Claim Missing Document
Check
Articles

Found 2 Documents
Search

Rancang Bangun Pendingin Ruang Otomatis Menggunakan Mikrokontroler dan Sensor Pir Ramadhan, Muhammad Rama; Wijaya, Ryan Aji; Firdhayanti, Ayu
Sienna Vol 5 No 2 (2024): Sienna Volume 5 Nomor 2 Desember 2024
Publisher : LPPM Universitas Muhammadiyah Kotabumi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47637/sienna.v5i2.1645

Abstract

Various industries have been impacted by advances in automation technology, such as energy management and temperature control in enclosed spaces. One interesting application is an automated air conditioning system, which aims to reduce energy wastage in the use of conventional chillers. Inefficient use of air conditioners often leads to high carbon emissions and energy wastage, especially in tropical countries like Indonesia. To improve the efficiency of the cooling system, you can use passive infrared (PIR) sensors. Activated only when people are present in the room, PIR sensors detect changes in the radiation produced by the human body. PIR sensors can be connected to cooling systems with microcontrollers such as Arduino and ESP8266. This enables automatic remote control and monitoring. The purpose of this research is to create and implement a PIR sensor-based automatic air conditioning system equipped with an Arduino controller. Evaluation is conducted to test the performance of the system in detecting human presence and controlling the air conditioner automatically. It is expected that this system will be a simple and efficient solution to reduce the energy usage of conventional air conditioners. In addition, it will support energy efficiency and environmental sustainability.
Development of Detection and Mitigation of Advanced Persistent Threats Using Artificial Intelligence and Multi-Layer Security on Cloud Computing Infrastructure Hartono, Hartono; Wijaya, Ryan Aji; Khotimah, Khusnul
International Journal of Artificial Intelligence Research Vol 8, No 2 (2024): December 2024
Publisher : STMIK Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29099/ijair.v8i2.1250

Abstract

This research proposes a novel approach for detecting and mitigating Advanced Persistent Threats (APTs) in cloud computing infrastruc ture, offering more comprehensive protection compared to previous methods. By integrating detection and mitigation, this study addresses the shortcomings of prior research that focused solely on detection. Based on the conducted research, Artificial Intelligence (AI) detected Cross-Site Scripting (XSS) attacks with an accuracy of 0.9951, SQL Injection (SQLI) at 0.9964, and Remote Code Execution (RCE) at 0.9876. In trials against new attacks, the detection success rates reached 70% for XSS, 98% for SQLI, and 100% for RCE. During the deployment phase, the system successfully identified 23.040 out of 108.394 requests as XSS attacks, 2.684 out of 128.750 as SQLI attacks, and 1.135 out of 46.450 as RCE attacks. The detection and mitigation methods were directly tested on cloud server experiencing APT attacks. The daily attacks on the server reached 1.980, with 663.000 requests. Additionally, the number of attacks directed at authentication or sensitive pages reached 17.913.701. Attack mitigation was tested through seven layers of security, including DNS Protection, Config Server Firewall (CSF), OWASP ModSecurity, HTTP middleware, data filter or sanitizer, template engine, and manual mitigation successfully blocking million of persistent attacks. The DNS protection layer successfully mitigated 59,000 out of a total of 19 million requests. The CSF layer mitigated 173 sources IP of DDoS attacks. The ModSecurity layer mitigated 17,916,204 attacks. All attacks were successfully mitigated before reaching the HTTP Middleware stage or next layer. The use of NIST 2.0 standards helps manage security risks through identification, protection, detection, response, and recovery. Test results indicate that this multi-layered system is more efficient and effective in detecting and mitigating attacks compared to traditional methods. However, the complexity of implementation and maintenance poses challenges that must be addressed. This research significantly contributes to a more adaptive and sustainable cybersecurity strategy.