Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : International Journal of Electrical and Computer Engineering

A new approach of scalable traffic capture model with Pi cluster Kristoko Dwi Hartomo; April Firman Daru; Hindriyanto Dwi Purnomo
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i2.pp2186-2196

Abstract

The development of the internet of things (IoT), which functions as servers, device monitors, and controllers of several peripherals inside the smart home, eased workload in many sectors. Most devices are accessible through the internet because they communicate with wired or wireless interfaces. However, this feature makes them prone to the risk of being exposed to the public. The exposed devices are an easy target for the third party to launch a flooding attack through the network. This attack overloads the system due to the low processing capability, thereby interrupting any running process and harming the device. Therefore, this study proposed a scalable network capturing model that utilized multiple Raspberry Pi boards in parallel to monitor the network traffics simultaneously. An isolated experiment was used for evaluation by running simultaneous flooding attacks on each device. The result showed that the model consumed 30.44% more memory with 14.66% lower central processing unit (CPU) usage and 3.63% faster execution time. This means that this model is better in terms of performance and effectiveness than the single capture model.
IPv6 flood attack detection based on epsilon greedy optimized Q learning in single board computer April Firman Daru; Kristoko Dwi Hartomo; Hindriyanto Dwi Purnomo
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i5.pp5782-5791

Abstract

Internet of things is a technology that allows communication between devices within a network. Since this technology depends on a network to communicate, the vulnerability of the exposed devices increased significantly. Furthermore, the use of internet protocol version 6 (IPv6) as the successor to internet protocol version 4 (IPv4) as a communication protocol constituted a significant problem for the network. Hence, this protocol was exploitable for flooding attacks in the IPv6 network. As a countermeasure against the flood, this study designed an IPv6 flood attack detection by using epsilon greedy optimized Q learning algorithm. According to the evaluation, the agent with epsilon 0.1 could reach 98% of accuracy and 11,550 rewards compared to the other agents. When compared to control models, the agent is also the most accurate compared to other algorithms followed by neural network (NN), K-nearest neighbors (KNN), decision tree (DT), naive Bayes (NB), and support vector machine (SVM). Besides that, the agent used more than 99% of a single central processing unit (CPU). Hence, the agent will not hinder internet of things (IoT) devices with multiple processors. Thus, we concluded that the proposed agent has high accuracy and feasibility in a single board computer (SBC).