Claim Missing Document
Check
Articles

Found 2 Documents
Search

MENINGKATKAN KEAMANAN EDGE COMPUTING DAN IOT DENGAN UBUNTU DARI ANCAMAN REAL-TIME Rakhmadi Rahman; Zulfattah, Abdul Khaliq; Haslinda Haslinda
Jurnal Riset Sistem Informasi Vol. 1 No. 4 (2024): Oktober : Jurnal Riset Sistem Informasi
Publisher : CV. Denasya Smart Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69714/kw984551

Abstract

Using edge computing technology, this research aims to develop an Internet of Things (IoT) system that can detect and resolve phishing attacks in real-time. The system enhances cybersecurity by focusing on rapid detection and response to increasingly sophisticated and frequent phishing attacks. It collects and processes data from various sources, including emails, text messages, and network activity logs of IoT devices, enabling more accurate analysis and detection of different types of phishing attacks. The developed phishing detection model demonstrates high performance with 95% accuracy, 93% precision, 94% recall, and an f1-score exceeding 93.5%. Edge computing allows for local data processing, reducing latency and accelerating threat response. This approach also enhances security by eliminating the need to transmit data to a central server, thus minimizing data breach risks during transmission. The system is well-integrated, using secure communication protocols and implementing Zero Trust principles to ensure maximum security at every layer. High-load simulations demonstrate the system's scalability and resilience, proving its ability to handle large data volumes and simultaneous attacks. Ubuntu Core was chosen as the operating system due to its high security and efficiency, crucial for running IoT devices with limited computing resources. The study also emphasizes the importance of increasing user awareness of phishing threats through automated detection and continuous education, creating a holistic approach to phishing risk mitigation. By combining IoT, edge computing, and machine learning technologies, this research contributes significantly to developing effective and efficient cybersecurity solutions to address evolving phishing threats. The findings pave the way for implementing more robust and responsive security systems in an increasingly connected digital era.
IMPLEMENTATION OF FEATURE IMPORTANCE XGBOOST ALGORITHM TO DETERMINE THE ACTIVE COMPOUNDS OF SEMBUNG LEAVES (BLUMEA BALSAMIFERA) Kusnaeni, Kusnaeni; Adhalia, Nurul Fuady; Zulfattah, Abdul Khaliq
BAREKENG: Jurnal Ilmu Matematika dan Terapan Vol 19 No 1 (2025): BAREKENG: Journal of Mathematics and Its Application
Publisher : PATTIMURA UNIVERSITY

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30598/barekengvol19iss1pp675-686

Abstract

Sembung is a medicinal plant native to Indonesia that grows optimally in tropical climates. The secondary metabolite compounds found in the leaves of sembung are biopharmaceutical active ingredients. Fourier Transform Infrared (FTIR) spectroscopy can identify the functional compounds in sembung leaves by analyzing unique peaks in the spectrum, which correspond to specific functional groups of the compounds. In this research, 35 observations were made with 1,866 explanatory variables (wavelengths). Data in which the number of explanatory variables surpasses the number of observations is known as high-dimensional data. One method that can handle high-dimensional problems is to select important variables that affect the objective variable. The XGBoost algorithm can calculate the feature importance score that affects the goal variable so that it does not have to include all variables in the modeling, this can overcome problems in high-dimensional data. The results of the calculation of feature importance found Lignin Skeletal Band, CH, and CH2 aliphatic Stretching Group, C=C, C=N, C–H in ring structure, DNA and RNA backbones, NH2 Aminoacidic Group, C=O Ester Fatty Acid that the active compounds contained in the leaves of sembung.