Implementation of The Backpropagation Algorithm to Improve the Effectiveness of Artificial Neural Network Models in Classifying Flooding Attacks
Kata Kunci:
Artificial neural network, Backpropagation, Classification, Flooding, UDP flood, SYN flood, ICMP floodAbstrak
Flooding attacks such as UDP flood, SYN flood, and ICMP flood can disrupt network stability, requiring an effective early detection system. This study aims to build a classification model using artificial neural networks (ANN) with the backpropagation method to distinguish between normal traffic and flooding attacks. Data was collected through simulation in VirtualBox with Kali Linux as the attacker and Windows 10 as the target, and captured using Wireshark. The results of training and testing both libraries showed differences in performance between the two libraries. The PyTorch model produced a prediction accuracy of 94% for normal networks and SYN floods, and 100% for UDP floods and ICMP floods, with a total accuracy of 97%. In contrast, the TensorFlow model achieved an accuracy of 77% for normal networks, 80% for UDP floods, 95% for SYN floods, and 100% for ICMP floods, with a total accuracy of 88%. The comparison of the two models shows that a simple Multi Layer Perceptron neural network with the backpropagation method using the PyTorch library is quite effective in classifying flooding attacks.
Referensi
M. B. N. Fa'izi, "Bahaya Serangan SYN Flood dan Cara Mengatasinya," 06 November 2024. [Online]. Available: https://cyberhub.id/pengetahuan-dasar/bahaya-serangan-syn-flood.
V. M. B. K. S. Mohan, "Deep Neural Network Model for UDP SYN Flood Distributed DoS Attack Detection in SDN," in Biologically Inspired Techniques in Many Criteria Decision-Making, Cham, 2025.
A. S. G. B. S. Ahmad Fajri Khumara, "Analisa Pendeteksian Serangan DDoS Menggunakan Teori Pendekatan Neural Network Backpropagation," CESS (Journal of Computing Engineering, System and Science), 2022.
S. Anande, Neural Network Models for TCP - SYN Flood Denial of Service Attack Detection With Source and Destination Anonymization, Rochester: Rochester Institute of Technology, 2021.
J. C. ,. R. K. T. K. Pete Chapman, CRISP-DM 1.0: Step-by-Step Data Mining Guide, Chicago: SPSS Inc., 2000.
D. M. W. Powers, "Evaluation: From precision, recall and F-measure to ROC, informedness, markedness and correlation.," Journal of Machine Learning Technologies, p. 37, 2011.
R. W. Sebesta, Programming Language Concepts. Pearson Education, Boston, MA: Pearson Education, 2012.
I. Sommerville, Software Engineering, Boston, MA: Addison-Wesley, 2011.
P. P. K. C. M. L. O. P. A. A. P. L. Sumith Kulal, "SPoC: Search-based Pseudocode to Code," NeurIPS, 2019.
M. S. D. K. Ruiqi Zhong, "Semantic Scaffolds for Pseudocode-to-Code Generation," Association for Computational Linguistics, 2020.
Unduhan
Diterbitkan
Terbitan
Bagian
Lisensi
Hak Cipta (c) 2026 Journal of Technology and Computer

Artikel ini berlisensi Creative Commons Attribution 4.0 International License.











