Benni Purnama
Sriwijaya University
Automatic identification and data captureData pre-processingDeep learningCommunications protocolData miningData typeEncryptionArtificial intelligenceHeterogeneous networkReliability (computer networking)Set (abstract data type)Pattern recognitionComputational complexity theoryNetwork securityTopology (electrical circuits)Network topologyKey (cryptography)Wireless sensor networkPrincipal component analysisIdentity (object-oriented programming)Task (project management)Traffic analysisIdentification methodsComputer networkSystems designTestbedPreprocessorIntrusion detection systemComputer scienceComponent (UML)Feature extractionWirelessAnomaly detectionAnalyticsOutlierReal-time computingUnsupervised learningInternet of ThingsDisk formattingProtocol (object-oriented programming)Taxonomy (general)
13Publications
3H-index
22Citations
Publications 7
Newest
#1Sharipuddin Sharipuddin (Sriwijaya University)H-Index: 1
#2Benni Purnama (Sriwijaya University)H-Index: 3
Last. Rahmat Budiarto (Al Baha University)H-Index: 13
view all 8 authors...
The difficulty of the intrusion detection system in heterogeneous networks is significantly affected by devices, protocols, and services, thus the network becomes complex and difficult to identify. Deep learning is one algorithm that can classify data with high accuracy. In this research, we proposed deep learning to intrusion detection system identification methods in heterogeneous networks to increase detection accuracy. In this paper, we provide an overview of the proposed algorithm, with an ...
Source
#1Sharipuddin (Sriwijaya University)H-Index: 3
#2Benni Purnama (Sriwijaya University)H-Index: 3
Last. Rahmat Budiarto (Al Baha University)H-Index: 13
view all 8 authors...
Feature extraction solves the problem of finding the most efficient and comprehensive set of features. A Principle Component Analysis (PCA) feature extraction algorithm is applied to optimize the effectiveness of feature extraction to build an effective intrusion detection method. This paper uses the Principal Components Analysis (PCA) for features extraction on intrusion detection system with the aim to improve the accuracy and precision of the detection. The impact of features extraction to at...
1 CitationsSource
#2Benni PurnamaH-Index: 3
Last. Sharipuddin SharipuddinH-Index: 1
view all 3 authors...
Sekretariat daerah kota sungai penuh dan Masyarakat didalam lingkungan kota sungai penuh menyampaikan keluhan serta aspirasinya masih harus datang langsung ke Desa atau Kelurahan. Dengan demikian dibutuhkan sebuah Rancangan Aplikasi baru yang terbuka dan terhubung langsung dengan masyarakat sehingga Masyarakat Kota sungai penuh bisa langsung menyampaikan keluhan dan aspirasinya sendiri lewat mobile dimana saja ia berada yang langsung terhubung ke SKPD terkait dan Bupati serta tanpa harus datang ...
Data analysis to identifying attacks/anomalies is a crucial task in anomaly detection and network anomaly detection itself is an important issue in network security. Researchers have developed methods and algorithms for the improvement of the anomaly detection system. At the same time, survey papers on anomaly detection researches are available. Nevertheless, this paper attempts to analyze futher and to provide alternative taxonomy on anomaly detection researches focusing on methods, types of an...
5 CitationsSource
Oct 1, 2018 in ICEE (International Conference on Electrical Engineering)
#1KurniabudiH-Index: 3
#2Benni PurnamaH-Index: 3
Last. Rahmat Budiarto (Al Baha University)H-Index: 13
view all 6 authors...
A robust increasing on smart sensors in Internet of Thing (IoT) results huge and heterogenous data and becomes a challenge in data prepocessing and analysis for anomaly detection. The lack of IoT publicly available dataset is one issue in anomaly detection research. To resolve that problem, a testbed topology is proposed in this research. In addition, a high-dimensionality data analysis faces a computational complexity. The purpose of this study is to presents a global framework for anomaly dete...
3 CitationsSource
Oct 1, 2018 in ICEE (International Conference on Electrical Engineering)
#1Benni PurnamaH-Index: 3
#2SharipuddinH-Index: 3
Last. Darmawijoyo HanapiH-Index: 1
view all 6 authors...
Internet of Things (IoT) networks operators may not be fully aware whether each IoT device in their network is functioning safe enough from cyber-attacks. This paper develops an IoT traffic dataset with the purpose of of network traffic analytics to characterize IoT devices, including their typical behaviour mode. We set up an IoT environment/testbed consists of several sensors/nodes and uses Zigbee communication protocol to collect and synthesize traffic traces. Normal dataset and anomaly/attac...
1 CitationsSource
Oct 1, 2018 in ICEE (International Conference on Electrical Engineering)
#1SharipuddinH-Index: 3
#2KurniabudiH-Index: 3
Last. Rahmat Budiarto (Al Baha University)H-Index: 13
view all 9 authors...
This study presents the testing of several devices (sensors) in obtaining sensor performance, there are several experiments and evaluations of the results obtained in the topology. Each sensor must be able to provide some results in the form of accuracy, reliability, range, and resolution. The accuracy and reliability have very important role in producing accurate data. With several explanations and analysis, it is expected to produce a reference for advanced development and policies making in t...
1 CitationsSource