Claim Missing Document
Check
Articles

Found 5 Documents
Search
Journal : Computer Science and Information Technologies

Detection of android malware with deep learning method using convolutional neural network model Maulana, Reza; Stiawan, Deris; Budiarto, Rahmat
Computer Science and Information Technologies Vol 6, No 1: March 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v6i1.p68-79

Abstract

Android malware is an application that targets Android devices to steal crucial data, including money or confidential information from Android users. Recent years have seen a surge in research on Android malware, as its types continue to evolve, and cybersecurity requires periodic improvements. This research focuses on detecting Android malware attack patterns using deep learning and convolutional neural network (CNN) models, which classify and detect malware attack patterns on Android devices into two categories: malware and non-malware. This research contributes to understanding how effective the CNN models are by comparing the ratio of data used with several epochs. We effectively use CNN models to detect malware attack patterns. The results show that the deep learning method with the CNN model can manage unstructured data. The research results indicate that the CNN model demonstrates a minimal error rate during evaluation. The comparison of accuracy, precision, recall, F1 Score, and area under the curve (AUC) values demonstrates the recognition of malware attack patterns, reaching an average of 92% accuracy in data testing. This provides a holistic understanding of the model's performance and its practical utility in detecting Android malware.
Machine learning model approach in cyber attack threat detection in security operation center Saputra, Muhammad Ajran; Stiawan, Deris; Budiarto, Rahmat
Computer Science and Information Technologies Vol 6, No 1: March 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v6i1.p80-90

Abstract

The evolution of technology roles attracted cyber security threats not only compromise stable technology but also cause significant financial loss for organizations and individuals. As a result, organizations must create and implement a comprehensive cybersecurity strategy to minimize further loss. The founding of a cybersecurity surveillance center is one of the optimal adopted strategies, known as security operation center (SOC). The strategy has become the forefront of digital systems protection. We propose strategy optimization to prevent or mitigate cyberattacks by analyzing and detecting log anomalies using machine learning models. This study employs two machine learning models: the naïve Bayes model with multinomial, Gaussian, and Bernoulli variants, and the support vector machine (SVM) model with radial basis function (RBF), linear, polynomial, and sigmoid kernel variants. The hyperparameters in both models are then optimized. The models with optimized hyperparameters are subsequently trained and tested. The experimental results indicate that the best performance is achieved by the RBF kernel SVM model, with an accuracy of 79.75%, precision of 80.8%, recall of 79.75%, and F1-score of 80.01%; and the Gaussian naïve Bayes model, with an accuracy of 70.0%, precision of 80.27%, recall of 70.0%, and F1-score of 70.66%. Overall, both models perform relatively well and are classified in the very good category (75%‒89%).
Classification and similarity detection of Indonesian scientific journal articles Cahyani, Nyimas Sabilina; Stiawan, Deris; Abdiansah, Abdiansah; Afifah, Nurul; Permana, Dendi Renaldo
Computer Science and Information Technologies Vol 6, No 2: July 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v6i2.p147-158

Abstract

The development of technology is accelerating in finding references to scientific articles or journals related to research topics. One of the sources of national aggregator services to find references is Garba Rujukan Digital (GARUDA), developed by the Ministry of Education, Culture, Research, and Technology (Kemendikbudristek) of the Republic of Indonesia. The naïve Bayes method classifies articles into several categories based on titles and abstracts. The system achieves an F1-score of 98%, which indicates high classification accuracy, and the classification process takes less than 60 minutes. Article similarity detection is done using the cosine similarity method, and a similarity score of 0.071 reflects the degree of similarity between the title and the abstract that has been concatenated, while a score close to 1 indicates a higher similarity. Searching for similar scientific articles based on title and abstract, sort articles based on the results of the highest similarity score are the most similar articles, and generating article categories. The results of the research show that the proposed method significantly improves the classification and search processes in GARUDA, as well as accurate and efficient similarity detection.
Clustering man in the middle attack on chain and graph-based blockchain in internet of things network using k-means Nuzulastri, Sari; Stiawan, Deris; Satria, Hadipurnawan; Budiarto, Rahmat
Computer Science and Information Technologies Vol 5, No 2: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v5i2.p176-185

Abstract

Network security on internet of things (IoT) devices in the IoT development process may open rooms for hackers and other problems if not properly protected, particularly in the addition of internet connectivity to computing device systems that are interrelated in transferring data automatically over the network. This study implements network detection on IoT network security resembles security systems from man in the middle (MITM) attacks on blockchains. Security systems that exist on blockchains are decentralized and have peer to peer characteristics which are categorized into several parts based on the type of architecture that suits their use cases such as blockchain chain based and graph based. This study uses the principal component analysis (PCA) to extract features from the transaction data processing on the blockchain process and produces 9 features before the k-means algorithm with the elbow technique was used for classifying the types of MITM attacks on IoT networks and comparing the types of blockchain chain-based and graph-based architectures in the form of visualizations as well. Experimental results show 97.16% of normal data and 2.84% of MITM attack data were observed.
Machine learning-based anomaly detection for smart home networks under adversarial attack Rejito, Juli; Stiawan, Deris; Alshaflut, Ahmed; Budiarto, Rahmat
Computer Science and Information Technologies Vol 5, No 2: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v5i2.p122-129

Abstract

As smart home networks become more widespread and complex, they are capable of providing users with a wide range of applications and services. At the same time, the networks are also vulnerable to attack from malicious adversaries who can take advantage of the weaknesses in the network's devices and protocols. Detection of anomalies is an effective way to identify and mitigate these attacks; however, it requires a high degree of accuracy and reliability. This paper proposes an anomaly detection method based on machine learning (ML) that can provide a robust and reliable solution for the detection of anomalies in smart home networks under adversarial attack. The proposed method uses network traffic data of the UNSW-NB15 and IoT-23 datasets to extract relevant features and trains a supervised classifier to differentiate between normal and abnormal behaviors. To assess the performance and reliability of the proposed method, four types of adversarial attack methods: evasion, poisoning, exploration, and exploitation are implemented. The results of extensive experiments demonstrate that the proposed method is highly accurate and reliable in detecting anomalies, as well as being resilient to a variety of types of attacks with average accuracy of 97.5% and recall of 96%.
Co-Authors Abd Rahim, Mohd Rozaini Abdiansah, Abdiansah Abdul Hadi Fikri Abdul Hanan Abdullah Abdul Harris Adi Hermansyah, Adi Adi Sutrisman Aditya Putra Perdana Prasetyo Aditya Putra Perdana Prasetyo Adji Pratomo Agung Juli Anda Agus Eko Minarno Ahmad Fali Oklilas Ahmad Firdaus Ahmad Ghiffari Ahmad Heryanto Ahmad Heryanto Ahmad Heryanto Ahmad Heryanto, Ahmad Ahmad Zarkasi Ahmad Zarkasi Albertus Edward Mintaria Ali Bardadi Ali Firdaus Alshaflut, Ahmed Anto Saputra, Iwan Pahendra Bedine Kerim Bedine Kerim Bhakti Yudho Suprapto Bhakti Yudho Suprapto Bhakti Yudho Suprapto Bin Idris, Mohd Yazid Cahyani, Nyimas Sabilina Darmawijoyo, Darmawijoyo Dasuki, Massolehin Dedy Hermanto Desak Putu Dewi Kasih Dewi Bunga Dian Palupi Rini Dwi Budi Santoso Edi Surya Negara Eko Arip Winanto Endang Lestari Ruskan Ermatita - Erwin, Erwin Fachrudin Abdau Fakhrurroja, Hanif Ferdiansyah Ferdiansyah Fikri, Abdul Hadi Firdaus Firdaus Firdaus, Firdaus Firnando, Rici Firsandaya Malik, Reza Gonewaje gonewaje Habibullah, Nik Mohd Hadipurnawan Satria Harris, Abdul Huda Ubaya Huda Ubaya Huda Ubaya I Gede Yusa Idris, Mohd. Yazid Idris, Mohd. Yazid Imam Much Ibnu Subroto Indradewa, Rhian Iswari, Rosada Dwi John Arthur Jupin Juli Rejito Kemahyanto Exaudi Kurniabudi, Kurniabudi Latius Hermawan Lelyzar Siregar Lina Handayani M. Miftakul Amin M. Ridwan Zalbina Majzoob K. Omer Makmum Raharjo Mardhiyah, Sayang Ajeng Marisya Pratiwi Marita, Raini Massolehin Dasuki Mehdi Dadkhah Meilinda Meilinda Meilinda, Meilinda Mintaria, Albertus Edward Mohamed S. Adrees Mohamed Shenify Mohammad Davarpanah Jazi Mohammed Y. Alzahrani Mohd Arfian Ismail Mohd Azam Osman Mohd Faizal Ab Razak Mohd Rozaini Abd Rahim Mohd Saberi Mohamad Mohd Yazid bin Idris Mohd Yazid Bin Idris Mohd Yazid Idris Mohd Yazid Idris Mohd. Yazid Idris Mohd. Yazid Idris Mohd. Yazid Idris Muhammad Afif Muhammad Fahmi MUHAMMAD FAHMI Muhammad Fermi Pasha Muhammad Qurhanul Rizqie Muhammad Sulkhan Nurfatih Munawar A Riyadi Munawar Agus Riyadi Naufal Semendawai, Jaka Negara, Edi Surya Ni Ketut Supasti Dharmawan Nik Mohd Habibullah Nur Sholihah Zaini Nuzulastri, Sari Osama E. Sheta Osman, Mohd Azam Osvari Arsalan Pahendra, Iwan Permana, Dendi Renaldo Pertiwi, Hanna Prabowo, Christian Purnama, Benni Putra Perdana Prasetyo, Aditya Rahmat Budiarto Rahmat Budiarto Rahmat Budiarto Rahmat Budiarto Rahmat Budiarto Rahmat Budiarto Raja Zahilah Md Radzi Ramayanti, Indri Ramayanti, Indri Reza Firsandaya Malik Reza Maulana Riyadi, Munawar A Rizki Kurniati Rizma Adlia Syakurah Rizqie, Muhammad Qurhanul Rossi Passarella Samsuryadi Samsuryadi Saparudin Saparudin Saparudin, Saparudin Saputra, Muhammad Ajran Sari Sandra Sarmayanta Sembiring Sarmayanta Sembiring Sasut A Valianta Sasut Analar Valianta Semendawai, Jaka Naufal Shahreen Kasim Sharipuddin, Sharipuddin Sidabutar, Alex Onesimus Siti Hajar Othman Siti Nurmaini Sri Arttini Dwi Prasetyawati Sri Desy Siswanti Susanto Susanto Susanto Susanto Susanto, Susanto Sutarno Sutarno Syakurah, Rizma Adlia Syamsul Arifin, M. Agus tasmi salim Tasmi Salim Tole Sutikno Wan Isni Sofiah Wan Din Yaya Sudarya Triana Yazid Idris, Mohd. Yazid Idris, Mohd. Yesi Novaria Kunang Yoga Yuniadi Yudho Suprapto, Bhakti Yundari, Yundari Zulhipni Reno Saputra Els