Things, IoT, Ping Flood Attack, Ping Flood Attack on IoT |
الوصف: |
Ping Flood Attack Pattern Recognition using K-Means Algorithm in Internet of Things (IoT) Network status: on repository Abstract — This work investigates ping flood attack pattern recognition on Internet of Things (IoT) network. Experiments are conducted on WiFi communication with three different scenarios: normal traffic, attack traffic, and normal-attack combination traffic to create normal dataset, attack dataset, and normal attack (combined) dataset. The datasets are grouped into two clusters i.e.: (i) normal cluster and (ii) attack cluster. Clustering results using implemented K-Means algorithm show the average number of packets on the cluster of attack in total is 95,931 packets, and the average packets on normal cluster in total is 4,068 packets. Accuracy level of the clustering results then is calculated using confusion matrix equation. Based on the confusion matrix calculation, accuracy of clustering using implemented K-Means algorithm was 99.94%. The true negative rate reaches up to 98.62%, true positive rate is 100%, the false negative rate is 0%, and the false positive rate reaches 1.38%. |
نوع الوثيقة: |
other/unknown material |
اللغة: |
English |
Relation: |
https://doi.org/10.5281/zenodo.4436207; https://doi.org/10.5281/zenodo.4436208; oai:zenodo.org:4436208 |
DOI: |
10.5281/zenodo.4436208 |
الاتاحة: |
https://doi.org/10.5281/zenodo.4436208 |
Rights: |
info:eu-repo/semantics/restrictedAccess |
رقم الانضمام: |
edsbas.70FE1F40 |
قاعدة البيانات: |
BASE |