Sharipuddin
Sriwijaya University
Automatic identification and data captureData pre-processingCommunications protocolData miningSignature (logic)EncryptionArtificial intelligenceReliability (computer networking)Set (abstract data type)Pattern recognitionComputational complexity theoryTopology (electrical circuits)Network topologyKey (cryptography)Wireless sensor networkPrincipal component analysisBlockchainNode (computer science)Traffic analysisConsensus algorithmComputer networkSystems designTestbedPreprocessorIntrusion detection systemComputer scienceComponent (UML)Feature extractionWirelessObject (computer science)Anomaly detectionAnalyticsReal-time computingUnsupervised learningDisk formattingProtocol (object-oriented programming)Robustness (computer science)
8Publications
1H-index
45Citations
Publications 5
Newest
#1Eko Arip Winanto (UTM: Universiti Teknologi Malaysia)H-Index: 1
#2Mohd. Yazid Idris (UTM: Universiti Teknologi Malaysia)H-Index: 7
Last. Sharipuddin (Sriwijaya University)H-Index: 1
view all 5 authors...
Signature-based Collaborative Intrusion Detection System (CIDS) deeply depends on the reliability of nodes to produce attack signatures. Each node in the network is responsible to produce a new attack signature to be distributed with other nodes. There is an issue that exists in CIDS highlighted in this paper, it is to maintain trust between the nodes while distributing the attack signatures. Recently, researchers found that blockchain has great potential to solve those problems. A consensus alg...
Source
#1Sharipuddin (Sriwijaya University)H-Index: 1
#2Benni Purnama (Sriwijaya University)H-Index: 3
Last. Rahmat Budiarto (Al Baha University)H-Index: 13
view all 8 authors...
Feature extraction solves the problem of finding the most efficient and comprehensive set of features. A Principle Component Analysis (PCA) feature extraction algorithm is applied to optimize the effectiveness of feature extraction to build an effective intrusion detection method. This paper uses the Principal Components Analysis (PCA) for features extraction on intrusion detection system with the aim to improve the accuracy and precision of the detection. The impact of features extraction to at...
Source
Oct 1, 2018 in ICEE (International Conference on Electrical Engineering)
#1SharipuddinH-Index: 1
#2KurniabudiH-Index: 2
Last. Rahmat Budiarto (Al Baha University)H-Index: 13
view all 9 authors...
This study presents the testing of several devices (sensors) in obtaining sensor performance, there are several experiments and evaluations of the results obtained in the topology. Each sensor must be able to provide some results in the form of accuracy, reliability, range, and resolution. The accuracy and reliability have very important role in producing accurate data. With several explanations and analysis, it is expected to produce a reference for advanced development and policies making in t...
Source
Oct 1, 2018 in ICEE (International Conference on Electrical Engineering)
#1KurniabudiH-Index: 2
#2Benni PurnamaH-Index: 3
Last. Rahmat Budiarto (Al Baha University)H-Index: 13
view all 6 authors...
A robust increasing on smart sensors in Internet of Thing (IoT) results huge and heterogenous data and becomes a challenge in data prepocessing and analysis for anomaly detection. The lack of IoT publicly available dataset is one issue in anomaly detection research. To resolve that problem, a testbed topology is proposed in this research. In addition, a high-dimensionality data analysis faces a computational complexity. The purpose of this study is to presents a global framework for anomaly dete...
Source
Oct 1, 2018 in ICEE (International Conference on Electrical Engineering)
#1Benni PurnamaH-Index: 3
#2SharipuddinH-Index: 1
Last. Darmawijoyo HanapiH-Index: 1
view all 6 authors...
Internet of Things (IoT) networks operators may not be fully aware whether each IoT device in their network is functioning safe enough from cyber-attacks. This paper develops an IoT traffic dataset with the purpose of of network traffic analytics to characterize IoT devices, including their typical behaviour mode. We set up an IoT environment/testbed consists of several sensors/nodes and uses Zigbee communication protocol to collect and synthesize traffic traces. Normal dataset and anomaly/attac...
Source
This website uses cookies.
We use cookies to improve your online experience. By continuing to use our website we assume you agree to the placement of these cookies.
To learn more, you can find in our Privacy Policy.