Muhammad Adam Hawari, Wahyu Adi Prabowo, Rifki Adhitama
{"title":"Fuzzy Tsukamoto-Based Detection of Ping of Death Attacks: Advancing Network Security with Precise Classification","authors":"Muhammad Adam Hawari, Wahyu Adi Prabowo, Rifki Adhitama","doi":"10.24014/ijaidm.v6i2.23858","DOIUrl":null,"url":null,"abstract":"Internet services have the potential to be targeted by hackers using various DDoS (Distributed Denial of Service) attack techniques, including the ping of death attack. This attack involves multiple machines launching simultaneous attacks on the database server and File Transfer Protocol (FTP), resulting in severe consequences for computer networks. To effectively classify such attacks, the Fuzzy Tsukamoto method is employed, which represents each IF-THEN rule as a Fuzzy set with a corresponding membership function. Fuzzy logic offers great flexibility, tolerance for imprecise data, and the ability to model highly complex and nonlinear functions. By implementing this classification technique, it becomes easier to differentiate and analyze network traffic captured by Wireshark, enabling the detection of ping of death attacks against the server with maximum accuracy through the Fuzzy Tsukamoto method in the classification process.","PeriodicalId":385582,"journal":{"name":"Indonesian Journal of Artificial Intelligence and Data Mining","volume":"29 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Indonesian Journal of Artificial Intelligence and Data Mining","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.24014/ijaidm.v6i2.23858","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Internet services have the potential to be targeted by hackers using various DDoS (Distributed Denial of Service) attack techniques, including the ping of death attack. This attack involves multiple machines launching simultaneous attacks on the database server and File Transfer Protocol (FTP), resulting in severe consequences for computer networks. To effectively classify such attacks, the Fuzzy Tsukamoto method is employed, which represents each IF-THEN rule as a Fuzzy set with a corresponding membership function. Fuzzy logic offers great flexibility, tolerance for imprecise data, and the ability to model highly complex and nonlinear functions. By implementing this classification technique, it becomes easier to differentiate and analyze network traffic captured by Wireshark, enabling the detection of ping of death attacks against the server with maximum accuracy through the Fuzzy Tsukamoto method in the classification process.