The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).
If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.
Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.
BibTex Citation Data :
@article{JOIV1262, author = {Alam Rahmatulloh and Galih Muhammad Ramadhan and Irfan Darmawan and Nur Widiyasono and Dita Pramesti}, title = {Identification of Mirai Botnet in IoT Environment through Denial-of-Service Attacks for Early Warning System}, journal = {JOIV : International Journal on Informatics Visualization}, volume = {6}, number = {3}, year = {2022}, keywords = {Classification; DDOS; Internet of Things; k-nearest neighbor; Mirai botnet.}, abstract = {The development of computing technology in increasing the accessibility and agility of daily activities currently uses the Internet of Things (IoT). Over time, the increasing number of IoT device users impacts access and delivery of valuable data. This is the primary goal of cybercriminals to operate malicious software. In addition to the positive impact of using technology, it is also a negative impact that creates new problems in security attacks and cybercrimes. One of the most dangerous cyberattacks in the IoT environment is the Mirai botnet malware. The malware turns the user's device into a botnet to carry out Distributed Denial of Service (DDoS) attacks on other devices, which is undoubtedly very dangerous. Therefore, this study proposes a k-nearest neighbor algorithm to classify Mirai malware-type DDOS attacks on IoT device environments. The malware classification process was carried out using rapid miner machine learning by conducting four experiments using SYN, ACK, UDP, and UDPlain attack types. The classification results from selecting five parameters with the highest activity when the device is attacked. In order for these five parameters to be a reference in the event of a malware attack starting in the IoT environment, the results of the classification have implications for further research. In the future, it can be used as a reference in making an early warning innovative system as an early warning in the event of a Mirai botnet attack.}, issn = {2549-9904}, pages = {623--628}, doi = {10.30630/joiv.6.3.1262}, url = {https://joiv.org/index.php/joiv/article/view/1262} }
Refworks Citation Data :
@article{{JOIV}{1262}, author = {Rahmatulloh, A., Muhammad Ramadhan, G., Darmawan, I., Widiyasono, N., Pramesti, D.}, title = {Identification of Mirai Botnet in IoT Environment through Denial-of-Service Attacks for Early Warning System}, journal = {JOIV : International Journal on Informatics Visualization}, volume = {6}, number = {3}, year = {2022}, doi = {10.30630/joiv.6.3.1262}, url = {} }Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
__________________________________________________________________________
JOIV : International Journal on Informatics Visualization
ISSN 2549-9610 (print) | 2549-9904 (online)
Organized by Department of Information Technology - Politeknik Negeri Padang, and Institute of Visual Informatics - UKM and Soft Computing and Data Mining Centre - UTHM
W : http://joiv.org
E : joiv@pnp.ac.id, hidra@pnp.ac.id, rahmat@pnp.ac.id
View JOIV Stats
is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.