Claim Missing Document
Check
Articles

Found 5 Documents
Search

Konsep Pendidikan Akhlak Perspektif Hadratus-Syaikh KH. Muhammad Hasyim Asy’ari Mukhlishah, Ulfatul; Faiz, Muhammad Nur; Jumari, Jumari
JURNAL LENTERA : Kajian Keagamaan, Keilmuan dan Teknologi Vol 22 No 2 (2023): September 2023
Publisher : LP2M STAI Miftahul 'Ula (STAIM) Nganjuk

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29138/lentera.v22i2.1254

Abstract

The goal of moral education in Islam is to develop positive traits in humans so that their morality will develop, so that they are always open to doing good and able to distance themselves from all forms of evil. Thus, a person can become a human being who has good morals and is responsible. Meanwhile, according to the concept of Hadratus-Shaykh KH. Hasyim Asy'ari in the book Adabul Alim Wal Muta'alim has provided an educational treatise that talks a lot about the moral education of teachers and students so that in the book we can understand and know in depth about the content of moral education properly. And he also colored education in Indonesia and among Islamic boarding schools. This research is a library research (Library Research) which is included in qualitative research. Data was collected through primary and secondary data sources after which the data was analyzed using a descriptive approach. This study states that in the book Adabul Alim wal Muta'alim, moral education is thoroughly integrated into the learning process. KH. Hasyim Asy'ari emphasized the importance of being calm and gentle for a teacher in interacting with his students. Likewise, students are expected to have morals that sincerely respect their teachers. In the context of learning, morality for students means always prioritizing learning by starting from the most important things to the depth of the discussion. The moral relationship between teacher and student actually reflects mutual respect and trust, which is built on awareness and respect between the two during the learning process. Ethics in interacting between teachers and students is considered as a real form of obedience to Allah and His Messenger. All of this shows that the harmonious relationship between the two parties cannot be separated from the spiritual values that are upheld in Islamic teachings
Perbandingan Pendekatan Machine Learning untuk Mendeteksi Serangan DDoS pada Jaringan Komputer Sari, Laura; Faiz, Muhammad Nur; Muhammad, Arif Wirawan
Infotekmesin Vol 16 No 1 (2025): Infotekmesin: Januari 2025
Publisher : P3M Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35970/infotekmesin.v16i1.2556

Abstract

Distributed Denial of Service (DDoS) attacks are a serious threat to computer network security. This study offers a comprehensive evaluation by considering accuracy, detection time, and model complexity in simulation scenarios. Using the CICDDoS2019 dataset, which includes modern attack variations and complete features, this research compares the effectiveness of Naïve Bayes (NB), Random Forest (RF), and Decision Tree (DT) algorithms in detecting DDoS attacks. The results show that RF achieves the highest accuracy (99.95%), while DT excels in recall (99.83%). These findings provide a foundation for developing hybrid ML-DL models to enhance real-time attack detection. However, limitations such as using a single dataset and offline simulations restrict the generalizability of results to real-world network conditions. This study highlights opportunities for more comprehensive future research in real-world scenarios.
Classification of DDoS Attacks based on Network Traffic Patterns Using the k-Nearest Neighbor (k-NN) Algorithm Faiz, Muhammad Nur; Maharrani, Ratih Hafsarah; Sari, Laura; Muhammad, Arif Wirawan; Supriyono, Abdul Rohman
Journal of INISTA Vol 7 No 2 (2025): May 2025
Publisher : LPPM Institut Teknologi Telkom Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20895/inista.v7i2.1834

Abstract

Many server attacks disrupt industrial or business operations. Attacks that flood bandwidth with simultaneous requests can overwhelm a system, leading to significant downtime and financial losses. Additionally, breaches that compromise sensitive data can damage a company's reputation and erode customer trust. DDoS attacks, or Distributed Denial of Service attacks, are among the most common types of server attacks. DDoS has been proven to cause server downtime, and one effective way to mitigate this attack is to detect and classify it using a machine learning approach. The K-Nearest Neighbor (KNN) algorithm, a simple yet effective classification method based on similarity measures, is known for its high accuracy. The current research builds upon two stages: the feature extraction stage and the classification stage, with the ultimate goal of improving the accuracy of DDoS identification using the CICDDoS2019 dataset. Based on this premise, the detection accuracy can be improved by enhancing these two stages. At a value of k equal to 3, this study produces an accuracy of 99.73%.
Comparison Analysis of Cloning-Hashing Applications for Digital Evidence Security Faiz, Muhammad Nur
Infotekmesin Vol 14 No 2 (2023): Infotekmesin: Juli, 2023
Publisher : P3M Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35970/infotekmesin.v14i2.1844

Abstract

The development of the Internet has resulted in an increasing variety of cyber crimes. Cybercrime is closely related to digital evidence, so cybercriminals tend to delete, hide, and format all collected data to eliminate traces of digital evidence. This digital evidence is very vital in proving at trial, so it is necessary to develop applications to secure digital evidence. This study aims to compare the results of cloning and hashing in securing digital evidence and evaluate the performance of a digital forensic application developed under the name Clon-Hash Application v1 compared to applications commonly used by investigators including Autopsy, FTK Imager, md5.exe in terms of its function, the result, CPU usage. The results of the research conducted show that the cloning process is perfectly successful, as evidenced by the hash value results which are the same as paid applications and there are even several other applications that have not been able to display the hash value. Hash values in the Clon-Hash v1 application also vary from MD5, SHA1, and SHA256 which do not exist in other applications. Applications developed are better in terms of function, results, and CPU usage.
Perbandingan Pendekatan Machine Learning untuk Mendeteksi Serangan DDoS pada Jaringan Komputer Faiz, Muhammad Nur; Muhammad, Arif Wirawan; Sari, Laura
Infotekmesin Vol 16 No 1 (2025): Infotekmesin: Januari 2025
Publisher : P3M Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35970/infotekmesin.v16i1.2556

Abstract

Distributed Denial of Service (DDoS) attacks are a serious threat to computer network security. This study offers a comprehensive evaluation by considering accuracy, detection time, and model complexity in simulation scenarios. Using the CICDDoS2019 dataset, which includes modern attack variations and complete features, this research compares the effectiveness of Naïve Bayes (NB), Random Forest (RF), and Decision Tree (DT) algorithms in detecting DDoS attacks. The results show that RF achieves the highest accuracy (99.95%), while DT excels in recall (99.83%). These findings provide a foundation for developing hybrid ML-DL models to enhance real-time attack detection. However, limitations such as using a single dataset and offline simulations restrict the generalizability of results to real-world network conditions. This study highlights opportunities for more comprehensive future research in real-world scenarios.