Claim Missing Document
Check
Articles

Sistem Deteksi HTTP menggunakan HTTP Inspect Preprocessor and Rule Options M. Ridwan Zalbina; Deris Stiawan
Annual Research Seminar (ARS) Vol 1, No 1 (2015)
Publisher : Annual Research Seminar (ARS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Penelitian ini membahas mengenai Web Application atau HTTP Attack Detection System dengan memanfaatkan Network Intrusion Detection System untuk mendeteksi aktivitas mencurigakan pada sistem realtime traffic. Salah satu yang dapat digunakan pada penelitian ini adalah Snort, dengan kemampuan dan modularitas pada Preprocessor dan Detection Engine seperti HTTP Inspect Preprocessor dan Rule Options yang dimanfaatkan sebagai bagian dari metode penelitian. Sebagai sistem berbasis Knowledge NIDS, Snort dapat digunakan untuk mendeteksi beberapa jenis serangan seperti XSS dan SQL Injection. Alert yang muncul di klasifikasi berdasarkan request dan content serangan. Hasil dari penelitian berupa, jumlah alert yang terdeteksi, network traffic, kemudian evaluasi dari hasil pengujian dengan confusion matrix.
Review of the machine learning methods in the classification of phishing attack John Arthur Jupin; Tole Sutikno; Mohd Arfian Ismail; Mohd Saberi Mohamad; Shahreen Kasim; Deris Stiawan
Bulletin of Electrical Engineering and Informatics Vol 8, No 4: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (723.905 KB) | DOI: 10.11591/eei.v8i4.1344

Abstract

The development of computer networks today has increased rapidly. This can be seen based on the trend of computer users around the world, whereby they need to connect their computer to the Internet. This shows that the use of Internet networks is very important, whether for work purposes or access to social media accounts. However, in widely using this computer network, the privacy of computer users is in danger, especially for computer users who do not install security systems in their computer. This problem will allow hackers to hack and commit network attacks. This is very dangerous, especially for Internet users because hackers can steal confidential information such as bank login account or social media login account. The attacks that can be made include phishing attacks. The goal of this study is to review the types of phishing attacks and current methods used in preventing them. Based on the literature, the machine learning method is widely used to prevent phishing attacks. There are several algorithms that can be used in the machine learning method to prevent these attacks. This study focused on an algorithm that was thoroughly made and the methods in implementing this algorithm are discussed in detail.
IoT Smart Device for e-Learning Content Sharing on Hybrid Cloud Environment Mohd. Yazid Idris; Deris Stiawan; Nik Mohd Habibullah; Abdul Hadi Fikri; Mohd Rozaini Abd Rahim; Massolehin Dasuki
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (697.409 KB) | DOI: 10.11591/eecsi.v4.978

Abstract

Centralized e-Learning technology has dominated the learning ecosystem that brings a lot of potential usage on media rich learning materials. However, the centralized architecture has their own constraint to support large number of users for accessing large size of learning contents. On the other hand, Content Delivery Network (CDN) solution which relies on distributed architecture provides an alternative solution to eliminate  bottleneck  access.  Although  CDN  is   an  effective solution, the implementation of technology is expensive and has less impact for student who lives in limited or non-existence internet access in geographical area. In this paper, we introduce an IoT smart device to provide e-Learning access for content sharing on hybrid cloud environment with distributed peer-to- peer communication solution for data synchronization and updates. The IoT smart device acts as an intermediate device between user and cloud services, and provides content sharing solution without fully depending on the cloud server.
IAES International Conference on Electrical Engineering, Computer Science and Informatics Munawar A Riyadi; Sri Arttini Dwi Prasetyowati; Tole Sutikno; Deris Stiawan
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 3: EECSI 2016
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (314.65 KB) | DOI: 10.11591/eecsi.v3.1106

Abstract

The 3rd International Conference of Electrical Engineering, Computer Science and Informatics (EECSI) 2016 was held in Semarang, Indonesia from 23th to 25thNovember, 2016. The conference was organized by Universitas Islam Sultan Agung as the host in collaboration with Universitas Diponegoro, Universitas Ahmad Dahlan and Universitas Sriwijaya, and with full technical support from IAES Indonesia Section. Authors and participants from 10 countries made the conference truly international in scope. Participants have delivered their talks of valuable research outputs that vary from many fields of electrical engineering (power electronics, telecommunication, electronics engineering, control system and signal processing) to the field of computer science and informatics. These wide range of topics have colorized this conference.This volume of IOP Conference Series: Materials Science and Engineering contains selected articles from those presented in the conference. After presentation, the revised papers were peer reviewed by fellow reviewers to ensure the quality of published materials. Finally, Editors decided to select and publish as many as 49 papers. It is hoped that the presented papers can offer more insight towards broad audience.On behalf of Editors, we appreciate enormous work of all staffs and reviewers in the preparation of this volume. We would like to express our sincere thanks to all authors and presenters for their valuable contributions. We hope to see you again in the next event of EECSI 2017 which will be held in Yogyakarta, Indonesia, next year.
Information Framework of Pervasive Real Time Monitoring System: Case of Peat Land Forest Fires and Air Quality in South Sumatera, Indonesia Siti Nurmaini; Reza Firsandaya Malik; Deris Stiawan; Firdaus Firdaus; Saparudin Saparudin
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 3: EECSI 2016
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (716.552 KB) | DOI: 10.11591/eecsi.v3.1163

Abstract

The information framework aims to holistically address the problems and issues posed by unwanted peat and land fires within the context of the natural environment and socio-economic systems. Informed decisions on planning and allocation of resources can only be made by understanding the landscape. Therefore, information on fire history and air quality impacts must be collected for future analysis. This paper proposes strategic framework based on technology approach with data fusion strategy to produce the data analysis about peat land fires and air quality management in in South Sumatera. The research framework should use the knowledge, experience and data from the previous fire seasons to review, improve and refine the strategies and monitor their effectiveness for the next fire season. Communicating effectively with communities and the public and private sectors in remote and rural landscapes is important, by using smartphones and mobile applications. Tools such as one-stop information based on web applications, to obtain information such as early warning to send and receive fire alerts, could be developed and promoted so that all stakeholders can share important information with each other.
IoT Botnet Malware Classification Using Weka Tool and Scikit-learn Machine Learning Susanto Susanto; Deris Stiawan; M. Agus Syamsul Arifin; Mohd. Yazid Idris; Rahmat Budiarto
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 7, No 1: EECSI 2020
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v7.2080

Abstract

Botnet is one of the threats to internet network security-Botmaster in carrying out attacks on the network by relying on communication on network traffic. Internet of Things (IoT) network infrastructure consists of devices that are inexpensive, low-power, always-on, always connected to the network, and are inconspicuous and have ubiquity and inconspicuousness characteristics so that these characteristics make IoT devices an attractive target for botnet malware attacks. In identifying whether packet traffic is a malware attack or not, one can use machine learning classification methods. By using Weka and Scikit-learn analysis tools machine learning, this paper implements four machine learning algorithms, i.e.: AdaBoost, Decision Tree, Random Forest, and Naïve Bayes. Then experiments are conducted to measure the performance of the four algorithms in terms of accuracy, execution time, and false positive rate (FPR). Experiment results show that the Weka tool provides more accurate and efficient classification methods. However, in false positive rate, the use of Scikit-learn provides better results.
Features Extraction on IoT Intrusion Detection System Using Principal Components Analysis (PCA) Sharipuddin Sharipuddin; Benni Purnama; Kurniabudi Kurniabudi; Eko Arip Winanto; Deris Stiawan; Darmawijoyo Hanapi; Mohd. Yazid Idris; Rahmat Budiarto
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 7, No 1: EECSI 2020
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v7.2098

Abstract

There are several ways to increase detection accuracy result on the intrusion detection systems (IDS), one way is feature extraction. The existing original features are filtered and then converted into features with lower dimension. This paper uses the Principal Components Analysis (PCA) for features extraction on intrusion detection system with the aim to improve the accuracy and precision of the detection. The impact of features extraction to attack detection was examined. Experiments on a network traffic dataset created from an Internet of Thing (IoT) testbed network topology were conducted and the results show that the accuracy of the detection reaches 100 percent.
Improving the Anomaly Detection by Combining PSO Search Methods and J48 Algorithm Kurniabudi Kurniabudi; Abdul Harris; Albertus Edward Mintaria; Darmawijoyo Hanapi; Deris Stiawan; Mohd. Yazid Idris; Rahmat Budiarto
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 7, No 1: EECSI 2020
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v7.2099

Abstract

The feature selection techniques are used to find the most important and relevant features in a dataset. Therefore, in this study feature selection technique was used to improve the performance of Anomaly Detection. Many feature selection techniques have been developed and implemented on the NSL-KDD dataset. However, with the rapid growth of traffic on a network where more applications, devices, and protocols participate, the traffic data is complex and heterogeneous contribute to security issues. This makes the NSL-KDD dataset no longer reliable for it. The detection model must also be able to recognize the type of novel attack on complex network datasets. So, a robust analysis technique for a more complex and larger dataset is required, to overcome the increase of security issues in a big data network. This study proposes particle swarm optimization (PSO) Search methods as a feature selection method. As contribute to feature analysis knowledge, In the experiment a combination of particle swarm optimization (PSO) Search methods with other search methods are examined. To overcome the limitation NSL-KDD dataset, in the experiments the CICIDS2017 dataset used. To validate the selected features from the proposed technique J48 classification algorithm used in this study. The detection performance of the combination PSO Search method with J48 examined and compare with other feature selection and previous study. The proposed technique successfully finds the important features of the dataset, which improve detection performance with 99.89% accuracy. Compared with the previous study the proposed technique has better accuracy, TPR, and FPR.
Cross-Site Scripting Attack Detection using Rule-Based Signature deris Stiawan; Gonewaje gonewaje; Ahmad Heryanto; Rahmat Budiarto
Sriwijaya Journal of Informatics and Applications Vol 2, No 1 (2021)
Publisher : Fakultas Ilmu Komputer Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36706/sjia.v2i1.20

Abstract

Rule-Based Signature or also known as Misuse Detection is IDS which rely on matching data captured on retrieval of attack pattern which in system that allow attacks. If the attack activity detected according to existing signature, then it will be read by system and called as attack. The advantage of this Signature-Based IDS is the accuracy of detecting matched attack which in the system with low false-positive result and high true-positive. Cross-Site Scripting is type of attack which is perform by injecting code (usually) JavaScript to a site. XSS is very often utilized by attacker to steal web browser resource such as cookie, credentials, etc. Dataset which used in this research is dataset which created by injecting script into a website. Once obtained the dataset, then feature extraction is performed to separate the attribute which used. XSS attack pattern can be easily recognized from URI, and then detected using engine which has been created. Detection result of algorithm which used is evaluated using confusion matrix to determine detection accuracy value which performed. Obtained accuracy detection of research result reached 99.4% with TPR 98.8% and FPR 0%.
Optimalisasi Interkoneksi VPN Menggunakan Hardware Based dan Iix (Indonesia Internet Exchange) Sebagai Alternatif Jaringan Skala Luas (WAN) Deris Stiawan; Dian Palupi Rini
Generic Vol 4 No 1 (2009): Vol 4, No 1 (2009)
Publisher : Fakultas Ilmu Komputer, Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Virtual Private Network (VPN) salah satu solusi yang bisa digunakan untuk interkoneksi jaringan skala luas (WAN), saat ini banyak para provider telcom menawarkan solusi VPN sebagai komunikasi data perusahaan bisnis untuk interkoneksi ke kantor-kantor cabangnya. Indonesia Internet Exchange (IIX) yang menginterkoneksikan semua penyedia jasa internet (ISP) di Indonesia dalam satu jaringan yang terpusat secara lokal. Solusi interkoneksi VPN dapat menggunakan hardware based yang mempunyai kelebihan dibandingkan software based. Solusi VPN dan penggunaan Interkoneksi IIX dapat menjawab interkoneksi secara lokal ke jaringan intranet dengan aman namun melalui jaringan yang bisa diakses dengan mudah dan murah seperti jaringan Internet. IIX lebih murah dan bisa dioptimalkan pengelamatan routingnya selama digunakan untuk diwilayah layanan Indonesia. IIX akan memperpendek lompatan paket data, memperkecil latency waktu, dan meningkatkan penggunaan traffic content di Indonesia.
Co-Authors Abd Rahim, Mohd Rozaini Abdiansah, Abdiansah Abdul Hadi Fikri Abdul Hanan Abdullah Abdul Harris Adi Hermansyah, Adi Adi Sutrisman Aditya Putra Perdana Prasetyo Aditya Putra Perdana Prasetyo Adji Pratomo Agung Juli Anda Agus Eko Minarno Ahmad Fali Oklilas Ahmad Firdaus Ahmad Ghiffari Ahmad Heryanto Ahmad Heryanto Ahmad Heryanto Ahmad Heryanto, Ahmad Ahmad Zarkasi Ahmad Zarkasi Albertus Edward Mintaria Ali Bardadi Ali Firdaus Alshaflut, Ahmed Anto Saputra, Iwan Pahendra Bedine Kerim Bedine Kerim Bhakti Yudho Suprapto Bhakti Yudho Suprapto Bhakti Yudho Suprapto Bin Idris, Mohd Yazid Cahyani, Nyimas Sabilina Darmawijoyo, Darmawijoyo Dasuki, Massolehin Dedy Hermanto Desak Putu Dewi Kasih Dewi Bunga Dian Palupi Rini Dwi Budi Santoso Edi Surya Negara Eko Arip Winanto Endang Lestari Ruskan Ermatita - Erwin, Erwin Fachrudin Abdau Fakhrurroja, Hanif Ferdiansyah Ferdiansyah Fikri, Abdul Hadi Firdaus Firdaus Firdaus, Firdaus Firnando, Rici Firsandaya Malik, Reza Gonewaje gonewaje Habibullah, Nik Mohd Hadipurnawan Satria Harris, Abdul Huda Ubaya Huda Ubaya Huda Ubaya I Gede Yusa Idris, Mohd. Yazid Idris, Mohd. Yazid Imam Much Ibnu Subroto Indradewa, Rhian Iswari, Rosada Dwi John Arthur Jupin Juli Rejito Kemahyanto Exaudi Kurniabudi, Kurniabudi Latius Hermawan Lelyzar Siregar Lina Handayani M. Miftakul Amin M. Ridwan Zalbina Majzoob K. Omer Makmum Raharjo Mardhiyah, Sayang Ajeng Marisya Pratiwi Marita, Raini Massolehin Dasuki Mehdi Dadkhah Meilinda Meilinda Meilinda, Meilinda Mintaria, Albertus Edward Mohamed S. Adrees Mohamed Shenify Mohammad Davarpanah Jazi Mohammed Y. Alzahrani Mohd Arfian Ismail Mohd Azam Osman Mohd Faizal Ab Razak Mohd Rozaini Abd Rahim Mohd Saberi Mohamad Mohd Yazid bin Idris Mohd Yazid Bin Idris Mohd Yazid Idris Mohd Yazid Idris Mohd. Yazid Idris Mohd. Yazid Idris Mohd. Yazid Idris Muhammad Afif Muhammad Fahmi MUHAMMAD FAHMI Muhammad Fermi Pasha Muhammad Qurhanul Rizqie Muhammad Sulkhan Nurfatih Munawar A Riyadi Munawar Agus Riyadi Naufal Semendawai, Jaka Negara, Edi Surya Ni Ketut Supasti Dharmawan Nik Mohd Habibullah Nur Sholihah Zaini Nuzulastri, Sari Osama E. Sheta Osman, Mohd Azam Osvari Arsalan Pahendra, Iwan Permana, Dendi Renaldo Pertiwi, Hanna Prabowo, Christian Purnama, Benni Putra Perdana Prasetyo, Aditya Rahmat Budiarto Rahmat Budiarto Rahmat Budiarto Rahmat Budiarto Rahmat Budiarto Rahmat Budiarto Raja Zahilah Md Radzi Ramayanti, Indri Ramayanti, Indri Reza Firsandaya Malik Reza Maulana Riyadi, Munawar A Rizki Kurniati Rizma Adlia Syakurah Rizqie, Muhammad Qurhanul Rossi Passarella Samsuryadi Samsuryadi Saparudin Saparudin Saparudin, Saparudin Saputra, Muhammad Ajran Sari Sandra Sarmayanta Sembiring Sarmayanta Sembiring Sasut A Valianta Sasut Analar Valianta Semendawai, Jaka Naufal Shahreen Kasim Sharipuddin, Sharipuddin Sidabutar, Alex Onesimus Siti Hajar Othman Siti Nurmaini Sri Arttini Dwi Prasetyawati Sri Desy Siswanti Susanto Susanto Susanto Susanto Susanto, Susanto Sutarno Sutarno Syakurah, Rizma Adlia Syamsul Arifin, M. Agus tasmi salim Tasmi Salim Tole Sutikno Wan Isni Sofiah Wan Din Yaya Sudarya Triana Yazid Idris, Mohd. Yazid Idris, Mohd. Yesi Novaria Kunang Yoga Yuniadi Yudho Suprapto, Bhakti Yundari, Yundari Zulhipni Reno Saputra Els