Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : JOIN (Jurnal Online Informatika)

Analysis of the Combination of Naïve Bayes and MHR (Mean of Horner’s Rule) for Classification of Keystroke Dynamic Authentication Zamah Sari; Didih Rizki Chandranegara; Rahayu Nurul Khasanah; Hardianto Wibowo; Wildan Suharso
JOIN (Jurnal Online Informatika) Vol 7 No 1 (2022)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v7i1.839

Abstract

Keystroke Dynamics Authentication (KDA) is a technique used to recognize somebody dependent on typing pattern or typing rhythm in a system. Everyone's typing behavior is considered unique. One of the numerous approaches to secure private information is by utilizing a password. The development of technology is trailed by the human requirement for security concerning information and protection since hacker ability of information burglary has gotten further developed (hack the password). So that hackers can use this information for their benefit and can disadvantage others. Hence, for better security, for example, fingerprint, retina scan, et cetera are enthusiastically suggested. But these techniques are considered costly. The advantage of KDA is the user would not realize that the system is using KDA. Accordingly, we proposed the combination of Naïve Bayes and MHR (Mean of Horner’s Rule) to classify the individual as an attacker or a non-attacker. We use Naïve Bayes because it is better for classification and simple to implement than another. Furthermore, MHR is better for KDA if combined with the classification method which is based on previous research. This research showed that False Acceptance Rate (FAR) and Accuracy are improving than the previous research.
Malware Image Classification Using Deep Learning InceptionResNet-V2 and VGG-16 Method Didih Rizki Chandranegara; Jafar Shodiq Djawas; Faiq Azmi Nurfaizi; Zamah Sari
JOIN (Jurnal Online Informatika) Vol 8 No 1 (2023)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v8i1.1051

Abstract

Malware is intentionally designed to damage computers, servers, clients or computer networks. Malware is a general term used to describe any program designed to harm a computer or server. The goal is to commit a crime, such as gaining unauthorized access to a particular system, so as to compromise user security. Most malware still uses the same code to produce another different form of malware variants. Therefore, the ability to classify similar malware variant characteristics into malware families is a good strategy to stop malware. The research is useful for classifying malware on malware samples presented as bytemap grayscale images. The malware classification research focused on 25 malware classes with a total of 9,029 images from the Malimg dataset. This research implements the VGG-16 and InceptionResNet-V2 architectures by running 2 different scenarios, scenario 1 uses the original dataset and the other scenario uses the undersampled dataset. After building the model, each scenario will get an evaluation form such as accuracy, precision, recall, and f1-score. The highest score was obtained in scenario 2 on the VGG-16 method with a score of 94.8% and the lowest in scenario 2 on the InceptionResNet-V2 method with a score of 85.1%.
Co-Authors Abdul Munir Mulkhan Abdul Munir Mulkhan Achmad Irfani Nur Iman Ade Nurhidayat Nasution Adelya Daniyah Adhigana Priyatama Agung Wahyu Purnadi Agus Eko Agus Eko Minarno Ahmad Miftakh Akbi, Denar Regata Akhmad Yusuf F Akmal Muhammad Naim Aldyth Sugiharto Wijaya Ali Sofyan Kholimi Amellia Amanullah Sugiharto Aminudin Aminudin Andi Shafira Dyah Kurniasari Anggreani Tyas Sari Annisa Fitria Nurjannah Asty Try Yuliandari Aulia Ligar Salma Hanani Basuki, Setio Bayu Adhitia Wardana Bayu Yudha Purnomo Bella Chintia Merita Chandranegara, Didih Rizki Damayanti, Elok Dedi Purniawan Denar Regata Akbi Diah Ayu Fitriani Diah Risqiwati Didih Rizki Chandranegara Diyah Luthfi Anjani Faiq Azmi Nurfaizi Fakhrul Nasrulloh Faldo Fajri Afrinanto Fatimah Nursandi Febyola Noeraini Fengki Faradila Fitriani, Diah Ayu Gilang Permana Gita Indah Marthasari Gratiyo Wahyu Wahidin Hanafi Prasetyoko Hanum Shirotu Nida Hardianto Wibowo Heni Pujiastuti Hi Jamal, Agus Ilham Rahmana Syihad inung bagus prasetyo Jafar Shodiq Djawas Jalu Nusantoro L. Yasril Imam Lalu Rahmat Hidayat Lucky Nurfiqin Luqman Hakim Machammad Iqbal Putra Wardhana Mahar Faiqurahman Martin Fatnuriyah Masduqi, Mohammad Khairul Maskur Maskur Maskur Maskur Maskur, Maskur Melly Damara Chaniago Miftah Faisal Hamdani Miftakh, Ahmad Miftakhudin Kusuma Wijaya Moechammad Sarosa Moh. Badris Sholeh Rahmatullah Mohammad Khairul Masduqi Muchammad Zaidan Muchsin Bin jafar Al Hamid Muhamad Yamin Muhammad Aji Purnama Wibowo Muhammad Alfiannur Muhammad Bima Al Fayyadl Muhammad Iqbal Naufal Ilmi Muhammad Junus Ningsih Djamsi Norhabibah, Siti Nuryasin, Ilyas Puspita, Yeni Cania Qhistina Dyah Khatulistiwa Rahayu Nurul Khasanah Rahayu Puji Lestari Rahmat Renda Arya Santana Rendy Bramesta Kusumadewa Rino Nugroho Rohsih Hana Sundari Rustandi, Adi S, Vinna Rahmayanti S.B.P. Handhajani Sabrina Nurul Ubay Santana, Renda Arya Sari, Anggreani Tyas Setiawan Siti Norhabibah Sofyan Arifianto Suhari, Suhari Sumadi, Fauzi Dwi Setiawan Suratiningsih, Meity syaifuddin syaifuddin Syaifuddin Syaifuddin Syaifuddin Syaifuddin Toto Tohari Ubay, Sabrina Nurul Wahyu Andhyka Kusuma Wahyu Priyo Wicaksono Wana Salam Labibah Wicaksono, Galih Wasis Wildan Suharso Wildan Suharso Wisnu Bayu Ahadin Wisnu Gilang Pamungkas Wiyono, Briansyah Setio Yoga Pamungkas Yufis Azhar Yufiz Azhar Yundari, Yundari