Kurniabudi Kurniabudi
Deep learningCurse of dimensionalityVolume (computing)Information technologyData miningEngineeringDimension (vector space)Data typeFeature selectionArtificial intelligenceHeterogeneous networkSMA*Random forestData analysisPattern recognitionNetwork securityElement (criminal law)Information gain ratioKnowledge sharingVirtual communityIdentity (object-oriented programming)Ideal (set theory)Value (computer science)Context (language use)Task (project management)Information gainIntrinsic motivationData classContent validationIdentification methodsComputer networkField (computer science)Intrusion detection systemClass (biology)Computer scienceSocial mediaNaive Bayes classifierC4.5 algorithmKnowledge managementContent validityInternet trafficCluster analysisAnomaly detectionOutlierInternet of ThingsSelection (genetic algorithm)Taxonomy (general)
6Publications
0Citations
Publications 18
Newest
#2Eko Arip Winanto (UTM: Universiti Teknologi Malaysia)H-Index: 1
Last. Rahmat Budiarto (Al Baha University)H-Index: 13
view all 9 authors...
Heterogeneous network is one of the challenges that must be overcome in Internet of Thing Intrusion Detection System (IoT IDS). The difficulty of the IDS significantly is caused by various devices, protocols, and services, that make the network becomes complex and difficult to monitor. Deep learning is one algorithm for classifying data with high accuracy. This research work incorporated Deep Learning into IDS for IoT heterogeneous networks. There are two concerns on IDS with deep learning in he...
Source
#1Sharipuddin Sharipuddin (Sriwijaya University)H-Index: 1
#2Benni Purnama (Sriwijaya University)H-Index: 3
Last. Rahmat Budiarto (Al Baha University)H-Index: 13
view all 8 authors...
The difficulty of the intrusion detection system in heterogeneous networks is significantly affected by devices, protocols, and services, thus the network becomes complex and difficult to identify. Deep learning is one algorithm that can classify data with high accuracy. In this research, we proposed deep learning to intrusion detection system identification methods in heterogeneous networks to increase detection accuracy. In this paper, we provide an overview of the proposed algorithm, with an ...
Source
The growth in internet traffic volume presents a new issue in anomaly detection, one of which is the high data dimension. The feature selection technique has been proven to be able to solve the problem of high data dimension by producing relevant features. On the other hand, high-class imbalance is a problem in feature selection. In this study, two feature selection approaches are proposed that are able to produce the most ideal features in the high-class imbalanced dataset. CICIDS-2017 is a rel...
Source
Large data dimensionality is one of the issues in anomaly detection. One approach used to overcome large data dimensions is feature selection. An effective feature selection technique will produce the most relevant features and can improve the classification algorithm to detect attacks. There have been many studies on feature selection techniques, each using different methods and strategies to find the best and relevant features. In this study, a comparison of Information Gain, Gain Ratio, CFs-B...
Source
#1Hendri HendriH-Index: 2
Last. Pareza Alam JusiaH-Index: 1
view all 4 authors...
Jambi yang dilaksanakan pada akhir bulan juni 2020, bertempat di lokasi objek yaitu Imam &Rahayu Advertising & Konveksi di Kota Jambi. Kegiatan ini telah memberikan pelatihan danpendampingan dalam mengubah industri kreatif ke model industri 4.0 berbasis internet marketingdengan menerapkan konsep manajemen sumber daya manusia yang efektif, dan manajemenkeuangan yang baik. Kegiatan pelatihan dan pendampingan penggunaan toko online merupakansalah satu strategi untuk membuat konsep bisnis baru untuk...
Source
Tantangan deteksi serangan saat ini adalah jumlah trafik yang besar dan beragam serta hadir jenis serangan baru. Sehingga diperlukan teknik baru untuk meningkatkan performa deteksi. Dengan pesatnya perkembangan teknologi layanan komunikasi, menghasilkan trafik dengan informasi yang beragam. Pada dasarnya tidak semua informasi pada trafik jaringan digunakan untuk mendeteksi serangan seperti DDoS. Penelitian ini bertujuan meningkatkan performa Random Forest dalam mendeteksi serangan DDoS dengan se...
Source
#2Pareza Alam JusiaH-Index: 1
view all 3 authors...
The students of SMA Negeri 2 city of Jambi tend to choose majors based on interest, and desire because of parents. Some of them already take into account the existing potential in them, then commitment to learning in the field of it won't go smoothly, even though the Department he chooses it doesn't match his ability. Therefore, the author does analysis of data mining using value data class XII students from one to four semesters and kuisoner the authors share. In doing the analysis the author u...
1 Citations
#1Dina SuniaH-Index: 1
Last. Pareza Alam JusiaH-Index: 1
view all 3 authors...
Sumber data dari BPS kota jambi Pada Maret 2017 jumlah penduduk miskin sebesar 286,55 ribu jiwa (8,19%), berkurang sebesar 4,26 ribu jiwa dibandingkan dengan penduduk miskin pada september 2016 yang sebesar 290,81 ribu jiwa (8,37%). Berdasarkan angka tersebut terlihat masih tingginya angka kemiskinan yang ada di wilayah Kota Jambi secara umum. Berdasarkan kondisi tersebut perlu dilakukan pengklasteran untuk membantu Dinas Sosial Kota Jambi dalam pengelompokan keluarga miskin sehingga bantuan dap...
3 Citations
Data analysis to identifying attacks/anomalies is a crucial task in anomaly detection and network anomaly detection itself is an important issue in network security. Researchers have developed methods and algorithms for the improvement of the anomaly detection system. At the same time, survey papers on anomaly detection researches are available. Nevertheless, this paper attempts to analyze futher and to provide alternative taxonomy on anomaly detection researches focusing on methods, types of an...
5 CitationsSource
Penerimaan teknologi informasi di bidang pendidikan menjadi hal yang menarik untuk dibahas. Keberhasilan implementasi teknologi informasi untuk mendukung pembelajaran tergantung pada penggunaan berkelanjutan. Diyakini bahwa ini dipengaruhi oleh kepuasan dan pemilihan teknologi yang digunakan. Facebook adalah media sosial paling populer di kalangan para siswa. Penelitian ini bertujuan untuk mengusulkan model kepuasan dan task-fit perceptions dari penggunaan media sosial dalam pendidikan. Peneliti...
Source