Deris Stiawan
Sriwijaya University
Deep learningOperating systemMachine learningSupport vector machineData miningConfusion matrixArtificial intelligenceNetwork packetRandom forestPattern recognitionAttack patternsComputer networkIntrusion detection systemComputer securityDenial-of-service attackFeature (machine learning)Computer scienceArtificial neural networkMalwareAndroid (operating system)String searching algorithmInternet of ThingsProcess (computing)
61Publications
3H-index
13Citations
Publications 72
Newest
Source
#1Deris Stiawan (Sriwijaya University)H-Index: 9
#2Somame Morianus Daely (Sriwijaya University)
Last. Rahmat Budiarto (Al Baha University)H-Index: 13
view all 6 authors...
Ransomware is a malware that represents a serious threat to a user’s information privacy. By investigating howransomware works, we may be able to recognise its atomic behaviour. In return, we will be able to detect theransomware at an earlier stage with better accuracy. In this paper, we propose Control Flow Graph (CFG) asan extracting opcode behaviour technique, combined with 4-gram (sequence of 4 “words”) to extract opcodesequence to be incorporated into Trojan Ransomware detection method usin...
Source
#2Eko Arip Winanto (UTM: Universiti Teknologi Malaysia)H-Index: 1
Last. Rahmat Budiarto (Al Baha University)H-Index: 13
view all 9 authors...
Heterogeneous network is one of the challenges that must be overcome in Internet of Thing Intrusion Detection System (IoT IDS). The difficulty of the IDS significantly is caused by various devices, protocols, and services, that make the network becomes complex and difficult to monitor. Deep learning is one algorithm for classifying data with high accuracy. This research work incorporated Deep Learning into IDS for IoT heterogeneous networks. There are two concerns on IDS with deep learning in he...
Source
#2Ahmad HeryantoH-Index: 2
Last. Deris StiawanH-Index: 9
view all 3 authors...
High availability cluster is the ability of the system to increase the availability of services provided by a cluster. The high availability process is when the main server cannot provide services, then another clustered server will replace the main server automatically. One of the obstacles in cloud computing is how to predict the resources that will be used in real-time. This study will prevent failover using the backpropagation neural network method based on CPU utilization, memory utilizatio...
#1Sharipuddin Sharipuddin (Sriwijaya University)H-Index: 1
#2Benni Purnama (Sriwijaya University)H-Index: 3
Last. Rahmat Budiarto (Al Baha University)H-Index: 13
view all 8 authors...
The difficulty of the intrusion detection system in heterogeneous networks is significantly affected by devices, protocols, and services, thus the network becomes complex and difficult to identify. Deep learning is one algorithm that can classify data with high accuracy. In this research, we proposed deep learning to intrusion detection system identification methods in heterogeneous networks to increase detection accuracy. In this paper, we provide an overview of the proposed algorithm, with an ...
Source
#1Muhammad Ayaz (Monash University)
#2Muhammad Fermi Pasha (Monash University)H-Index: 5
Last. Deris Stiawan (Sriwijaya University)H-Index: 9
view all 0 authors...
Background null Information technology has shifted paper-based documentation in the health care sector into a digital form, in which patient information is transferred electronically from one place to another. However, there remain challenges and issues to resolve in this domain owing to the lack of proper standards, the growth of new technologies (mobile devices, tablets, ubiquitous computing), and health care providers who are reluctant to share patient information. Therefore, a solid systemat...
Source
#1Deris Stiawan (Sriwijaya University)H-Index: 9
#2Meilinda Eka Suryani (Sriwijaya University)
Last. Rahmat Budiarto (Al Baha University)H-Index: 13
view all 7 authors...
Security is the main challenge in Internet of Things (IoT) systems. The devices on the IoT networks are very heterogeneous, many of them have limited resources, and they are connected globally, which makes the IoT much more challenging to secure than other types of networks. Denial of service (DoS) is the most popular method used to attack IoT networks, either by flooding services or crashing services. Intrusion detection system (IDS) is one of countermeasures for DoS attack. Unfortunately, the ...
Source
The rapid development of deep learning improves the detection and classification of attacks on intrusion detection systems. However, the unbalanced data issue increases the complexity of the architecture model. This study proposes a novel deep learning model to overcome the problem of classifying multi-class attacks. The deep learning model consists of two stages. The pre-tuning stage uses automatic feature extraction with a deep autoencoder. The second stage is fine-tuning using deep neural net...
Source
#2Deris StiawanH-Index: 9
Last. Ahmad HeryantoH-Index: 2
view all 3 authors...
This study focuses on checking the RAMA REPOSITORY pcap file dataset. Aims to see if there are any Port Scanning attack attempts, where Port Scanning generally occurs in the early stages of the attack, namely during the reconnaissance and intrusion processes. The attack pattern was successfully obtained based on the analysis of the pcap file datasaet traffic. There are 2 pcap file datasets that will be checked and analyzed later. The results of this analysis will later be visualized to facilitat...
#1Deris Stiawan (Sriwijaya University)H-Index: 9
#2Ahmad Heryanto (Sriwijaya University)H-Index: 2
Last. Rahmat Budiarto (Al Baha University)H-Index: 13
view all 3 authors...
Rule-Based Signature or also known as Misuse Detection is IDS which rely on matching data captured on retrieval of attack pattern which in system that allow attacks. If the attack activity detected according to existing signature, then it will be read by system and called as attack. The advantage of this Signature-Based IDS is the accuracy of detecting matched attack which in the system with low false-positive result and high true-positive. Cross-Site Scripting is type of attack which is perform...