Claim Missing Document
Check
Articles

Found 5 Documents
Search
Journal : TELKOMNIKA (Telecommunication Computing Electronics and Control)

Fortifying Big Data infrastructures to Face Security and Privacy Issues Tole Sutikno; Deris Stiawan; Imam Much Ibnu Subroto
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 4: December 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i4.957

Abstract

The explosion of data available on the internet is very increasing in recent years. One of the most challenging issues is how to effectively manage such a large amount of data and identify new ways to analyze large amounts of data and unlock information. Organizations must find a way to manage their data in accordance with all relevant privacy regulations without making the data inaccessible and unusable. Cloud Security Alliance (CSA) has released that the top 10 challenges, which are as follows: 1) secure computations in distributed programming frameworks, 2) security best practices for non-relational data stores, 3) secure data storage and transactions logs, 4) end-point input validation/filtering, 5) real-time security monitoring, 6) scalable and composable privacy-preserving data mining and analytics, 7) cryptographically enforced data centric security, 8) granular access control, 9) granular audits, 10) data Provenance. The challenges themselves can be organized into four distinct aspects of the Big Data ecosystem.
Deep learning with focal loss approach for attacks classification Yesi Novaria Kunang; Siti Nurmaini; Deris Stiawan; Bhakti Yudho Suprapto
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.18772

Abstract

The rapid development of deep learning improves the detection and classification of attacks on intrusion detection systems. However, the unbalanced data issue increases the complexity of the architecture model. This study proposes a novel deep learning model to overcome the problem of classifying multi-class attacks. The deep learning model consists of two stages. The pre-tuning stage uses automatic feature extraction with a deep autoencoder. The second stage is fine-tuning using deep neural network classifiers with fully connected layers. To reduce imbalanced class data, the feature extraction was implemented using the deep autoencoder and improved focal loss function in the classifier. The model was evaluated using 3 loss functions, including cross-entropy, weighted cross-entropy, and focal losses. The results could correct the class imbalance in deep learning-based classifications. Attack classification was achieved using automatic extraction with the focal loss on the CSE-CIC-IDS2018 dataset is a high-quality classifier with 98.38% precision, 98.27% sensitivity, and 99.82% specificity.
The Architecture of Indonesian Publication Index: A Major Indonesian Academic Database Imam Much Ibnu Subroto; Tole Sutikno; Deris Stiawan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 1: March 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i1.15

Abstract

Journal articles are required all researchers as references to improve the quality of research so that the results are better than existing studies. The presence of many journal indexers that collect articles from many publishers and repositories are very helpful to lecturers and researchers to locate articles in their specific areas of interest. The main issues in the indexing include: (i) the selection and collection process articles data, (ii) the management of indexing based on source and relevance of science (iii) the accuracy and speed of the search process, and (iv) the relationship between the articles each other called citation. The desirable by readers from the indexer is to get relevant and good-quality articles easily and accurately. While the interest of the journal managers is to supply their article which reader preferred then hope many cited to their journals. This is where the position of an indexer to bridge publisher and reader. This paper presents the architecture of Indonesian Publications Index (IPI) as the bridge. This architecture is designed with three layers. The layers are the data collection layer, storage layer, and service layer. The functionality of the first layer is IPI collaboration with publishers, the second layer is the index management system, the third layer is a service to the readers. Service layer built on a variety of applications such as web based applications, mobile applications and e-library.
Attack and Vulnerability Penetration Testing: FreeBSD Deris Stiawan; Mohd. Yazid Idris; Abdul Hanan Abdullah
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 2: June 2013
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v11i2.942

Abstract

 Computer system security has become a major concern over the past few years. Attacks, threats or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM) data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.
An Introduction to Journal Phishings and Their Detection Approach Mehdi Dadkhah; Tole Sutikno; Mohammad Davarpanah Jazi; Deris Stiawan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i2.1436

Abstract

Nowadays, the most important risk and challenge in online system are online scam and phishing attacks. Phishing attacks have been always used to steal important information of users. In this kind of scam, attacker direct victim to fake pages using social engineering techniques, then, starts stealing users` important information such as passwords. In order to confronting these attacks, numerous techniques have been invented which have the ability to confront different kinds of these attacks. Our goal in this paper is to introducing new kind of phishing attacks which are not identifiable by techniques and methods which have been invented to confronting phishing attacks. Unlike other kinds of phishing attacks which target all kinds of users, researchers are the victims of these kinds of journal phishing attacks. Finally, we`ll introduce an approach based on classification algorithms to identify these kind of journal phishing attacks and then we`ll check our suggested approach in error rate.
Co-Authors Abd Rahim, Mohd Rozaini Abdiansah, Abdiansah Abdul Hadi Fikri Abdul Hanan Abdullah Abdul Harris Adi Hermansyah, Adi Adi Sutrisman Aditya Putra Perdana Prasetyo Aditya Putra Perdana Prasetyo Adji Pratomo Agung Juli Anda Agus Eko Minarno Ahmad Fali Oklilas Ahmad Firdaus Ahmad Ghiffari Ahmad Heryanto Ahmad Heryanto Ahmad Heryanto Ahmad Heryanto, Ahmad Ahmad Zarkasi Ahmad Zarkasi Albertus Edward Mintaria Ali Bardadi Ali Firdaus Alshaflut, Ahmed Anto Saputra, Iwan Pahendra Bedine Kerim Bedine Kerim Bhakti Yudho Suprapto Bhakti Yudho Suprapto Bhakti Yudho Suprapto Bin Idris, Mohd Yazid Cahyani, Nyimas Sabilina Darmawijoyo, Darmawijoyo Dasuki, Massolehin Dedy Hermanto Desak Putu Dewi Kasih Dewi Bunga Dian Palupi Rini Dwi Budi Santoso Edi Surya Negara Eko Arip Winanto Endang Lestari Ruskan Ermatita - Erwin, Erwin Fachrudin Abdau Fakhrurroja, Hanif Ferdiansyah Ferdiansyah Fikri, Abdul Hadi Firdaus Firdaus Firdaus, Firdaus Firnando, Rici Firsandaya Malik, Reza Gonewaje gonewaje Habibullah, Nik Mohd Hadipurnawan Satria Harris, Abdul Huda Ubaya Huda Ubaya Huda Ubaya I Gede Yusa Idris, Mohd. Yazid Idris, Mohd. Yazid Imam Much Ibnu Subroto Indradewa, Rhian Iswari, Rosada Dwi John Arthur Jupin Juli Rejito Kemahyanto Exaudi Kurniabudi, Kurniabudi Latius Hermawan Lelyzar Siregar Lina Handayani M. Miftakul Amin M. Ridwan Zalbina Majzoob K. Omer Makmum Raharjo Mardhiyah, Sayang Ajeng Marisya Pratiwi Marita, Raini Massolehin Dasuki Mehdi Dadkhah Meilinda Meilinda Meilinda, Meilinda Mintaria, Albertus Edward Mohamed S. Adrees Mohamed Shenify Mohammad Davarpanah Jazi Mohammed Y. Alzahrani Mohd Arfian Ismail Mohd Azam Osman Mohd Faizal Ab Razak Mohd Rozaini Abd Rahim Mohd Saberi Mohamad Mohd Yazid bin Idris Mohd Yazid Bin Idris Mohd Yazid Idris Mohd Yazid Idris Mohd. Yazid Idris Mohd. Yazid Idris Mohd. Yazid Idris Muhammad Afif MUHAMMAD FAHMI Muhammad Fahmi Muhammad Fermi Pasha Muhammad Qurhanul Rizqie Muhammad Sulkhan Nurfatih Munawar A Riyadi Munawar Agus Riyadi Naufal Semendawai, Jaka Negara, Edi Surya Ni Ketut Supasti Dharmawan Nik Mohd Habibullah Nur Sholihah Zaini Nuzulastri, Sari Osama E. Sheta Osman, Mohd Azam Osvari Arsalan Pahendra, Iwan Permana, Dendi Renaldo Pertiwi, Hanna Prabowo, Christian Purnama, Benni Putra Perdana Prasetyo, Aditya Rahmat Budiarto Rahmat Budiarto Rahmat Budiarto Rahmat Budiarto Rahmat Budiarto Rahmat Budiarto Raja Zahilah Md Radzi Ramayanti, Indri Ramayanti, Indri Reza Firsandaya Malik Reza Maulana Riyadi, Munawar A Rizki Kurniati Rizma Adlia Syakurah Rizqie, Muhammad Qurhanul Rossi Passarella Samsuryadi Samsuryadi Saparudin Saparudin Saparudin, Saparudin Saputra, Muhammad Ajran Sari Sandra Sarmayanta Sembiring Sarmayanta Sembiring Sasut A Valianta Sasut Analar Valianta Semendawai, Jaka Naufal Shahreen Kasim Sharipuddin, Sharipuddin Sidabutar, Alex Onesimus Siti Hajar Othman Siti Nurmaini Sri Arttini Dwi Prasetyawati Sri Desy Siswanti Susanto Susanto Susanto Susanto Susanto, Susanto Sutarno Sutarno Syakurah, Rizma Adlia Syamsul Arifin, M. Agus tasmi salim Tasmi Salim Tole Sutikno Wan Isni Sofiah Wan Din Yaya Sudarya Triana Yazid Idris, Mohd. Yazid Idris, Mohd. Yesi Novaria Kunang Yoga Yuniadi Yudho Suprapto, Bhakti Yundari, Yundari Zulhipni Reno Saputra Els