Deris Stiawan
Sriwijaya University
Deep learningOperating systemMachine learningSupport vector machineData miningConfusion matrixArtificial intelligenceNetwork packetRandom forestPattern recognitionAttack patternsComputer networkIntrusion detection systemComputer securityDenial-of-service attackFeature (machine learning)Computer scienceArtificial neural networkMalwareAndroid (operating system)String searching algorithmInternet of ThingsProcess (computing)
61Publications
3H-index
13Citations
Publications 63
Newest
#1Sharipuddin Sharipuddin (Sriwijaya University)H-Index: 1
#2Benni Purnama (Sriwijaya University)H-Index: 3
Last. Rahmat Budiarto (Al Baha University)H-Index: 13
view all 8 authors...
The difficulty of the intrusion detection system in heterogeneous networks is significantly affected by devices, protocols, and services, thus the network becomes complex and difficult to identify. Deep learning is one algorithm that can classify data with high accuracy. In this research, we proposed deep learning to intrusion detection system identification methods in heterogeneous networks to increase detection accuracy. In this paper, we provide an overview of the proposed algorithm, with an ...
Source
#1Muhammad Ayaz (Monash University)
#2Muhammad Fermi Pasha (Monash University)H-Index: 5
Last. Deris Stiawan (Sriwijaya University)H-Index: 3
view all 0 authors...
Background null Information technology has shifted paper-based documentation in the health care sector into a digital form, in which patient information is transferred electronically from one place to another. However, there remain challenges and issues to resolve in this domain owing to the lack of proper standards, the growth of new technologies (mobile devices, tablets, ubiquitous computing), and health care providers who are reluctant to share patient information. Therefore, a solid systemat...
Source
The rapid development of deep learning improves the detection and classification of attacks on intrusion detection systems. However, the unbalanced data issue increases the complexity of the architecture model. This study proposes a novel deep learning model to overcome the problem of classifying multi-class attacks. The deep learning model consists of two stages. The pre-tuning stage uses automatic feature extraction with a deep autoencoder. The second stage is fine-tuning using deep neural net...
Source
#2Deris StiawanH-Index: 3
Last. Ali BardadiH-Index: 2
view all 0 authors...
SQL Injection merupakan serangan pada sistem database suatu website yang memanfaatkan celah keamanan yang berada pada layer basis data sebuah aplikasi website. XSS merupakan serangan pada aplikasi website yang mengambil sumber daya dari korban pengunjung website seperti cookies dan nomor kartu kredit dengan memasukkan script berbahaya pada website. Pada penelitian ini menggunakan dataset RAMA Repository yang berasal dari website repositori RAMA. Digunakan algoritma Principal Component Analysis (...
#2Deris StiawanH-Index: 3
Last. Ali BardadiH-Index: 2
view all 3 authors...
Serangan SQL Injection dan XSS adalah salah satu contoh serangan kerentanan yang ada di aplikasi web. Serangan null SQL Injection adalah salah satu dari lima teratas dalam semua risiko keamanan aplikasi web. Serangan SQL Injection dilakukan dengan memasukkan perintah sql ke dalam bentuk web, nama domain, atau permintaan halaman, dan akhirnya menipu server untuk menjalankan perintah SQL yang berbahaya, menyebabkan kerusakan besar pada situs web dan pengguna. XSS adalah singkatan dari Cross-Site S...
#2Deris StiawanH-Index: 3
Last. Ali BardadiH-Index: 2
view all 3 authors...
RAMA repository merupakan tempat penyimpanan paparan hasil penelitian nasional baik berbentuk tugas akhir proyek mahasiswa (Diploma), skripsi (S1), tesis (S2), disertasi (S3) maupun laporan penelitian lainnya. Hal ini membuat RAMA repository rentan terhadap serangan database online diantaranya injeksi SQL dan XSS. Serangan injeksi SQL merupakan serangan database online diurutan pertama, dimana penyerang mengubah kueri SQL yang dikirim oleh pengguna dan menyuntikkan kueri SQL berbahaya kedalamnya...
The growth in internet traffic volume presents a new issue in anomaly detection, one of which is the high data dimension. The feature selection technique has been proven to be able to solve the problem of high data dimension by producing relevant features. On the other hand, high-class imbalance is a problem in feature selection. In this study, two feature selection approaches are proposed that are able to produce the most ideal features in the high-class imbalanced dataset. CICIDS-2017 is a rel...
Source
#2Deris StiawanH-Index: 3
Last. Ahmad HeryantoH-Index: 2
view all 3 authors...
Denial of Service (DoS) adalah teknik serangan yang sering dilakukan oleh attacker yang bertujuan untuk melumpuhkan kemampuan sistem. Serangan dari Denial of Service (DoS) merupakan ancaman yang serius dalam jaringan saat ini, Serangan Smurf merupakan serangan yang dapat memanfaatkan IP dari Host target sebagai sumber ICMP Request, serta mendapat keuntungan terhadap protokol jaringan paket ICMP. Pada kasus ini peneliti menggunakan metode dari Supervised Learning algoritma Iterative Dichotomiser ...
In terms of movement, mobile robots are equipped with various navigation techniques. One of the navigation techniques used is facial pattern recognition. But Mobile robot hardware usually uses embedded platforms which have limited resources. In this study, a new navigation technique is proposed by combining a face detection system with a ram-based artificial neural network. This technique will divide the face detection area into five frame areas, namely top, bottom, right, left, and neutral. In ...
1 CitationsSource
Supervisory control and data acquisition (SCADA) has an important role in communication between devices in strategic industries such as power plant grid/network. Besides, the SCADA system is now open to any external heterogeneous networks to facilitate monitoring of industrial equipment, but this causes a new vulnerability in the SCADA network system. Any disruption on the SCADA system will give rise to a dangerous impact on industrial devices. Therefore, deep research and development of reliabl...
Source