Claim Missing Document
Check
Articles

Found 7 Documents
Search

Desain dan Implementasi Sistem Monitoring Jaringan Menggunakan Zabbix dan Telegram Malik, Prasetyo Fajar; Josaphat, Bony Parulian
Seminar Nasional Official Statistics Vol 2024 No 1 (2024): Seminar Nasional Official Statistics 2024
Publisher : Politeknik Statistika STIS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34123/semnasoffstat.v2024i1.2196

Abstract

The BPS Data Center requires an integrated monitoring system to ensure the integrity and accessibility of statistical data. Currently, the system is fragmented by device type and brand, lacking the ability to send real-time alerts to mobile devices. This research focuses on designing and implementing a monitoring system at the BPS Data Center. Furthermore, this research endeavors to forward alert from the monitoring system into mobile notifications. The study employs the Network Development Life Cycle (NDLC) methodology. From the results of the analysis using Pugh matrix, it was obtained that Zabbix was the selected monitoring application service and Telegram as the mobile application that utilizes the Bot feature to send notifications using webhook method. Based on the evaluation results from Black-box testing and SUS, it was found that overall, the system features were successfully tested with expected outputs, and the system interface received an “acceptable” rating from users.
Pembangunan Chatbot Sistem Informasi KBLI dan KBJI Berbasis LLM Anassai, Bayu Rayhan; Josaphat, Bony Parulian
Seminar Nasional Official Statistics Vol 2024 No 1 (2024): Seminar Nasional Official Statistics 2024
Publisher : Politeknik Statistika STIS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34123/semnasoffstat.v2024i1.2202

Abstract

The Central Statistics Agency (BPS) collects data through censuses and surveys to provide data to the government and the public. This data is obtained from questionnaires containing open and closed questions. One of the open questions asked is about the respondent's occupation, which will later be classified with the assignment of KBLI and KBJI codes. KBLI and KBJI are classifications used by BPS to classify economic activities. BPS uses the Sibaku Mobile application to facilitate officers in filling out KBLI and KBJI codes, but this application has shortcomings for new users. This research aims to develop a chatbot that can provide the correct KBLI/KBJI codes using Large Language Models (LLM). The chatbot development was carried out using the prototyping method. Evaluation of classification objectives showed accuracy, precision, recall, and F1-score values approaching 97%. The RAG robustness evaluation obtained a hallucination rate of 0% and an error rate of 7%. Usability testing showed a chatbot acceptance rate of 87.45%.
Machine Learning for Cybersecurity: Web Attack Detection (Brute Force, XSS, SQL Injection) Irfa’issurur, Muhammad; Josaphat, Bony Parulian
InPrime: Indonesian Journal of Pure and Applied Mathematics Vol 7, No 1 (2025)
Publisher : Department of Mathematics, Faculty of Sciences and Technology, UIN Syarif Hidayatullah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15408/inprime.v7i1.41025

Abstract

Security is a top priority in system development, as web portals serve as critical entry points that are frequently targeted by cyber-attacks. Common attack methods include SQL Injection, Cross-Site Scripting (XSS), and Brute Force. The application of machine learning in cybersecurity is growing due to its effectiveness in detecting such threats. This study employs supervised machine learning with six algorithms: K-Nearest Neighbors (KNN), Random Forest, Naïve Bayes, AdaBoost, LightGBM, and XGBoost. The research utilizes the CICIDS2017 and CSE-CICIDS2018 datasets, which contain network traffic data labeled with four categories: Benign, Brute Force, XSS, and SQL Injection. To address the dataset imbalance issue, this study applies Synthetic Minority Oversampling Technique (SMOTE) in conjunction with Principal Component Analysis (PCA) for dimensionality reduction. Performance evaluation is conducted using accuracy, precision, recall, and F1-score metrics, as well as K-Fold Cross Validation, AUC-ROC, and Learning Curve analysis. The results indicate that the Random Forest algorithm achieves the highest classification performance, with an accuracy of 97.77%, precision of 84.07%, recall of 91.96%, and an F1-score of 87.28%. This research contributes by demonstrating the applicability of machine learning in real-time web attack detection, highlighting the advantages of ensemble-based models in handling cybersecurity threats. Additionally, it underscores the importance of dataset preprocessing techniques in enhancing classification performance. Future improvements should focus on optimizing hyperparameters, integrating real-time network traffic analysis, and exploring hybrid models that combine traditional machine learning with deep learning approaches to further enhance detection capabilities.Keywords: Machine learning; Cybersecurity; Web attack detection; Random forest; SMOTE; PCA. Abstrak Keamanan merupakan prioritas utama dalam pengembangan sistem, karena portal web berfungsi sebagai titik masuk penting yang sering menjadi sasaran serangan siber. Metode serangan umum meliputi SQL Injection, Cross-Site Scripting (XSS), dan Brute Force. Penerapan machine learning dalam keamanan siber semakin berkembang karena efektivitasnya dalam mendeteksi ancaman tersebut. Studi ini menggunakan supervised machine learning dengan enam algoritma: K-Nearest Neighbors (KNN), Random Forest, Naïve Bayes, AdaBoost, LightGBM, dan XGBoost. Penelitian ini memanfaatkan kumpulan data CICIDS2017 dan CSE-CICIDS2018, yang berisi data lalu lintas jaringan yang diberi label dengan empat kategori: Benign, Brute Force, XSS, dan SQL Injection. Untuk mengatasi masalah ketidakseimbangan kumpulan data, studi ini menerapkan Synthetic Minority Oversampling Technique (SMOTE) bersama dengan Principal Component Analysis (PCA) untuk pengurangan dimensionalitas. Evaluasi kinerja dilakukan dengan menggunakan metrik akurasi, presisi, recall, dan skor F1, serta K-Fold Cross Validation, AUC-ROC, dan analisis Learning Curve. Hasilnya menunjukkan bahwa algoritma Random Forest mencapai kinerja klasifikasi tertinggi, dengan akurasi 97,77%, presisi 84,07%, recall 91,96%, dan skor F1 87,28%. Penelitian ini berkontribusi dengan menunjukkan penerapan machine learning dalam deteksi serangan web real-time, menyoroti keunggulan model berbasis ensemble dalam menangani ancaman keamanan siber. Selain itu, penelitian ini menggarisbawahi pentingnya teknik praproses dataset dalam meningkatkan kinerja klasifikasi. Peningkatan di masa mendatang harus difokuskan pada pengoptimalan hiperparameter, pengintegrasian analisis lalu lintas jaringan real-time, dan eksplorasi model hybrid yang menggabungkan machine learning tradisional dengan pendekatan deep learning untuk lebih meningkatkan kemampuan deteksi.Kata Kunci: Pembelajaran mesin; Keamanan siber; Deteksi serangan web; Random forest; SMOTE; PCA. 2020MSC: 68T05
Predicting Stock Price Using Convolutional Neural Network and Long Short Term Memory (Case Study: Stock of BBCA) Pangestika, Zubaidah; Josaphat, Bony Parulian
Journal of the Indonesian Mathematical Society Vol. 31 No. 1 (2025): MARCH
Publisher : IndoMS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22342/jims.v31i1.1512

Abstract

Stocks are capital market instruments capable of creating profits for investors. However, stocks have a fluctuating nature that can lead to risk, so price predictions are needed to reduce this risk. Stock price prediction can use various methods such as deep learning. This study aims to predict stock price using Convolution Neural Network (CNN) and Long Short Term Memory (LSTM), with the application carried out at the stock price of Bank Central Asia (BBCA) for the period between July 1, 2005 and December 30, 2022. Data division uses a ratio of 70% for training and 30% for testing. To maximize prediction results, we select the best hyperparameter combinations using Grid Search. The prediction results show that CNN is better to LSTM, where CNN produces RMSE values of 488.992, R2 83.8%, and MAPE 6.5%.
Machine Learning for Cybersecurity: Web Attack Detection (Brute Force, XSS, SQL Injection) Irfa’issurur, Muhammad; Josaphat, Bony Parulian
InPrime: Indonesian Journal of Pure and Applied Mathematics Vol. 7 No. 1 (2025)
Publisher : Department of Mathematics, Faculty of Sciences and Technology, UIN Syarif Hidayatullah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15408/inprime.v7i1.41025

Abstract

Security is a top priority in system development, as web portals serve as critical entry points that are frequently targeted by cyber-attacks. Common attack methods include SQL Injection, Cross-Site Scripting (XSS), and Brute Force. The application of machine learning in cybersecurity is growing due to its effectiveness in detecting such threats. This study employs supervised machine learning with six algorithms: K-Nearest Neighbors (KNN), Random Forest, Naïve Bayes, AdaBoost, LightGBM, and XGBoost. The research utilizes the CICIDS2017 and CSE-CICIDS2018 datasets, which contain network traffic data labeled with four categories: Benign, Brute Force, XSS, and SQL Injection. To address the dataset imbalance issue, this study applies Synthetic Minority Oversampling Technique (SMOTE) in conjunction with Principal Component Analysis (PCA) for dimensionality reduction. Performance evaluation is conducted using accuracy, precision, recall, and F1-score metrics, as well as K-Fold Cross Validation, AUC-ROC, and Learning Curve analysis. The results indicate that the Random Forest algorithm achieves the highest classification performance, with an accuracy of 97.77%, precision of 84.07%, recall of 91.96%, and an F1-score of 87.28%. This research contributes by demonstrating the applicability of machine learning in real-time web attack detection, highlighting the advantages of ensemble-based models in handling cybersecurity threats. Additionally, it underscores the importance of dataset preprocessing techniques in enhancing classification performance. Future improvements should focus on optimizing hyperparameters, integrating real-time network traffic analysis, and exploring hybrid models that combine traditional machine learning with deep learning approaches to further enhance detection capabilities.Keywords: machine learning; cybersecurity; web attack detection; random forest; SMOTE; PCA. Abstrak Keamanan merupakan prioritas utama dalam pengembangan sistem, karena portal web berfungsi sebagai titik masuk penting yang sering menjadi sasaran serangan siber. Metode serangan umum meliputi SQL Injection, Cross-Site Scripting (XSS), dan Brute Force. Penerapan machine learning dalam keamanan siber semakin berkembang karena efektivitasnya dalam mendeteksi ancaman tersebut. Studi ini menggunakan supervised machine learning dengan enam algoritma: K-Nearest Neighbors (KNN), Random Forest, Naïve Bayes, AdaBoost, LightGBM, dan XGBoost. Penelitian ini memanfaatkan kumpulan data CICIDS2017 dan CSE-CICIDS2018, yang berisi data lalu lintas jaringan yang diberi label dengan empat kategori: Benign, Brute Force, XSS, dan SQL Injection. Untuk mengatasi masalah ketidakseimbangan kumpulan data, studi ini menerapkan Synthetic Minority Oversampling Technique (SMOTE) bersama dengan Principal Component Analysis (PCA) untuk pengurangan dimensionalitas. Evaluasi kinerja dilakukan dengan menggunakan metrik akurasi, presisi, recall, dan skor F1, serta K-Fold Cross Validation, AUC-ROC, dan analisis Learning Curve. Hasilnya menunjukkan bahwa algoritma Random Forest mencapai kinerja klasifikasi tertinggi, dengan akurasi 97,77%, presisi 84,07%, recall 91,96%, dan skor F1 87,28%. Penelitian ini berkontribusi dengan menunjukkan penerapan machine learning dalam deteksi serangan web real-time, menyoroti keunggulan model berbasis ensemble dalam menangani ancaman keamanan siber. Selain itu, penelitian ini menggarisbawahi pentingnya teknik praproses dataset dalam meningkatkan kinerja klasifikasi. Peningkatan di masa mendatang harus difokuskan pada pengoptimalan hiperparameter, pengintegrasian analisis lalu lintas jaringan real-time, dan eksplorasi model hybrid yang menggabungkan machine learning tradisional dengan pendekatan deep learning untuk lebih meningkatkan kemampuan deteksi.Kata Kunci: pembelajaran mesin; keamanan siber; deteksi serangan web; random forest; SMOTE; PCA. 2020MSC: 68T05
Reducing Lending Risk: SVM Model Development with SMOTE for Unbalanced Credit Data Purba, Josya Ryan Alexandro; Muftikhali, Qilbaaini Effendi; Josaphat, Bony Parulian
International Journal on Information and Communication Technology (IJoICT) Vol. 9 No. 2 (2023): Vol.9 No. 2 Dec 2023
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21108/ijoict.v9i2.860

Abstract

Lending is an important activity for banks in managing available funds. However, lending is also an activity that has a high risk, because not all customers who borrow funds can fulfill the responsibilities of the existing agreement. Because of this, it is necessary to have a method that can predict creditworthiness to customers in order to minimize the risks that arise. This research uses machine learning method, namely Support Vector Machine (SVM) in predicting creditworthiness. This method is applied and compared before and after the Synthetic Minority Oversampling Technique (SMOTE) on historical bank credit data BPR NBP 16 Rantau Prapat, North Sumatra and find the best parameters with grid search. According to the results of the analysis based on Area Under the Receiver Operating Characteristic Curve (AUC-ROC), SVM with SMOTE shows better results, namely 96%, than SVM without SMOTE, namely 56%.
Forecasting Dependent Tail Value-at-Risk by ARMA-GJR-GARCH-Copula Method and Its Application in Energy Risk Josaphat, Bony Parulian
Journal of the Indonesian Mathematical Society VOLUME 29 NUMBER 3 (NOVEMBER 2023)
Publisher : IndoMS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22342/jims.29.3.1451.382-407

Abstract

One widely known risk measure is Tail Value-at-Risk (TVaR), which isthe average of the values of random risk that exceed the Value-at-Risk (VaR). Thisclassic risk measure of TVaR does not take into account the excess of another randomrisk (associated risk) that may have an effect on target risk. Copula function expresses a methodology that represents the dependence structure of random variablesand has been used to create a risk measure of Dependent Tail Value-at-Risk (DTVaR). Incorporating copula into the forecast function of the ARMA-GJR-GARCHmodel, this article argues a novel approach, called ARMA-GJR-GARCH-copulawith Monte Carlo method, to calculate the DTVaR of dependent energy risks. Thiswork shows an implementation of the ARMA-GJR-GARCH-copula model in forecasting the DTVaR of energy risks of NYH Gasoline and Heating oil associated withenergy risk of WTI Crude oil. The empirical results demonstrate that, the simplerGARCH-Clayton copula is better in forecasting DTVaR of Gasoline energy risk thanthe MA-GJR-GARCH-Clayton copula. On the other hand, the more complicatedMA-GJR-GARCH-Frank copula is better in forecasting DTVaR of Heating oil energy risk than the GARCH-Frank copula. In this context, energy sector marketplayers should invest in Heating oil because the DTVaR forecast of Heating oil ismore accurate than that of Gasoline.