Claim Missing Document
Check
Articles

Found 23 Documents
Search

Simulation of Mobile LoRa Gateway for Smart Electricity Meter Sugianto Sugianto; Azwar Al Anhar; Ruki Harwahyu; Riri Fitri Sari
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 5: EECSI 2018
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (680.261 KB) | DOI: 10.11591/eecsi.v5.1649

Abstract

LoRa is a viable connectivity technology for smart electricity meter. In addition to measuring electricity usage, a smart electricity meter enables many features for smart grid, safety, etc. LoRa is advertised to be capable in very long range transmission and low power consumption. However, LoRa uses sub 1 GHz unlicensed spectrum. In the era of connected smart things, this spectrum is very crowded and will be even more crowded. In this paper we propose the use of mobile LoRa gateway for smart electricity meter. With mobile LoRa gateway, the transmission range can be decreased. Thus, LoRa end devices can save more power and nearby systems can reuse the same band with less interference. We study the performance via simulation using modified LoRaSim. The result shows that the performance of LoRa mobile gateway can be achieved.
Analysis of the Interfacial Reaction between Bulk Metallic Glass Coated Copper, Nickel, and Titanium with Lead-Free Solders Laksono, Andromeda Dwi; Yen, Yee-wen; Tanjung, Rifqi Aulia; Amatosa, Teodoro A.; Harwahyu, Ruki
Makara Journal of Technology Vol. 25, No. 1
Publisher : UI Scholars Hub

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Bulk metallic glass (BMG) has good mechanical strength, high hardness, wear resistance, and corrosion resistance with promising application in various industries. However, for the industrial production of BMG, the main issue is how to overcome limitations of joining with other materials. The present study focuses on solder processing at low operating temperature to avoid exceeding the recrystallization temperature. A feasible joining process for BMG was developed using lead-free solders. The BMG surface is pre-plated with copper, nickel, or titanium as a wetting layer. The reaction temperature is set between the glass transition temperature of BMG and the melting point of the solder. After a reflowing and aging process, the joint sample was examined using SEM, EDS, EPMA, and XRD. The Cu–Zr based BMG can be successfully joined with Sn-58Bi solder after plating Cu on the BMG surface. A diffusion layer was observed and the thickness increased with longer aging time. The main components of the diffusion layer are ZrO2 and Cu10Zr7.
Implementing the Chaotic Permutation Multicircular Cryptography Technique using Asymmetric Key Aria Lesmana; Ruki Harwahyu; Yohan Suryanto
ULTIMATICS Vol 14 No 2 (2022): Ultimatics : Jurnal Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31937/ti.v14i2.2837

Abstract

In digital computing, cryptographic methods considers performance in both speed and security. This study aims to explore and improve a permutation-based symmetric chaotic cryptography technique called Chaotic Permutation Multicircular (CPMC). In this study, a method is proposed to implement asymmetric key system from CPMC technique by generating a reverser key for reverting the permutation result of CPMC encryption back to its original arrangement using the same function as encryption. The reverser key alongside the CPMC key act as encryption and decryption key pair. The pair key generation and cryptographic function utilizes the encryption function of CPMC technique dubbed CPMC Shrinking algorithm. Asymmetric implementation can simplify CPMC technique by also using CPMC Shrinking algorithm for decryption, therefore enabling it as a single function for encryption and decryption. The asymmetric single function cryptography test show improvement in speed from faster cryptographic speed in decryption compared to initial implementation by average of 75.87%
Intrusion Detection System on Nowaday's Attack using Ensemble Learning Fajar Henri Erasmus Ndolu; Ruki Harwahyu
IJNMT (International Journal of New Media Technology) Vol 10 No 1 (2023): IJNMT
Publisher : Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31937/ijnmt.v10i1.3210

Abstract

Attacks on computer networks are becoming more and more widespread nowadays, making this an important issue that must be considered . These attacks can be detected with the Intrusion Detection System (IDS). However, at this time there are new attacks that have not been detected by IDS. Therefore, ensemble learning is used. This research we used Random Forest algorithm for attack detection as an increase in the ability of IDS to detect cyber attacks. The use of the CSE-CIC-IDS2018 dataset is used in this research as a current representative dataset for cyber attack detection. The results of this study we get a binary classification accuracy of 99.6856% and an f1-score of 99.5803% and a multiclass classification accuracy of 99.6944 and an f1-score of 97.8032% with a data ratio ratio dataset of 3:1 normal class to attack class.
Implementasi Dashboard Monitoring untuk Pengujian Kerentanan SQL Injection pada Environment GitLab Muhammad Fahmi Al Azhar; Ruki Harwahyu
Smart Comp :Jurnalnya Orang Pintar Komputer Vol 12, No 3 (2023): Smart Comp: Jurnalnya Orang Pintar Komputer
Publisher : Politeknik Harapan Bersama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/smartcomp.v12i3.5492

Abstract

SQL Injection masih menjadi salah satu jenis kerentanan yang paling sering ditemukan pada aplikasi berbasis web. Pengujian terhadap aplikasi sebelum dirilis ke production harus dilakukan semaksimal mungkin agar kerentanan ini tidak muncul saat aplikasi tersebut rilis ke production. Salah satu jenis pengujian yang harus dilakukan adalah Static Application Security Testing (SAST). SAST bekerja dengan cara memindai dan menganalisis seluruh source code di dalam project untuk diperiksa apakah terdapat kesalahan logika dan jenis kerentanan tertentu. Dengan menggunakan platform GitLab, pengujian dapat dilakukan secara otomatis. Namun, hasil dari pengujian SAST tersebut tidak dapat dilihat secara langsung melalui platform GitLab. Berdasarkan kondisi tersebut, maka dibutuhkan aplikasi dashboard monitoring yang dapat diakses oleh tim pengembang dan tim operasional TI. Dengan menggunakan dashboard ini, maka programmer dapat mengetahui bagian source code mana yang mengandung kerentanan SQL Injection. Dashboard ini dibuat dengan menggunakan framework PHP CodeIgniter 4 dan Database MySQL.
Three layer hybrid learning to improve intrusion detection system performance Harwahyu, Ruki; Erasmus Ndolu, Fajar Henri; Overbeek, Marlinda Vasty
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 2: April 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i2.pp1691-1699

Abstract

In imbalanced network traffic, malicious cyberattacks can be hidden in a large amount of normal traffic, making it difficult for intrusion detection systems (IDS) to detect them. Therefore, anomaly-based IDS with machine learning is the solution. However, a single machine learning cannot accurately detect all types of attacks. Therefore, a hybrid model that combines long short-term memory (LSTM) and random forest (RF) in three layers is proposed. Building the hybrid model starts with Nearmiss-2 class balancing, which reduces normal samples without increasing minority samples. Then, feature selection is performed using chi-square and RF. Next, hyperparameter tuning is performed to obtain the optimal model. In the first and second layers, LSTM and RF are used for binary classification to detect normal data and attack data. While the third layer model uses RF for multiclass classification. The hybrid model verified using the CSE-CIC-IDS2018 dataset, showed better performance compared to the single algorithm. For multiclass classification, the hybrid model achieved 99.76% accuracy, 99.76% precision, 99.76% recall, and 99.75% F1-score.
DETECTION OF SQL INJECTION VULNERABILITY IN CODEIGNITER FRAMEWORK USING STATIC ANALYSIS Fahmi Al Azhar, Muhammad; Harwahyu, Ruki
MULTITEK INDONESIA Vol 17, No 1 (2023): Juli
Publisher : Universitas Muhammadiyah Ponorogo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24269/mtkind.v17i1.7267

Abstract

SQL Injection attacks are still one type of attack that often occurs in web-based applications. The causes and ways to prevent SQL Injection have been widely explained in various sources. Unfortunately, until now, SQL Injection vulnerabilities are still often found in multiple applications. Web-based application frameworks that already have functions to protect against attacks are often not used optimally. This is inseparable from the role of programmers, who often forget the rules for writing program code to prevent SQL Injection attacks. We conducted this research to detect SQL Injection vulnerabilities in source code using a case study of the PHP CodeIgniter framework. We compared this research with static analysis tools like RIPS, Synopsys Coverity, and Sonarqube. The tool we have developed can detect SQL Injection vulnerabilities that cannot be detected by the two tools with an accuracy of 88.8%. The results of our research can provide suggestions for programmers so that they can improve the code they write.
Performance Evaluation Elastic Security as Open Source Endpoint Detection and Response for Advanced Persistent Threat Cyberattack Putra, Zegar Pradipta; Harwahyu, Ruki; Hebert, Evans
International Journal of Electrical, Computer, and Biomedical Engineering Vol. 2 No. 2 (2024)
Publisher : Universitas Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62146/ijecbe.v2i2.49

Abstract

Detecting APT using conventional information protection systems poses significant challenges. For instance, signature-based detection tools like antivirus primarily rely on predefined signature rules to identify malware. However, in scenarios like zero-day attacks where malware signatures are unknown, detection becomes unreliable. While EDR traditionally hinges on signature-based rules, recent advancements integrate machine learning techniques for enhanced detection capabilities. In this study, we conducted an evaluation of open-source EDR, specifically Elastic Security, for APT detection. APT attack vectors were simulated utilizing the Caldera Platform. The evaluation involved validating each attack vector sent by Caldera against detection alerts generated by Elastic Security. The detection outcomes revealed three categories: detected alerts conforming to predefined rules, undetected alerts despite predefined rules, and undetected alerts due to undefined rules. Some attack vectors lacked rule definitions, potentially resulting in elevated false positives. Additionally, certain attack vectors failed to trigger alerts despite rule definitions.
Design and Analysis of Information Security Risk Management Based on ISO 27005: Case Study on Audit Management System (AMS) XYZ Internal Audit Department Hidayatullah, Diar Eka Risqi; Kunthi, Raisiffah; Harwahyu, Ruki
International Journal of Electrical, Computer, and Biomedical Engineering Vol. 2 No. 3 (2024)
Publisher : Universitas Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62146/ijecbe.v2i3.81

Abstract

Information security is an important aspect and supported by a report issued by the Internal Audit Foundation entitled Risk in Focus 2024 Global Summary. Biggest risk that will be faced in 2024 is Cybersecurity and Data Security with a score of 73% for the global average. Based on a report issued by International Business Machine (IBM) entitled Cost of a Data Breach Report 2023, takes an average of 204 days to find out about a data leak by an affected agency or organization, and takes 73 days to overcome the data leak. To realize this digitalization, an Audit Management System (AMS) system was implemented which can accommodate the audit process starting from the Planning, Execution and Reporting stages as well as follow-up process for recommendations process. Using AMS is not without risks, access to AMS can be done without a Virtual Private Network (VPN). In this research, a risk assessment was carried out based on the ISO/IEC 27005:2022 standard by proposing a method for calculating consequences based on the classification of data in the system and a method for calculating possibilities based on business processes that have an impact on system vulnerabilities and risks that need to be mitigated. ISO/IEC 27002:2022 will be used to anticipate risks. Results of the risk examination revealed that there were 24 risks with 1 very high-level risk, 3 high level risks, 8 medium level risks, 11 low level risks, and 1 very low-level risk in the XYZ internal audit department.
Pemodelan Ancaman Stride/Dread Pada Sistem Diseminasi Terintegrasi Kartono, Harry; Harwahyu, Ruki
Smart Comp :Jurnalnya Orang Pintar Komputer Vol 12, No 4 (2023): Smart Comp: Jurnalnya Orang Pintar Komputer
Publisher : Politeknik Harapan Bersama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/smartcomp.v12i4.5698

Abstract

Implementasi sistem yang terintegrasi seperti SDT (Sistem Diseminasi Terintegrasi) memudahkan pengguna untuk menyelesaikan pekerjaan yang sudah ada . Sistem yang terintegrasi juga membuat proses bisnis semakin cepat , efisien dan terotomasi karena adanya tukar data antar mesin . Tetapi dengan integrasinya beberapa sistem menjadi satu sistem besar maka rumit suatu sistem akan bertambah dan juga ancaman juga semakin banyak . Pemodelan ancaman adalah suatu metodologi untuk kebaikan suatu ancaman , penisian risiko , dan langkah penanggulangan agar ancaman yang timbul tidak mengganggu suatu proses bisnis dalam sistem . Pemodelan ancaman pada SDT ini memiliki beberapa tahap , tahap awal adalah dekomposisi sistem-sistem penyusun SDT, integrasi komponen antar sistem , klasifikasi ancaman berdasarkan STRIDE, penilian risiko berdasarkan DREAD, dan pemilihan perbaikan tiap kelompok komponen . Tahapan-tahapan ini menghasilkan klasifikasi ancaman , serta penisian risiko tiap komponen pada sistem-sistem di SDT. Komponen yang paling banyak ancaman dan paling berisiko terhadap ancaman adalah komponen Webserver Mediator, Webserver Diseminasi dan Webserver Portalpublikasi . Ancaman tertinggi pada tiga komponen di tersebut adalah peningkatan keistimewaan. Dari hasil klasifikasi ancaman dan penilian risiko maka ditentukan langkah pengaturan pada komponen ketiga Webserver untuk meminimalkan potensi ancaman