Claim Missing Document
Check
Articles

Found 24 Documents
Search

The Art of Internet Mapping: A Comprehensive Guide to Regional Internet Topology Mapping at the Autonomous System Level Witono, Timotius; Yazid, Setiadi; Sucahyo, Yudho Giri
Journal of Information Systems Engineering and Business Intelligence Vol. 10 No. 2 (2024): June
Publisher : Universitas Airlangga

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20473/jisebi.10.2.191-205

Abstract

Background: Internet topology is studied more by researchers on global internet coverage compared to limited regional coverage. However, some studies also see the importance of studying internet topology in certain countries or regions. The internet performance of a country or region can be influenced by the structure of its internet topology, and research on internet topology can contribute to improving internet topology in that region. Objective: This research initially carried out internet topology mapping in a limited region, then used experience from each step in conducting internet topology mapping to create a comprehensive guide on procedures for internet topology mapping at the autonomous system (AS) level in certain regional areas. Methods: Internet topology mapping is carried out by inferring relationships between ASes through an inference process against border gateway protocol (BGP) table dumps, while the internet topology mapping method chosen is passive mapping. Results: The entire series of steps involved in the regional internet topology mapping process have been successfully outlined in a detailed guide as a result of this research. Evaluation of the research results was carried out by implementing the application of this comprehensive guide and also through assessments from experts in related fields regarding the results of this research. The results of both evaluations showed that the research results were appropriate. Conclusion: This research provides a comprehensive guide for mapping internet topology in specific regional areas, consisting of nine sequential steps grouped into four major steps. This guide can be used to assist similar research efforts in other regional areas as well as provide further knowledge regarding studies in this field. This research is different from previous studies, because it provides a comprehensive guide to the internet topology mapping process, which has not been available in previous studies.   Keywords: Internet Topology Mapping, Regional Internet Topology, Autonomous System, Border Gateway Protocol
Cyber-Hygiene Pada Informasi Sensitif Di Sektor Pemerintah Juraida, Erni; Yazid, Setiadi
JUTIM (Jurnal Teknik Informatika Musirawas) Vol 9 No 2 (2024): JUTIM (Jurnal Teknik Informatika Musirawas) DESEMBER
Publisher : LPPM UNIVERSITAS BINA INSAN

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32767/jutim.v9i2.2368

Abstract

As reliance on digital systems increases, governments face significant challenges in protecting sensitive information from cyber threats. This research explores the effectiveness of cyber hygiene practices and regulations in maintaining the security of sensitive information in government entities. It highlights the importance of cyber hygiene practices, examines the role of regulation, evaluates its effectiveness, and identifies challenges in maintaining strong cyber security. The study was conducted using the Systematic Literature Review (SLR) method with the Kitchenham technique, reviewing 36 research publications selected from 612 papers published between 2018 and 2024. The results show that cyber hygiene practices in government have different characteristics compared to non-government organisations, given their potential impact on national security, diplomatic relations and public trust.
Comparison of Feature Selection Methods for DDoS Attacks on Software Defined Networks using Filter-Based, Wrapper-Based and Embedded-Based Kurniawan, M.T.; Yazid, Setiadi; Sucahyo, Yudho Giri
JOIV : International Journal on Informatics Visualization Vol 6, No 4 (2022)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.4.1476

Abstract

The development of internet technology is growing very rapidly. Moreover, keeping internet users protected from cyberattacks is part of the security challenges. Distributed Denial of Service (DDoS) is a real attack that continues to grow. DDoS attacks have become one of the most difficult attacks to detect and mitigate appropriately. Software Defined Network (SDN) architecture is a novel network management and a new concept of the infrastructure network. A controller is a single point of failure in SDN, which is the most dangerous of various attacks because the attacker can take control of the controller so that it can control all network traffic. Various detection and mitigation methods have been offered, but not many consider the capacity of the SDN controller. In this research, we propose a feature selection method for DDoS attacks. This research aims to select the most important features of DDoS attacks on SDN so that the detection of DDoS on SDN can be lightweight and early. This research uses a dataset [1] generated by a Mininet emulator. The simulation runs for benign TCP, UDP, and ICMP traffic and malicious traffic, which is the collection of TCP SYN attacks, UDP Flood attacks, and ICMP attacks. A total of 23 features are available in the dataset, some are extracted from the switches, and others are calculated. By using three methods, filter-based, wrapper-based, and embedded-based, we get consistent results where the pktcount feature is the highest feature importance of DDoS attacks on SDN.
Blockchain Technology Adoption for Life Insurance: Risk, Readiness, and Relevance Susianto, Isyrofi; Yazid, Setiadi; Ermawan, Geri Yesa
International Journal of Advances in Data and Information Systems Vol. 6 No. 3 (2025): December 2025 - International Journal of Advances in Data and Information Syste
Publisher : Indonesian Scientific Journal

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59395/ijadis.v6i3.1479

Abstract

Blockchain technology has been widely discussed as a transformative solution for operational inefficiencies in the insurance sector, particularly in automating claims processing, enhancing transparency, and ensuring data immutability. However, adoption within the life insurance industry remains limited. This paper investigates the barriers and potential of blockchain implementation in life insurance through a mapping analysis using the People–Process–Technology (PPT) framework into risk, readiness, and relevance. The research identifies strategic misalignment with existing revenue models, regulatory compliance frictions, and organizational readiness gaps as key obstacles. A five-year cost comparison indicates that while blockchain incurs higher initial investment, it delivers lower operational costs in the long run—particularly in high-volume, deterministic insurance products. Architectural comparisons further highlight the operational advantages and integration challenges of blockchain-based systems over traditional IT infrastructures. The study concludes that although blockchain holds significant promise, its adoption depends on targeted use case selection, organizational transformation, and regulatory alignment.