• Tidak ada hasil yang ditemukan

ICMP Flood

Dalam dokumen Pengeluaran Resourc dan Kesabaran (Halaman 66-74)

BAB III PERANCANGAN

4.2 Pengujian dan Analisa

4.2.1 ICMP Flood

Dalam analisa percobaan kali ini, kami melakukan serangan ICMP Flood dengan menggunakan TFGen dan mengirimkan paket sebesar 5120 kbps. Berikut tabel analisa dari parameter yang kami amati :

Kondisi Normal (sebelum terjadi serangan ICMP Flood) Berikut adalah tabel analisa dari hasil percobaan (10x) dengan mengamati parameter : packet-loss, rtt, dan cpu load.

Sebelum user terkena serangan ICMP Flood.

USER 1 IP : 192.168.1.2

Test ping ke 20.20.10.2 (Legitimate site) Packet-loss dan rtt

CP U load sent=20 received=20 packet-loss=0% min-rtt=7ms

avg-rtt=9ms max-rtt=15ms 15%

sent=40 received=40 packet-loss=0% min-rtt=7ms

avg-rtt=9ms max-rtt=14ms 17%

sent=60 received=60 packet-loss=0% min-rtt=7ms 13%

avg-rtt=8ms max-rtt=14ms

sent=80 received=80 packet-loss=0% min-rtt=7ms

avg-rtt=8ms max-rtt=14ms 13%

sent=100 received=100 packet-loss=0% min-

rtt=7ms avg-rtt=8ms max-rtt=15ms 12%

sent=120 received=120 packet-loss=0% min-

rtt=7ms avg-rtt=8ms max-rtt=13ms 11%

sent=140 received=140 packet-loss=0% min-

rtt=7ms avg-rtt=8ms max-rtt=15ms 14%

sent=160 received=160 packet-loss=0% min-

rtt=7ms avg-rtt=8ms max-rtt=12ms 11%

sent=180 received=180 packet-loss=0% min-

rtt=7ms avg-rtt=8ms max-rtt=15ms 14%

sent=200 received=200 packet-loss=0% min-

rtt=7ms avg-rtt=8ms max-rtt=15ms 13%

average : packet-loss=0% avg-rtt=8ms 13%

Tabel 4.1 Analisa data sebelum dilakukan serangan ICMP Flood (user1)

USER 2

IP : 192.168.2.2

Test ping ke 20.20.10.2 (Legitimate site) Packet-loss dan rtt

CP U load sent=20 received=20 packet-loss=0% min- rtt=7ms avg-rtt=8ms max-rtt=13ms 13%

sent=40 received=40 packet-loss=0% min- rtt=7ms avg-rtt=8ms max-rtt=13ms 13%

sent=60 received=60 packet-loss=0% min- rtt=7ms avg-rtt=8ms max-rtt=17ms 15%

sent=80 received=80 packet-loss=0% min- rtt=7ms avg-rtt=8ms max-rtt=17ms 17%

sent=100 received=100 packet-loss=0% min- rtt=7ms avg-rtt=8ms max-rtt=17ms 15%

sent=120 received=120 packet-loss=0% min- rtt=7ms avg-rtt=8ms max-rtt=17ms 16%

sent=140 received=140 packet-loss=0% min- rtt=7ms avg-rtt=8ms max-rtt=17ms 14%

sent=160 received=160 packet-loss=0% min- 14%

rtt=7ms avg-rtt=8ms max-rtt=17ms

sent=180 received=180 packet-loss=0% min- rtt=7ms avg-rtt=8ms max-rtt=15ms 12%

sent=200 received=200 packet-loss=0% min- rtt=7ms avg-rtt=8ms max-rtt=15ms 13%

average : packet-loss=0% avg-rtt=8ms 14

%

Tabel 4.2 Analisa data sebelum dilakukan seranganICMP Flood(user2)

USER 3

IP : 192.168.3.2

Test ping ke 20.20.10.2 (Legitimate site) Packet-loss dan rtt

CP U load sent=20 received=20 packet-loss=0% min- rtt=7ms avg-rtt=8ms max-rtt=12ms 11%

sent=40 received=40 packet-loss=0% min- rtt=7ms avg-rtt=8ms max-rtt=12ms 12%

sent=60 received=60 packet-loss=0% min- rtt=7ms avg-rtt=8ms max-rtt=18ms 18%

sent=80 received=80 packet-loss=0% min- rtt=7ms avg-rtt=8ms max-rtt=18ms 17%

sent=100 received=100 packet-loss=0% min- rtt=7ms avg-rtt=8ms max-rtt=18ms 17%

sent=120 received=120 packet-loss=0% min- rtt=7ms avg-rtt=8ms max-rtt=18ms 16%

sent=140 received=140 packet-loss=0% min- rtt=7ms avg-rtt=8ms max-rtt=17ms 13%

sent=160 received=160 packet-loss=0% min- rtt=7ms avg-rtt=8ms max-rtt=12ms 11%

sent=180 received=180 packet-loss=0% min- rtt=7ms avg-rtt=8ms max-rtt=15ms 12%

sent=200 received=200 packet-loss=0% min- rtt=7ms avg-rtt=8ms max-rtt=12ms 11%

average : packet-loss=0% avg-rtt=8ms 14%

Tabel 4.3 Analisa data sebelum dilakukan serangan (user 3)

Kondisi Saat Terjadi Serangan (ICMP Flood)

Berikut adalah tabel analisa dari hasil percobaan (10x) , dengan mengamati parameter : packet-loss, rtt, dan cpu load.

Dalam kondisi ini user 1 telah diberikan serangan ICMP Flood sebesar 5120 kbps.

USER 1

IP : 192.168.1.2 (victim) Test ping ke 20.20.10.2 (Legitimate site)

Packet-loss dan rtt

CP U load sent=20 received=19 packet-loss=5% min- rtt=12ms avg-rtt=29ms max-rtt=134ms 61%

sent=40 received=37 packet-loss=7% min- rtt=10ms avg-rtt=28ms max-rtt=134ms 45%

sent=60 received=56 packet-loss=6% min- rtt=9ms avg-rtt=26ms max-rtt=134ms 70%

sent=80 received=75 packet-loss=6% min- rtt=9ms avg-rtt=25ms max-rtt=134ms 65%

sent=100 received=95 packet-loss=5% min- rtt=9ms avg-rtt=24ms max-rtt=134ms 80%

sent=120 received=114 packet-loss=5% min- rtt=8ms avg-rtt=24ms max-rtt=134ms 60%

sent=140 received=133 packet-loss=5% min- rtt=8ms avg-rtt=25ms max-rtt=134ms 78%

sent=160 received=151 packet-loss=5% min- rtt=8ms avg-rtt=24ms max-rtt=134ms 59%

sent=180 received=167 packet-loss=7% min- rtt=8ms avg-rtt=24ms max-rtt=134ms 88%

sent=200 received=184 packet-loss=8% min- rtt=8ms avg-rtt=24ms max-rtt=134ms 64%

average : packet-loss=6% avg-rtt=25ms 67%

Tabel 4.4 Analisa Data Ketika Terjadi Serangan ICMP Flood (user1)

USER 2

IP : 192.168.2.2 Test ping ke 20.20.10.2 (Legitimate site)

Packet-loss dan rtt CPU load sent=20 received=20 packet-loss=0% min- rtt=10ms avg-rtt=40ms max-rtt=159ms 25%

sent=40 received=40 packet-loss=0% min- rtt=10ms avg-rtt=35ms max-rtt=159ms 43%

sent=60 received=58 packet-loss=3% min- rtt=10ms avg-rtt=31ms max-rtt=159ms 38%

sent=80 received=77 packet-loss=3% min- rtt=10ms avg-rtt=31ms max-rtt=159ms 29%

sent=100 received=96 packet-loss=4% min- rtt=9ms avg-rtt=29ms max-rtt=159ms 55%

sent=120 received=116 packet-loss=3% min- rtt=8ms avg-rtt=27ms max-rtt=159ms 54%

sent=140 received=136 packet-loss=2% min- rtt=8ms avg-rtt=25ms max-rtt=159ms 61%

sent=160 received=155 packet-loss=3% min- rtt=8ms avg-rtt=24ms max-rtt=159ms 52%

sent=180 received=174 packet-loss=3% min- rtt=8ms avg-rtt=24ms max-rtt=145ms 45%

sent=200 received=193 packet-loss=3% min- rtt=8ms avg-rtt=24ms max-rtt=145ms 39%

average : packet-loss=2% avg-rtt=29ms 44%

Tabel 4.5 Analisa Data Ketika Terjadi Serangan ICMP Flood (user2)

USER 3

IP : 192.168.3.2 Test ping ke 20.20.10.2 (Legitimate site)

Packet-loss dan rtt

CP U load sent=20 received=20 packet-loss=0% min- rtt=9ms avg-rtt=21ms max-rtt=63ms 25%

sent=40 received=40 packet-loss=0% min- rtt=9ms avg-rtt=24ms max-rtt=74ms 43%

sent=60 received=59 packet-loss=1% min- rtt=9ms avg-rtt=29ms max-rtt=280ms 38%

sent=80 received=79 packet-loss=1% min- rtt=9ms avg-rtt=28ms max-rtt=280ms 29%

sent=100 received=97 packet-loss=3% min- rtt=9ms avg-rtt=28ms max-rtt=280ms 55%

sent=120 received=115 packet-loss=4% min- rtt=8ms avg-rtt=28ms max-rtt=280ms 54%

sent=140 received=135 packet-loss=3% min- rtt=8ms avg-rtt=26ms max-rtt=280ms 61%

sent=160 received=155 packet-loss=3% min- rtt=7ms avg-rtt=26ms max-rtt=280ms 52%

sent=180 received=176 packet-loss=2% min- rtt=9ms avg-rtt=21ms max-rtt=63ms 25%

sent=200 received=184 packet-loss=8% min- rtt=8ms avg-rtt=24ms max-rtt=134ms 39%

average : packet-loss=2% avg-rtt=26ms 42%

Tabel 4.6 Analisa Data Ketika Terjadi Serangan ICMP Flood (user3)

Kondisi Saat RTBH Routing Diaktifkan

Berikut adalah tabel analisa dari hasil percobaan (10x) , dengan mengamati parameter : packet-loss, rtt, dan cpu load.

Dalam kondisi ini IP user 1 telah di blackhole.

USER 1

IP : 192.168.1.2 (victim) Test ping ke 20.20.10.2 (Legitimate site)

Packet-loss dan rtt

CP U load sent=20 received=0 packet-loss=100% 38%

sent=40 received=0 packet-loss=100% 23%

sent=60 received=0 packet-loss=100% 42%

sent=80 received=0 packet-loss=100% 60%

sent=100 received=0 packet-loss=100% 17%

sent=120 received=0 packet-loss=100% 40%

sent=140 received=0 packet-loss=100% 14%

sent=160 received=0 packet-loss=100% 14%

sent=180 received=0 packet-loss=100% 53%

sent=200 received=0 packet-loss=100% 32%

average : packet-loss=100% 33%

Tabel 4.7 Analisa Data Ketika Routing RTBH Diaktifkan (user1)

USER 2

IP : 192.168.2.2 Test ping ke 20.20.10.2 (Legitimate site)

Packet-loss dan rtt

CP U load sent=20 received=20 packet-loss=0% min- rtt=8ms avg-rtt=15ms max-rtt=40ms 25%

sent=40 received=40 packet-loss=0% min- rtt=8ms avg-rtt=18ms max-rtt=94ms 28%

sent=60 received=60 packet-loss=0% min- rtt=8ms avg-rtt=16ms max-rtt=94ms 30%

sent=80 received=80 packet-loss=0% min- rtt=8ms avg-rtt=15ms max-rtt=94ms 29%

sent=100 received=100 packet-loss=0% min- rtt=8ms avg-rtt=15ms max-rtt=94ms 30%

sent=120 received=120 packet-loss=0% min- rtt=7ms avg-rtt=15ms max-rtt=94ms 28%

sent=140 received=140 packet-loss=0% min- rtt=7ms avg-rtt=15ms max-rtt=94ms 27%

sent=160 received=160 packet-loss=0% min- rtt=7ms avg-rtt=16ms max-rtt=98ms 31%

sent=180 received=180 packet-loss=0% min- rtt=7ms avg-rtt=16ms max-rtt=98ms 27%

sent=200 received=200 packet-loss=0% min- rtt=7ms avg-rtt=15ms max-rtt=94ms 25%

average : packet-loss=0% avg-rtt=15ms 28%

Tabel 4.8 Analisa Data Ketika Routing RTBH Diaktifkan (user2)

USER 3

IP : 192.168.3.2 Test ping ke 20.20.10.2

Packet-loss dan rtt CPU load sent=20 received=20 packet-loss=0% min- rtt=7ms avg-rtt=10ms max-rtt=14ms 15%

sent=40 received=40 packet-loss=0% min- rtt=6ms avg-rtt=12ms max-rtt=28ms 18%

sent=60 received=60 packet-loss=0% min- rtt=6ms avg-rtt=11ms max-rtt=28ms 18%

sent=80 received=80 packet-loss=0% min- rtt=6ms avg-rtt=11ms max-rtt=28ms 17%

sent=100 received=100 packet-loss=0% min- rtt=6ms avg-rtt=12ms max-rtt=58ms 20%

sent=120 received=120 packet-loss=0% min- rtt=6ms avg-rtt=13ms max-rtt=58ms 19%

sent=140 received=140 packet-loss=0% min- rtt=6ms avg-rtt=13ms max-rtt=58ms 18%

sent=160 received=160 packet-loss=0% min- rtt=6ms avg-rtt=14ms max-rtt=78ms 23%

sent=180 received=180 packet-loss=0% min- rtt=6ms avg-rtt=12ms max-rtt=58ms 18%

sent=200 received=200 packet-loss=0% min- rtt=6ms avg-rtt=13ms max-rtt=58ms 15%

average : packet-loss=0% avg-rtt=12ms 18%

Tabel 4.9 Analisa Data Ketika Routing RTBH Diaktifkan (user3)

Grafik Kesimpulan ICMP Flood

1 2 3

0 2 4 6 8 10 12 14 16

Dalam dokumen Pengeluaran Resourc dan Kesabaran (Halaman 66-74)

Dokumen terkait