Claim Missing Document
Check
Articles

Visualization of Granblue Fantasy Game Traffic Pattern Using Deep Packet Inspection Method Stiawan, Deris; Prabowo, Christian; Heryanto, Ahmad; Afifah, Nurul; Minarno, Agus Eko; Budiarto, Rahmat
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 5, No. 3, August 2020
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v5i3.1073

Abstract

Granblue Fantasy is one of Role Playing Games (RPG). It’s a video role-playing game developed by Cygames. This research to observes the Granblue Fantasy Game. The purpose is to analyze the traffic data of the Granblue Fantasy to find the pattern using Deep Packet Inspection (DPI), Capturing the Data Traffic, Feature Extraction Process and Visualize the Pattern. The Pattern are Gacha, Solo Raid, Casino and Multiraid. This research demonstrate that Multiraid battle has more data than other pattern with TTL 237.
WhatsApp, Viber and Telegram which is Best for Instant Messaging? Tole Sutikno; Lina Handayani; Deris Stiawan; Munawar Agus Riyadi; Imam Much Ibnu Subroto
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 3: June 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (78.797 KB) | DOI: 10.11591/ijece.v6i3.pp909-914

Abstract

There are many free instant messengers available now which allow to communicate with friends with text, phone call, video, sharing of files, in group or not and keep contact with them even internationally. But only very few of the instant messengers have gained a popularity and attention. Recent studies have shown that the most popular instant messengers are WhatsApp, Viber and Telegram. Even, Facebook acquired WhatsApp due to have huge users. Viber is another messenger with many integrated features that allows the phone calls and sends the text messages for free and there is no subscription like WhatsApp. While Telegram offers the users an open-source platform with no ads, a clean fast interface, asks for no payments whatsoever and the biggest selling point is security. WhatsApp, Viber and Telegram which instant messenger is best? The popularity of Telegram has reached at the top of Google play store and become the most downloaded messaging app in the world today. But at the moment WhatsApp is still the winner!
Personal data protection and liability of internet service provider: a comparative approach Ni Ketut Supasti Dharmawan; Desak Putu Dewi Kasih; Deris Stiawan
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 4: August 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (428.654 KB) | DOI: 10.11591/ijece.v9i4.pp3175-3184

Abstract

The users of electronic service provider often suffered losses caused by internet services did not work properly including losses due to leakage of personal data protection stored in cloud computing.  The study aims to examine electronic service provider liability upon their failure performing internet services properly and security attacks on cloud computing. This study was normative legal research by examining national and international legal materials. The finding shows that the electronic provider shall be responsible based on right and obligation agreed under the agreement.  Related to cloud computing, providing adequate security to avoid security attacks and misuse of private data that caused losses to the users becoming the liability of service provider. Based on the Federal Trade Commission Act, the liability arises on the grounds of deceptive and unfair trade practices.  Under the General Data Protection Regulation of the European Union, the liability arises on the basis as the controller then provider liable for compensation for user’s suffered damage. In Indonesia, based on the Electronic Information and Transaction Law Amendment, the liability to the owner of personal data whose rights are violated and suffered losses arises due to a failure of ISP protect the data security. For better protection in Indonesia, the protection of big data and clear territorial scope of protection become necessary to consider.
The Authority of Government in Clearing Hatefull and Hostilities Electronic Information Based on Tribe, Relegion, Race and Intergroup I Gede Yusa; Dewi Bunga; Deris Stiawan
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 6: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (474.818 KB) | DOI: 10.11591/ijece.v7i6.pp3735-3744

Abstract

The Act Number 19 of 2016 concerning the amendment of The Act Number 11 of 2008 concerning Information and Electronic Transaction governing the authority of government in clearing hateful and hostilities electronic information based on tribe, religion, race and intergroup. On the one hand, the government authority aims to protect the public interest and the integrity of the nation, but on the other hand, termination of access to information would restrict the right to freedom of opinion and the right to privacy of Internet users. This study was a normative legal research, which examined the basic authority for the government to shut down negative content in cyberspace. Legal materials were collected through library research. The analysis was conducted qualitatively. This study examined three issues, namely; spreading hatred and hostility in cyberspace, legality government to close the spreading hatred and hostility and electronic evidence in spreading hatred and hostility. Spreading hatred and hostility were criminal acts that used the Internet as facilities. Internet was used by extremists to disseminate his teachings, even being used to commit acts of terrorism (cyber terrorism). In maintaining the unity and integrity, then the government had the authority to shut down access to the unlawful electronic system. The closure should be accompanied by proof of electronic information that contains hatred and hostility based on tribe, religion, race and intergroup
Intrusion detection with deep learning on internet of things heterogeneous network Sharipuddin Sharipuddin; Benni Purnama; Kurniabudi Kurniabudi; Eko Arip Winanto; Deris Stiawan; Darmawijoyo Hanapi; Mohd. Yazid Idris; Rahmat Budiarto
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 10, No 3: September 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v10.i3.pp735-742

Abstract

The difficulty of the intrusion detection system in heterogeneous networks is significantly affected by devices, protocols, and services, thus the network becomes complex and difficult to identify. Deep learning is one algorithm that can classify data with high accuracy. In this research, we proposed deep learning to intrusion detection system identification methods in heterogeneous networks to increase detection accuracy. In this paper, we provide an overview of the proposed algorithm, with an initial experiment of denial of services (DoS) attacks and results. The results of the evaluation showed that deep learning can improve detection accuracy in the heterogeneous internet of things (IoT).
Fortifying Big Data infrastructures to Face Security and Privacy Issues Tole Sutikno; Deris Stiawan; Imam Much Ibnu Subroto
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 4: December 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i4.957

Abstract

The explosion of data available on the internet is very increasing in recent years. One of the most challenging issues is how to effectively manage such a large amount of data and identify new ways to analyze large amounts of data and unlock information. Organizations must find a way to manage their data in accordance with all relevant privacy regulations without making the data inaccessible and unusable. Cloud Security Alliance (CSA) has released that the top 10 challenges, which are as follows: 1) secure computations in distributed programming frameworks, 2) security best practices for non-relational data stores, 3) secure data storage and transactions logs, 4) end-point input validation/filtering, 5) real-time security monitoring, 6) scalable and composable privacy-preserving data mining and analytics, 7) cryptographically enforced data centric security, 8) granular access control, 9) granular audits, 10) data Provenance. The challenges themselves can be organized into four distinct aspects of the Big Data ecosystem.
Deep learning with focal loss approach for attacks classification Yesi Novaria Kunang; Siti Nurmaini; Deris Stiawan; Bhakti Yudho Suprapto
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.18772

Abstract

The rapid development of deep learning improves the detection and classification of attacks on intrusion detection systems. However, the unbalanced data issue increases the complexity of the architecture model. This study proposes a novel deep learning model to overcome the problem of classifying multi-class attacks. The deep learning model consists of two stages. The pre-tuning stage uses automatic feature extraction with a deep autoencoder. The second stage is fine-tuning using deep neural network classifiers with fully connected layers. To reduce imbalanced class data, the feature extraction was implemented using the deep autoencoder and improved focal loss function in the classifier. The model was evaluated using 3 loss functions, including cross-entropy, weighted cross-entropy, and focal losses. The results could correct the class imbalance in deep learning-based classifications. Attack classification was achieved using automatic extraction with the focal loss on the CSE-CIC-IDS2018 dataset is a high-quality classifier with 98.38% precision, 98.27% sensitivity, and 99.82% specificity.
The Architecture of Indonesian Publication Index: A Major Indonesian Academic Database Imam Much Ibnu Subroto; Tole Sutikno; Deris Stiawan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 1: March 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i1.15

Abstract

Journal articles are required all researchers as references to improve the quality of research so that the results are better than existing studies. The presence of many journal indexers that collect articles from many publishers and repositories are very helpful to lecturers and researchers to locate articles in their specific areas of interest. The main issues in the indexing include: (i) the selection and collection process articles data, (ii) the management of indexing based on source and relevance of science (iii) the accuracy and speed of the search process, and (iv) the relationship between the articles each other called citation. The desirable by readers from the indexer is to get relevant and good-quality articles easily and accurately. While the interest of the journal managers is to supply their article which reader preferred then hope many cited to their journals. This is where the position of an indexer to bridge publisher and reader. This paper presents the architecture of Indonesian Publications Index (IPI) as the bridge. This architecture is designed with three layers. The layers are the data collection layer, storage layer, and service layer. The functionality of the first layer is IPI collaboration with publishers, the second layer is the index management system, the third layer is a service to the readers. Service layer built on a variety of applications such as web based applications, mobile applications and e-library.
Attack and Vulnerability Penetration Testing: FreeBSD Deris Stiawan; Mohd. Yazid Idris; Abdul Hanan Abdullah
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 2: June 2013
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v11i2.942

Abstract

 Computer system security has become a major concern over the past few years. Attacks, threats or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM) data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.
An Introduction to Journal Phishings and Their Detection Approach Mehdi Dadkhah; Tole Sutikno; Mohammad Davarpanah Jazi; Deris Stiawan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i2.1436

Abstract

Nowadays, the most important risk and challenge in online system are online scam and phishing attacks. Phishing attacks have been always used to steal important information of users. In this kind of scam, attacker direct victim to fake pages using social engineering techniques, then, starts stealing users` important information such as passwords. In order to confronting these attacks, numerous techniques have been invented which have the ability to confront different kinds of these attacks. Our goal in this paper is to introducing new kind of phishing attacks which are not identifiable by techniques and methods which have been invented to confronting phishing attacks. Unlike other kinds of phishing attacks which target all kinds of users, researchers are the victims of these kinds of journal phishing attacks. Finally, we`ll introduce an approach based on classification algorithms to identify these kind of journal phishing attacks and then we`ll check our suggested approach in error rate.
Co-Authors Abd Rahim, Mohd Rozaini Abdiansah, Abdiansah Abdul Hadi Fikri Abdul Hanan Abdullah Abdul Harris Adi Hermansyah, Adi Adi Sutrisman Aditya Putra Perdana Prasetyo Aditya Putra Perdana Prasetyo Adji Pratomo Agung Juli Anda Agus Eko Minarno Ahmad Fali Oklilas Ahmad Firdaus Ahmad Ghiffari Ahmad Heryanto Ahmad Heryanto Ahmad Heryanto Ahmad Heryanto, Ahmad Ahmad Zarkasi Ahmad Zarkasi Albertus Edward Mintaria Ali Bardadi Ali Firdaus Alshaflut, Ahmed Anto Saputra, Iwan Pahendra Bedine Kerim Bedine Kerim Bhakti Yudho Suprapto Bhakti Yudho Suprapto Bhakti Yudho Suprapto Bin Idris, Mohd Yazid Cahyani, Nyimas Sabilina Darmawijoyo, Darmawijoyo Dasuki, Massolehin Desak Putu Dewi Kasih Dewi Bunga Dian Palupi Rini Dwi Budi Santoso Edi Surya Negara Eko Arip Winanto Endang Lestari Ruskan Ermatita - Erwin, Erwin Fachrudin Abdau Fakhrurroja, Hanif Ferdiansyah Ferdiansyah Fikri, Abdul Hadi Firdaus Firdaus Firdaus, Firdaus Firnando, Rici Firsandaya Malik, Reza Gonewaje gonewaje Habibullah, Nik Mohd Hadipurnawan Satria Harris, Abdul Hermanto, Dedy Heru Saputra Huda Ubaya Huda Ubaya Huda Ubaya I Gede Yusa Idris, Mohd. Yazid Idris, Mohd. Yazid Imam Much Ibnu Subroto Iswari, Rosada Dwi John Arthur Jupin Juli Rejito Kemahyanto Exaudi Kurniabudi, Kurniabudi Latius Hermawan Lelyzar Siregar Lina Handayani M. Miftakul Amin M. Ridwan Zalbina Majzoob K. Omer Makmum Raharjo Mardhiyah, Sayang Ajeng Marisya Pratiwi Marita, Raini Massolehin Dasuki Mehdi Dadkhah Meilinda Meilinda Meilinda, Meilinda Mintaria, Albertus Edward Mohamed S. Adrees Mohamed Shenify Mohammad Davarpanah Jazi Mohammed Y. Alzahrani Mohd Arfian Ismail Mohd Azam Osman Mohd Faizal Ab Razak Mohd Rozaini Abd Rahim Mohd Saberi Mohamad Mohd Yazid bin Idris Mohd Yazid Bin Idris Mohd Yazid Idris Mohd Yazid Idris Mohd. Yazid Idris Mohd. Yazid Idris Mohd. Yazid Idris Muhammad Afif Muhammad Fahmi MUHAMMAD FAHMI Muhammad Fermi Pasha Muhammad Qurhanul Rizqie Muhammad Sulkhan Nurfatih Munawar A Riyadi Munawar Agus Riyadi Naufal Semendawai, Jaka Negara, Edi Surya Ni Ketut Supasti Dharmawan Nik Mohd Habibullah Nur Sholihah Zaini Nuzulastri, Sari Osama E. Sheta Osman, Mohd Azam Osvari Arsalan Pahendra, Iwan Permana, Dendi Renaldo Pertiwi, Hanna Prabowo, Christian Purnama, Benni Putra Perdana Prasetyo, Aditya Rahmat Budiarto Rahmat Budiarto Rahmat Budiarto Rahmat Budiarto Rahmat Budiarto Rahmat Budiarto Raja Zahilah Md Radzi Ramayanti, Indri Ramayanti, Indri Reza Firsandaya Malik Reza Maulana Riyadi, Munawar A Rizki Kurniati Rizma Adlia Syakurah Rizqie, Muhammad Qurhanul Rossi Passarella Samsuryadi Samsuryadi Saparudin Saparudin Saparudin, Saparudin Saputra, Muhammad Ajran Sari Sandra Sarmayanta Sembiring Sarmayanta Sembiring Sasut A Valianta Sasut Analar Valianta Semendawai, Jaka Naufal Shahreen Kasim Sharipuddin, Sharipuddin Sidabutar, Alex Onesimus Siti Hajar Othman Siti Nurmaini Sri Arttini Dwi Prasetyawati Sri Desy Siswanti Susanto Susanto Susanto Susanto Susanto, Susanto Sutarno Sutarno Syakurah, Rizma Adlia Syamsul Arifin, M. Agus Tasmi Salim tasmi salim Tole Sutikno Wan Isni Sofiah Wan Din Yaya Sudarya Triana Yazid Idris, Mohd. Yazid Idris, Mohd. Yesi Novaria Kunang Yoga Yuniadi Yudho Suprapto, Bhakti Yundari, Yundari Zulhipni Reno Saputra Els