M. Agus Syamsul Arifin
Sriwijaya University
Statistical classificationThe InternetSCADAMachine learningAdaBoostEncryptionArtificial intelligenceHeterogeneous networkNetwork packetRandom forestGridBotnetComputer networkIntrusion detection systemComputer securityComputer scienceNaive Bayes classifierMalwareDNP3Internet of ThingsDecision treeProtocol (object-oriented programming)Taxonomy (general)Vulnerability (computing)
Publications 3
Supervisory control and data acquisition (SCADA) has an important role in communication between devices in strategic industries such as power plant grid/network. Besides, the SCADA system is now open to any external heterogeneous networks to facilitate monitoring of industrial equipment, but this causes a new vulnerability in the SCADA network system. Any disruption on the SCADA system will give rise to a dangerous impact on industrial devices. Therefore, deep research and development of reliabl...
Malware may disrupt the Internet of Thing (IoT) system/network when it resides in the network, or even harm the network operation. Therefore, malware detection in the IoT system/network becomes an important issue. Research works related to the development of IoT malware detection have been carried out with various methods and algorithms to increase detection accuracy. The majority of papers on malware literature studies discuss mobile networks, and very few consider malware on IoT networks. This...
#1Susanto (Sriwijaya University)
#3M. Agus Syamsul Arifin (Sriwijaya University)
Last. Rahmat Budiarto (Al Baha University)H-Index: 13
view all 5 authors...
Botnet is one of the threats to internet network security-Botmaster in carrying out attacks on the network by relying on communication on network traffic. Internet of Things (IoT) network infrastructure consists of devices that are inexpensive, low-power, always-on, always connected to the network, and are inconspicuous and have ubiquity and inconspicuousness characteristics so that these characteristics make IoT devices an attractive target for botnet malware attacks. In identifying whether pac...
This website uses cookies.
We use cookies to improve your online experience. By continuing to use our website we assume you agree to the placement of these cookies.
To learn more, you can find in our Privacy Policy.