Deris Stiawan
Sriwijaya University
The InternetOperating systemMachine learningData miningEngineeringFeature selectionArtificial intelligenceNetwork packetComputer networkIntrusion detection systemComputer securityDenial-of-service attackComputer scienceNaive Bayes classifierFeature extraction
141Publications
10H-index
247Citations
Publications 172
Newest
#2Deris StiawanH-Index: 10
Last. Huda UbayaH-Index: 4
view all 3 authors...
Email is a written communication tool commonly used in everyday life. The problem with e mail is spam. This study includes a machine learning approach, Support Vector Machine, which is used for spam classification on e-mail. Using two datasets, data that has not been vectorized and data that has been vectorized. For data that has not been vectorized, the first step taken is processing the text so that the data becomes numeric. After the data has been vectorized, the next step for these two data ...
#2Deris StiawanH-Index: 10
Last. Ahmad HeryantoH-Index: 3
view all 3 authors...
Serangan DNS Amplification merupakan serangan yang memanfaatkan Open DNS Server dimana attacker akan memanipulasi Query (permintaan) normal menjadi permintaan palsu,serangan ini akan membanjiri permintaan palsu ( False Query) dalam jumlah yang sangat banyak dengan tempo yang sangat cepat. Dalam penelitian ini di kelompokkan menjadi 3 jenis dataset sehingga mendapatkan dataset yang bersifat homogen. Selanjutnya dataset tersebut dilakukan data correction dengan meekstrasi dataset yang telah di dap...
#2Deris StiawanH-Index: 10
Last. Ahmad HeryantoH-Index: 3
view all 3 authors...
Fokus penelitian ini ialah pada deteksi serangan distribute denial of service (DDoS), dengan mengenali pola dari serangan distribute denial of service (DDoS) yang terjadi pada jaringan internet of things, jaringan internet of things yang dibangun dalam penelitian ini memiliki empat node dengan sensor pada setiap nodenya, dimana setiap sensor akan melakukan pembacaan data yang akan dikirim ke mesin Raspberry Pi yang berfungsi sebagai node agregator yang selanjutnya akan diforward ke mesin server ...
#1Nur Sholihah Zaini (Universiti Malaysia Pahang)H-Index: 1
#2Deris StiawanH-Index: 10
Last. Tole Sutikno (Universitas Ahmad Dahlan)H-Index: 17
view all 7 authors...
The increasing development of the Internet, more and more applications are put into websites can be directly accessed through the network. This development has attracted an attacker with phishing websites to compromise computer systems. Several solutions have been proposed to detect a phishing attack. However, there still room for improvement to tackle this phishing threat. This paper aims to investigate and evaluate the effectiveness of machine learning approach in the classification of phishin...
Source
#2Deris StiawanH-Index: 10
Last. Ahmad HeryantoH-Index: 3
view all 3 authors...
Serangan Syn Flood DDoS merupakan aktivitas serangan yang mengeksploitasi proses three way handshake pada koneksi TCP yang memanfaatkan Hping3. Sebagai tools yang untuk membuat traffic data serangan Syn Flood DDoS yang terdiri dari tiga skenario pembuatan dataset sehingga mendapatkan dataset yang bersifat homogen. Algoritma Dendritic Cell atau dikenal dengan DCA merupakan algoritma yang dirancang sebagai deteksi anomali pada traffic jaringan. Pada penelitian ini, serangan Syn Flood dapat diatasi...
#1Ahmad Heryanto (Sriwijaya University)H-Index: 3
#2Deris Stiawan (Sriwijaya University)H-Index: 10
Last. Aditya Putra Perdana Prasetyo (Sriwijaya University)H-Index: 1
view all 3 authors...
Layanan aplikasi ERP dari Fakultas Ilmu Komputer Universitas Sriwijaya merupakan layanan yang digunakan oleh seluruh civitas akademika Fasilkom dalam melakukan aktifitas belajar dan mengajar. Setiap hari layanan ERP melayanani ribuan request yang dilakukan oleh client. Setiap request dari client harus dapat direspon dengan mengirimkan replay data yang diminta. Untuk memberikan layanan yang baik. Server layanan ERP harus di dukung oleh server-server yang handal. Server-server ERP agar dapat berta...
#1M. Miftakul AminH-Index: 3
#2Adi SutrismanH-Index: 2
Last. Rahmat Budiarto (Al Baha University)H-Index: 13
view all 6 authors...
As one of the country with largest population in the world, Indonesia is facing major challenge to serve people in various sectors, one of them is health sector. Utilization of Information and Communication Technology (ICT) has a strategic role in improving efficiency and expanding services access. The main challenge related to data interoperability is the ability to integrate and synchronize data sourced from health information (e-health) systems with different (heterogeneous) platforms. This r...
Source
#6Mohd Najwadi Yusoff (Universiti Sains Malaysia)H-Index: 6
This paper seeks to extol the virtues of named data networking (NDN), as an alternative to host-centric networking (HCN), for its prominent features that can be taken advantage of to significantly reduce energy consumption demands in a mobile ad hoc network (MANET) implementation. Therefore, a NDN-based content routing mechanism was compared with two types of HCN routing protocol implementations in this study: OLSR and Batman-adv. The experimental results obtained from this research provide earl...
Source
#1Farkhana Muchtar (UTM: Universiti Teknologi Malaysia)H-Index: 4
#2Mosleh Hamoud Al-Adhaileh (King Faisal University)H-Index: 3
Last. Deris Stiawan (Sriwijaya University)H-Index: 10
view all 6 authors...
There is lack of complete congestion control solution that is optimized or practical with the Named Data Networking (NDN)-based MANET environment. All the existing suggested solutions are either for general NDN which is not optimized for MANET environment or congestion control solution for incomplete NDN-based MANET. Therefore, we recommend a complete congestion control solution specifically for NDN-based MANET which we call Standbyme Congestion Control or simply called Standbyme. Standbyme desi...
Source
This research focused on to find the traffic pattern in Granblue Fantasy game using Deep Packet Inspection (DPI) which will follow several step. The first step is designing a system to generate dataset, the system consist of one computer that has been installed wireshark and an internet browser for running Granblue Fantasy game, and a modem for internet connection. The second step is to generate the dataset using wireshark. The third step is processing the dataset by extract the raw data using d...
This website uses cookies.
We use cookies to improve your online experience. By continuing to use our website we assume you agree to the placement of these cookies.
To learn more, you can find in our Privacy Policy.