Ahmad Heryanto
Sriwijaya University
Wireless networkOperating systemMachine learningSupport vector machineData miningConfusion matrixData typeFeature selectionArtificial intelligenceNetwork packetRandom forestDeep packet inspectionAttack patternsComputer networkIntrusion detection systemComputer securityDenial-of-service attackComputer scienceFeature extractionMalwareWirelessAndroid (operating system)Real-time computingProcess (computing)
53Publications
2H-index
16Citations
Publications 67
Newest
#1Deris Stiawan (Sriwijaya University)H-Index: 9
#2Somame Morianus Daely (Sriwijaya University)
Last. Rahmat Budiarto (Al Baha University)H-Index: 13
view all 6 authors...
Ransomware is a malware that represents a serious threat to a user’s information privacy. By investigating howransomware works, we may be able to recognise its atomic behaviour. In return, we will be able to detect theransomware at an earlier stage with better accuracy. In this paper, we propose Control Flow Graph (CFG) asan extracting opcode behaviour technique, combined with 4-gram (sequence of 4 “words”) to extract opcodesequence to be incorporated into Trojan Ransomware detection method usin...
Source
#2Ahmad HeryantoH-Index: 2
Last. Deris StiawanH-Index: 9
view all 3 authors...
High availability cluster is the ability of the system to increase the availability of services provided by a cluster. The high availability process is when the main server cannot provide services, then another clustered server will replace the main server automatically. One of the obstacles in cloud computing is how to predict the resources that will be used in real-time. This study will prevent failover using the backpropagation neural network method based on CPU utilization, memory utilizatio...
#2Deris StiawanH-Index: 9
Last. Ahmad HeryantoH-Index: 2
view all 3 authors...
This study focuses on checking the RAMA REPOSITORY pcap file dataset. Aims to see if there are any Port Scanning attack attempts, where Port Scanning generally occurs in the early stages of the attack, namely during the reconnaissance and intrusion processes. The attack pattern was successfully obtained based on the analysis of the pcap file datasaet traffic. There are 2 pcap file datasets that will be checked and analyzed later. The results of this analysis will later be visualized to facilitat...
#1Deris Stiawan (Sriwijaya University)H-Index: 9
#2Ahmad Heryanto (Sriwijaya University)H-Index: 2
Last. Rahmat Budiarto (Al Baha University)H-Index: 13
view all 3 authors...
Rule-Based Signature or also known as Misuse Detection is IDS which rely on matching data captured on retrieval of attack pattern which in system that allow attacks. If the attack activity detected according to existing signature, then it will be read by system and called as attack. The advantage of this Signature-Based IDS is the accuracy of detecting matched attack which in the system with low false-positive result and high true-positive. Cross-Site Scripting is type of attack which is perform...
#2Deris StiawanH-Index: 9
Last. Ahmad HeryantoH-Index: 2
view all 3 authors...
DDoS TCP Flood attack is a condition where the attacker exploits the three-way handshaking mechanism of the TCP connection establishment process, where the server will be flooded with requests for SYN packets without being responded by the server. In preventing TCP Flood DDoS attacks, we need a system that will detect the attack pattern and then independently reject packets that indicated as attacks. In this study, the attack prevention system uses a combination of iptables in which the ingress/...
#2Ahmad HeryantoH-Index: 2
view all 3 authors...
Fokus penelitian ini adalah membuat jaringan VLAN yang akan dirancang menjadi jaringan Inter VLAN Routing pada salah satu perangkat jaringan yaitu Juniper Switch. Jaringan yang dibuat pada penelitian ini memiliki empat VLAN dimana VLAN kedua, VLAN ketiga dan VLAN keempat sebagai user sedangkan VLAN pertama sebagai administrator atau user dengan menggunakan komunikasi Console dan kabel UTP. Inter VLAN Routing adalah jenis jaringan yang dilakukan untuk menghubungkan antar vlan yang berbeda network...
#2Ahmad HeryantoH-Index: 2
view all 3 authors...
WLAN networks are used to replace LAN networks, this happens because of the rapid advancement of technology. In educational institutions the WLAN network is very helpful in student activities in finding information. These WLAN networks sometimes experience many problems, especially in security. Even though you have used good hardware, network security is still a major problem. The absence of security mechanisms such as encryption and authentication is a major problem causing network security pro...
#2Deris StiawanH-Index: 9
Last. Ahmad HeryantoH-Index: 2
view all 3 authors...
Denial of Service (DoS) adalah teknik serangan yang sering dilakukan oleh attacker yang bertujuan untuk melumpuhkan kemampuan sistem. Serangan dari Denial of Service (DoS) merupakan ancaman yang serius dalam jaringan saat ini, Serangan Smurf merupakan serangan yang dapat memanfaatkan IP dari Host target sebagai sumber ICMP Request, serta mendapat keuntungan terhadap protokol jaringan paket ICMP. Pada kasus ini peneliti menggunakan metode dari Supervised Learning algoritma Iterative Dichotomiser ...
#2Deris StiawanH-Index: 9
Last. Ahmad HeryantoH-Index: 2
view all 3 authors...
Supervisory Control And Data Acquisition system adalah suatu sistem yang biasa digunakan pada dunia industri dimana untuk mengontrol perangkat dari jarak jauh dengan memanfaatkan jaringan komputer. Perangkat ini berkomunikasi berdasarkan aturan atau protokol,dimana salah satu protokol yang digunakan adalah IEC-60870-5-104/IEC-104. Protokol IEC-104 memiliki suatu kerentanan dimana tidak menenkripsi data antara perangkat yang saling berkomunikasi yang memungkinkan serangan dapat dilakukan. Seranga...
#2Deris StiawanH-Index: 9
Last. Ahmad HeryantoH-Index: 2
view all 3 authors...
Attack detection is an activity to analyze data or files whether the data has an attack or not. Snort IDS (intrusion detection system) help in analyzing and detecting attacks on a network in the bitcoin mining process. Malware Ransomware attack is a very dangerous attack because it requires a fee to be able to access the desired file. Ransomware attacks usually attack bitcoin miners who are doing the mining. Bitcoin Mining is a process carried out by miners to get a profit whose profits are comm...