Articles
Review of the machine learning methods in the classification of phishing attack
John Arthur Jupin;
Tole Sutikno;
Mohd Arfian Ismail;
Mohd Saberi Mohamad;
Shahreen Kasim;
Deris Stiawan
Bulletin of Electrical Engineering and Informatics Vol 8, No 4: December 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (723.905 KB)
|
DOI: 10.11591/eei.v8i4.1344
The development of computer networks today has increased rapidly. This can be seen based on the trend of computer users around the world, whereby they need to connect their computer to the Internet. This shows that the use of Internet networks is very important, whether for work purposes or access to social media accounts. However, in widely using this computer network, the privacy of computer users is in danger, especially for computer users who do not install security systems in their computer. This problem will allow hackers to hack and commit network attacks. This is very dangerous, especially for Internet users because hackers can steal confidential information such as bank login account or social media login account. The attacks that can be made include phishing attacks. The goal of this study is to review the types of phishing attacks and current methods used in preventing them. Based on the literature, the machine learning method is widely used to prevent phishing attacks. There are several algorithms that can be used in the machine learning method to prevent these attacks. This study focused on an algorithm that was thoroughly made and the methods in implementing this algorithm are discussed in detail.
Adaboost-multilayer perceptron to predict the student’s performance in software engineering
Ahmad Firdaus Zainal Abidin;
Mohd Faaizie Darmawan;
Mohd Zamri Osman;
Shahid Anwar;
Shahreen Kasim;
Arda Yunianta;
Tole Sutikno
Bulletin of Electrical Engineering and Informatics Vol 8, No 4: December 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (496.113 KB)
|
DOI: 10.11591/eei.v8i4.1432
Software Engineering (SE) course is one of the backbones of today's computer technology sophistication. Effective theoretical and practical learning of this course is essential to computer students. However, there are many students fail in this course. There are many aspects that influence a student's performance. Currently, student performance analysis methods just focus on historical achievement and assessment methods given in the class. Need more research to predict student's performance to overcome the problem of student failing. The objective of this research is to perform a prediction for student's performance in the SE using enhanced Multilayer Perceptron (MLP) machine learning classification with Adaboost. This research also investigates the requirements of each student before registering in this course. This research achieved 87.76 percent accuracy in classifying the performance of SE students.
Augmented reality: effect on conceptual change of scientific
Danakorn Nincarean Eh Phon;
Ahmad Firdaus Zainal Abidin;
Mohd Faizal Ab Razak;
Shahreen Kasim;
Ahmad Hoirul Basori;
Tole Sutikno
Bulletin of Electrical Engineering and Informatics Vol 8, No 4: December 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (411.711 KB)
|
DOI: 10.11591/eei.v8i4.1625
In recent years, Augmented Reality (AR) has received increasing emphasis and researchers gradually promote it Over the worlds. With the unique abilities to generate virtual objects over the real-world environment, it can enhance user perception. Although AR recognised for their enormous positive impacts, there are still a ton of matters waiting to be discovered. Research studies on AR toward conceptual change, specifically in scientific concept, are particularly limited. Therefore, this research aims to investigate the effect of integrating AR on conceptual change in scientific concepts. Thirty-four primary school students participated in the study. A pre-test and post-test were used to assess participants’ understanding of the scientific concepts before and after learning through AR. The findings demonstrated that 82% among them had misconceptions about the scientific concepts before learning through AR. However, most of them (around 88%) able to correct their misconceptions and shifted to have a scientific conceptual understanding after learning through AR. These findings indicate that AR was effective to be integrated into education to facilitate conceptual change.
Review of the machine learning methods in the classification of phishing attack
John Arthur Jupin;
Tole Sutikno;
Mohd Arfian Ismail;
Mohd Saberi Mohamad;
Shahreen Kasim;
Deris Stiawan
Bulletin of Electrical Engineering and Informatics Vol 8, No 4: December 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (723.905 KB)
|
DOI: 10.11591/eei.v8i4.1344
The development of computer networks today has increased rapidly. This can be seen based on the trend of computer users around the world, whereby they need to connect their computer to the Internet. This shows that the use of Internet networks is very important, whether for work purposes or access to social media accounts. However, in widely using this computer network, the privacy of computer users is in danger, especially for computer users who do not install security systems in their computer. This problem will allow hackers to hack and commit network attacks. This is very dangerous, especially for Internet users because hackers can steal confidential information such as bank login account or social media login account. The attacks that can be made include phishing attacks. The goal of this study is to review the types of phishing attacks and current methods used in preventing them. Based on the literature, the machine learning method is widely used to prevent phishing attacks. There are several algorithms that can be used in the machine learning method to prevent these attacks. This study focused on an algorithm that was thoroughly made and the methods in implementing this algorithm are discussed in detail.
Adaboost-multilayer perceptron to predict the student’s performance in software engineering
Ahmad Firdaus Zainal Abidin;
Mohd Faaizie Darmawan;
Mohd Zamri Osman;
Shahid Anwar;
Shahreen Kasim;
Arda Yunianta;
Tole Sutikno
Bulletin of Electrical Engineering and Informatics Vol 8, No 4: December 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (496.113 KB)
|
DOI: 10.11591/eei.v8i4.1432
Software Engineering (SE) course is one of the backbones of today's computer technology sophistication. Effective theoretical and practical learning of this course is essential to computer students. However, there are many students fail in this course. There are many aspects that influence a student's performance. Currently, student performance analysis methods just focus on historical achievement and assessment methods given in the class. Need more research to predict student's performance to overcome the problem of student failing. The objective of this research is to perform a prediction for student's performance in the SE using enhanced Multilayer Perceptron (MLP) machine learning classification with Adaboost. This research also investigates the requirements of each student before registering in this course. This research achieved 87.76 percent accuracy in classifying the performance of SE students.
Rainfall-runoff modelling using adaptive neuro-fuzzy inference system
Nurul Najihah Che Razali;
Ngahzaifa Ab. Ghani;
Syifak Izhar Hisham;
Shahreen Kasim;
Nuryono Satya Widodo;
Tole Sutikno
Indonesian Journal of Electrical Engineering and Computer Science Vol 17, No 2: February 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v17.i2.pp1117-1126
This paper discusses the working mechanism of ANFIS, the flow of research, the implementation and evaluation of ANFIS models, and discusses the pros and cons of each option of input parameters applied, in order to solve the problem of rainfall-runoff forecasting. The rainfall-runoff modelling considers time-series data of rainfall amount (in mm) and water discharge amount (in m3/s). For model parameters, the models apply three triangle membership functions for each input. Meanwhile, the accuracy of the data is measured using the Root Mean Square Error (RMSE). Models with good performance in training have low values of RMSE. Hence, the 4-input model data is the best model to measure prediction accurately with the value of RMSE as 22.157. It is proven that ANFIS has the potential to be used for flood forecasting generally, or rainfall-runoff modelling specifically.
A malicious URLs detection system using optimization and machine learning classifiers
Ong Vienna Lee;
Ahmad Heryanto;
Mohd Faizal Ab Razak;
Anis Farihan Mat Raffei;
Danakorn Nincarean Eh Phon;
Shahreen Kasim;
Tole Sutikno
Indonesian Journal of Electrical Engineering and Computer Science Vol 17, No 3: March 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v17.i3.pp1210-1214
The openness of the World Wide Web (Web) has become more exposed to cyber-attacks. An attacker performs the cyber-attacks on Web using malware Uniform Resource Locators (URLs) since it widely used by internet users. Therefore, a significant approach is required to detect malicious URLs and identify their nature attack. This study aims to assess the efficiency of the machine learning approach to detect and identify malicious URLs. In this study, we applied features optimization approaches by using a bio-inspired algorithm for selecting significant URL features which able to detect malicious URLs applications. By using machine learning approach with static analysis technique is used for detecting malicious URLs applications. Based on this combination as well as significant features, this paper shows promising results with higher detection accuracy. The bio-inspired algorithm: particle swarm optimization (PSO) is used to optimized URLs features. In detecting malicious URLs, it shows that naïve Bayes and support vector machine (SVM) are able to achieve high detection accuracy with rate value of 99%, using URL as a feature.
Phishing detection system using machine learning classifiers
Nur Sholihah Zaini;
Deris Stiawan;
Mohd Faizal Ab Razak;
Ahmad Firdaus;
Wan Isni Sofiah Wan Din;
Shahreen Kasim;
Tole Sutikno
Indonesian Journal of Electrical Engineering and Computer Science Vol 17, No 3: March 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v17.i3.pp1165-1171
The increasing development of the Internet, more and more applications are put into websites can be directly accessed through the network. This development has attracted an attacker with phishing websites to compromise computer systems. Several solutions have been proposed to detect a phishing attack. However, there still room for improvement to tackle this phishing threat. This paper aims to investigate and evaluate the effectiveness of machine learning approach in the classification of phishing attack. This paper applied a heuristic approach with machine learning classifier to identify phishing attacks noted in the web site applications. The study compares with five classifiers to find the best machine learning classifiers in detecting phishing attacks. In identifying the phishing attacks, it demonstrates that random forest is able to achieve high detection accuracy with true positive rate value of 94.79% using website features. The results indicate that random forest is effective classifiers for detecting phishing attacks.
Integrated NIR-HE based SPOT-5 image enhancement method for features preservation and edge detection
Farizuwana Akma Zulkifle;
Rohayanti Hassan;
Mohammad Nazir Ahmad;
Shahreen Kasim;
Tole Sutikno;
Shahliza Abd Halim
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 3: December 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v24.i3.pp1499-1514
Recently, many researchers have directed their attention to methods of predicting shorelines by the use of multispectral images. Thus, a simple and optimised method using image enhancements is proposed to improve the low contrast of the Satellite pour l'Observation de la Terre-5 (SPOT-5) images in the detection of shorelines. The near-infrared (NIR) channel is important in this study to ensure the contrast of the vegetated area and sea classification, due to the high reflectance of leaves in the near infrared wavelength region. This study used five scenes of interest to show the different results in shoreline detection. The results demonstrated that the proposed method performed in an enhanced manner as compared to current methods when dealing with the low contrast ratio of SPOT-5 images. As a result, by utilising the near-infrared histogram equalization (NIR-HE), the contrast of all datasets was efficiently restored, producing a higher efficiency in edge detection, and achieving higher overall accuracy. The improved filtering method showed significantly better shoreline detection results than the other filter methods. It was concluded that this method would be useful for detecting and monitoring the shoreline edge in Tanjung Piai.
An Effective Pre-Processing Phase for Gene Expression Classification
Choon Sen Seah;
Shahreen Kasim;
Mohd Farhan Md Fudzee;
Mohd Saberi Mohamad;
Rd Rohmat Saedudin;
Rohayanti Hassan;
Mohd Arfian Ismail;
Rodziah Atan
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v11.i3.pp1223-1227
A raw dataset prepared by researchers comes with a lot of information. Whether the information is usefull or not, completely depends on the requirement and purposes. In machine learning, data pre-processing is the very initial stage. It is a must to make sure the dataset is totally suitable for the requirement. In significant directed random walk (sDRW), there are three steps in data pre-processing stage. First, we remove unwanted attributes, missing value and proper arrangement, followed by normalization of the expression value and lastly, filtering method is applied. The first two steps are completed by Bioconductor package while the last step is works in sDRW.