Visible to the public IDS Performance Analysis using Anomaly-based Detection Method for DOS Attack

TitleIDS Performance Analysis using Anomaly-based Detection Method for DOS Attack
Publication TypeConference Paper
Year of Publication2021
AuthorsFadhlillah, Aghnia, Karna, Nyoman, Irawan, Arif
Conference Name2020 IEEE International Conference on Internet of Things and Intelligence System (IoTaIS)
KeywordsAnomaly-based, composability, Conferences, cybersecurity, denial of service, IDS, Internet of Things, Intrusion detection, intrusion detection system, Performance analysis, pubcrawl, Resiliency, Testing, Tools, Web servers
AbstractIntrusion Detection System (IDS) is a system that could detect suspicious activity in a network. Two approaches are known for IDS, namely signature-based and anomaly-based. The anomaly-based detection method was chosen to detect suspicious and abnormal activity for the system that cannot be performed by the signature-based method. In this study, attack testing was carried out using three DoS tools, namely the LOIC, Torshammer, and Xerxes tools, with a test scenario using IDS and without IDS. From the test results that have been carried out, IDS has successfully detected the attacks that were sent, for the delivery of the most consecutive attack packages, namely Torshammer, Xerxes, and LOIC. In the detection of Torshammer attack tools on the target FTP Server, 9421 packages were obtained, for Xerxes tools as many as 10618 packages and LOIC tools as many as 6115 packages. Meanwhile, attacks on the target Web Server for Torshammer tools were 299 packages, for Xerxes tools as many as 530 packages, and for LOIC tools as many as 103 packages. The accuracy of the IDS performance results is 88.66%, the precision is 88.58% and the false positive rate is 63.17%.
DOI10.1109/IoTaIS50849.2021.9359719
Citation Keyfadhlillah_ids_2021