Claim Missing Document
Check
Articles

IoT Smart Device for e-Learning Content Sharing on Hybrid Cloud Environment Yazid Idris, Mohd.; Stiawan, Deris; Habibullah, Nik Mohd; Fikri, Abdul Hadi; Abd Rahim, Mohd Rozaini; Dasuki, Massolehin
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (697.409 KB) | DOI: 10.11591/eecsi.v4.978

Abstract

Centralized e-Learning technology has dominated the learning ecosystem that brings a lot of potential usage on media rich learning materials. However, the centralized architecture has their own constraint to support large number of users for accessing large size of learning contents. On the other hand, Content Delivery Network (CDN) solution which relies on distributed architecture provides an alternative solution to eliminate  bottleneck  access.  Although  CDN  is   an  effective solution, the implementation of technology is expensive and has less impact for student who lives in limited or non-existence internet access in geographical area. In this paper, we introduce an IoT smart device to provide e-Learning access for content sharing on hybrid cloud environment with distributed peer-to- peer communication solution for data synchronization and updates. The IoT smart device acts as an intermediate device between user and cloud services, and provides content sharing solution without fully depending on the cloud server.
IAES International Conference on Electrical Engineering, Computer Science and Informatics Riyadi, Munawar A; Dwi Prasetyowati, Sri Arttini; Sutikno, Tole; Stiawan, Deris
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 3: EECSI 2016
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (314.65 KB) | DOI: 10.11591/eecsi.v3.1106

Abstract

The 3rd International Conference of Electrical Engineering, Computer Science and Informatics (EECSI) 2016 was held in Semarang, Indonesia from 23th to 25thNovember, 2016. The conference was organized by Universitas Islam Sultan Agung as the host in collaboration with Universitas Diponegoro, Universitas Ahmad Dahlan and Universitas Sriwijaya, and with full technical support from IAES Indonesia Section. Authors and participants from 10 countries made the conference truly international in scope. Participants have delivered their talks of valuable research outputs that vary from many fields of electrical engineering (power electronics, telecommunication, electronics engineering, control system and signal processing) to the field of computer science and informatics. These wide range of topics have colorized this conference.This volume of IOP Conference Series: Materials Science and Engineering contains selected articles from those presented in the conference. After presentation, the revised papers were peer reviewed by fellow reviewers to ensure the quality of published materials. Finally, Editors decided to select and publish as many as 49 papers. It is hoped that the presented papers can offer more insight towards broad audience.On behalf of Editors, we appreciate enormous work of all staffs and reviewers in the preparation of this volume. We would like to express our sincere thanks to all authors and presenters for their valuable contributions. We hope to see you again in the next event of EECSI 2017 which will be held in Yogyakarta, Indonesia, next year.
Information Framework of Pervasive Real Time Monitoring System: Case of Peat Land Forest Fires and Air Quality in South Sumatera, Indonesia Nurmaini, Siti; Firsandaya Malik, Reza; Stiawan, Deris; Firdaus, Firdaus; Saparudin, Saparudin
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 3: EECSI 2016
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (716.552 KB) | DOI: 10.11591/eecsi.v3.1163

Abstract

The information framework aims to holistically address the problems and issues posed by unwanted peat and land fires within the context of the natural environment and socio-economic systems. Informed decisions on planning and allocation of resources can only be made by understanding the landscape. Therefore, information on fire history and air quality impacts must be collected for future analysis. This paper proposes strategic framework based on technology approach with data fusion strategy to produce the data analysis about peat land fires and air quality management in in South Sumatera. The research framework should use the knowledge, experience and data from the previous fire seasons to review, improve and refine the strategies and monitor their effectiveness for the next fire season. Communicating effectively with communities and the public and private sectors in remote and rural landscapes is important, by using smartphones and mobile applications. Tools such as one-stop information based on web applications, to obtain information such as early warning to send and receive fire alerts, could be developed and promoted so that all stakeholders can share important information with each other.
Visualization of Granblue Fantasy Game Traffic Pattern Using Deep Packet Inspection Method Stiawan, Deris; Prabowo, Christian; Heryanto, Ahmad; Afifah, Nurul; Minarno, Agus Eko; Budiarto, Rahmat
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 5, No. 3, August 2020
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v5i3.1073

Abstract

Granblue Fantasy is one of Role Playing Games (RPG). It’s a video role-playing game developed by Cygames. This research to observes the Granblue Fantasy Game. The purpose is to analyze the traffic data of the Granblue Fantasy to find the pattern using Deep Packet Inspection (DPI), Capturing the Data Traffic, Feature Extraction Process and Visualize the Pattern. The Pattern are Gacha, Solo Raid, Casino and Multiraid. This research demonstrate that Multiraid battle has more data than other pattern with TTL 237.
IoT Botnet Malware Classification Using Weka Tool and Scikit-learn Machine Learning Susanto, Susanto; Stiawan, Deris; Arifin, M. Agus Syamsul; Idris, Mohd. Yazid; Budiarto, Rahmat
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 7, No 1: EECSI 2020
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v7.2080

Abstract

Botnet is one of the threats to internet network security-Botmaster in carrying out attacks on the network by relying on communication on network traffic. Internet of Things (IoT) network infrastructure consists of devices that are inexpensive, low-power, always-on, always connected to the network, and are inconspicuous and have ubiquity and inconspicuousness characteristics so that these characteristics make IoT devices an attractive target for botnet malware attacks. In identifying whether packet traffic is a malware attack or not, one can use machine learning classification methods. By using Weka and Scikit-learn analysis tools machine learning, this paper implements four machine learning algorithms, i.e.: AdaBoost, Decision Tree, Random Forest, and Naïve Bayes. Then experiments are conducted to measure the performance of the four algorithms in terms of accuracy, execution time, and false positive rate (FPR). Experiment results show that the Weka tool provides more accurate and efficient classification methods. However, in false positive rate, the use of Scikit-learn provides better results.
Features Extraction on IoT Intrusion Detection System Using Principal Components Analysis (PCA) Sharipuddin, Sharipuddin; Purnama, Benni; Kurniabudi, Kurniabudi; Winanto, Eko Arip; Stiawan, Deris; Hanapi, Darmawijoyo; Idris, Mohd. Yazid; Budiarto, Rahmat
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 7, No 1: EECSI 2020
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v7.2098

Abstract

There are several ways to increase detection accuracy result on the intrusion detection systems (IDS), one way is feature extraction. The existing original features are filtered and then converted into features with lower dimension. This paper uses the Principal Components Analysis (PCA) for features extraction on intrusion detection system with the aim to improve the accuracy and precision of the detection. The impact of features extraction to attack detection was examined. Experiments on a network traffic dataset created from an Internet of Thing (IoT) testbed network topology were conducted and the results show that the accuracy of the detection reaches 100 percent.
Improving the Anomaly Detection by Combining PSO Search Methods and J48 Algorithm Kurniabudi, Kurniabudi; Harris, Abdul; Mintaria, Albertus Edward; Hanapi, Darmawijoyo; Stiawan, Deris; Idris, Mohd. Yazid; Budiarto, Rahmat
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 7, No 1: EECSI 2020
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v7.2099

Abstract

The feature selection techniques are used to find the most important and relevant features in a dataset. Therefore, in this study feature selection technique was used to improve the performance of Anomaly Detection. Many feature selection techniques have been developed and implemented on the NSL-KDD dataset. However, with the rapid growth of traffic on a network where more applications, devices, and protocols participate, the traffic data is complex and heterogeneous contribute to security issues. This makes the NSL-KDD dataset no longer reliable for it. The detection model must also be able to recognize the type of novel attack on complex network datasets. So, a robust analysis technique for a more complex and larger dataset is required, to overcome the increase of security issues in a big data network. This study proposes particle swarm optimization (PSO) Search methods as a feature selection method. As contribute to feature analysis knowledge, In the experiment a combination of particle swarm optimization (PSO) Search methods with other search methods are examined. To overcome the limitation NSL-KDD dataset, in the experiments the CICIDS2017 dataset used. To validate the selected features from the proposed technique J48 classification algorithm used in this study. The detection performance of the combination PSO Search method with J48 examined and compare with other feature selection and previous study. The proposed technique successfully finds the important features of the dataset, which improve detection performance with 99.89% accuracy. Compared with the previous study the proposed technique has better accuracy, TPR, and FPR.
WhatsApp, Viber and Telegram which is Best for Instant Messaging? Tole Sutikno; Lina Handayani; Deris Stiawan; Munawar Agus Riyadi; Imam Much Ibnu Subroto
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 3: June 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (78.797 KB) | DOI: 10.11591/ijece.v6i3.pp909-914

Abstract

There are many free instant messengers available now which allow to communicate with friends with text, phone call, video, sharing of files, in group or not and keep contact with them even internationally. But only very few of the instant messengers have gained a popularity and attention. Recent studies have shown that the most popular instant messengers are WhatsApp, Viber and Telegram. Even, Facebook acquired WhatsApp due to have huge users. Viber is another messenger with many integrated features that allows the phone calls and sends the text messages for free and there is no subscription like WhatsApp. While Telegram offers the users an open-source platform with no ads, a clean fast interface, asks for no payments whatsoever and the biggest selling point is security. WhatsApp, Viber and Telegram which instant messenger is best? The popularity of Telegram has reached at the top of Google play store and become the most downloaded messaging app in the world today. But at the moment WhatsApp is still the winner!
Personal data protection and liability of internet service provider: a comparative approach Ni Ketut Supasti Dharmawan; Desak Putu Dewi Kasih; Deris Stiawan
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 4: August 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (428.654 KB) | DOI: 10.11591/ijece.v9i4.pp3175-3184

Abstract

The users of electronic service provider often suffered losses caused by internet services did not work properly including losses due to leakage of personal data protection stored in cloud computing.  The study aims to examine electronic service provider liability upon their failure performing internet services properly and security attacks on cloud computing. This study was normative legal research by examining national and international legal materials. The finding shows that the electronic provider shall be responsible based on right and obligation agreed under the agreement.  Related to cloud computing, providing adequate security to avoid security attacks and misuse of private data that caused losses to the users becoming the liability of service provider. Based on the Federal Trade Commission Act, the liability arises on the grounds of deceptive and unfair trade practices.  Under the General Data Protection Regulation of the European Union, the liability arises on the basis as the controller then provider liable for compensation for user’s suffered damage. In Indonesia, based on the Electronic Information and Transaction Law Amendment, the liability to the owner of personal data whose rights are violated and suffered losses arises due to a failure of ISP protect the data security. For better protection in Indonesia, the protection of big data and clear territorial scope of protection become necessary to consider.
The Authority of Government in Clearing Hatefull and Hostilities Electronic Information Based on Tribe, Relegion, Race and Intergroup I Gede Yusa; Dewi Bunga; Deris Stiawan
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 6: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (474.818 KB) | DOI: 10.11591/ijece.v7i6.pp3735-3744

Abstract

The Act Number 19 of 2016 concerning the amendment of The Act Number 11 of 2008 concerning Information and Electronic Transaction governing the authority of government in clearing hateful and hostilities electronic information based on tribe, religion, race and intergroup. On the one hand, the government authority aims to protect the public interest and the integrity of the nation, but on the other hand, termination of access to information would restrict the right to freedom of opinion and the right to privacy of Internet users. This study was a normative legal research, which examined the basic authority for the government to shut down negative content in cyberspace. Legal materials were collected through library research. The analysis was conducted qualitatively. This study examined three issues, namely; spreading hatred and hostility in cyberspace, legality government to close the spreading hatred and hostility and electronic evidence in spreading hatred and hostility. Spreading hatred and hostility were criminal acts that used the Internet as facilities. Internet was used by extremists to disseminate his teachings, even being used to commit acts of terrorism (cyber terrorism). In maintaining the unity and integrity, then the government had the authority to shut down access to the unlawful electronic system. The closure should be accompanied by proof of electronic information that contains hatred and hostility based on tribe, religion, race and intergroup
Co-Authors Abd Rahim, Mohd Rozaini Abdul Hadi Fikri Abdul Hanan Abdullah Abdul Harris Adi Sutrisman Aditya Putra Perdana Prasetyo Aditya Putra Perdana Prasetyo Adji Pratomo Agung Juli Anda Agus Eko Minarno Ahmad Fali Oklilas Ahmad Firdaus Ahmad Heryanto Ahmad Heryanto Ahmad Heryanto Ahmad Heryanto, Ahmad Ahmad Zarkasi Albertus Edward Mintaria Ali Bardadi Bedine Kerim Bedine Kerim Bhakti Yudho Suprapto Bhakti Yudho Suprapto Darmawijoyo, Darmawijoyo Dasuki, Massolehin Desak Putu Dewi Kasih Dewi Bunga Dian Palupi Rini Endang Lestari Ruskan Ermatita Ermatita Erwin, Erwin Fachrudin Abdau Ferdiansyah Ferdiansyah Fikri, Abdul Hadi Firdaus Firdaus Firdaus, Firdaus Firsandaya Malik, Reza Gonewaje gonewaje Habibullah, Nik Mohd Harris, Abdul Huda Ubaya Huda Ubaya I Gede Yusa Idris, Mohd. Yazid Idris, Mohd. Yazid Imam Much Ibnu Subroto John Arthur Jupin Kurniabudi, Kurniabudi Lelyzar Siregar Lina Handayani M. Miftakul Amin M. Ridwan Zalbina Majzoob K. Omer Massolehin Dasuki Mehdi Dadkhah Mintaria, Albertus Edward Mohamed S. Adrees Mohammad Davarpanah Jazi Mohammad Sulkhan Nurfatih Mohammed Y. Alzahrani Mohd Arfian Ismail Mohd Azam Osman Mohd Faizal Ab Razak Mohd Rozaini Abd Rahim Mohd Saberi Mohamad Mohd Yazid bin Idris Mohd Yazid Bin Idris Mohd Yazid Idris Mohd. Yazid Idris Mohd. Yazid Idris Mohd. Yazid Idris Muhammad Afif Muhammad Fermi Pasha Munawar A Riyadi Munawar Agus Riyadi Ni Ketut Supasti Dharmawan Nik Mohd Habibullah Nur Sholihah Zaini Osama E. Sheta Osvari Arsalan Prabowo, Christian Purnama, Benni Rahmat Budiarto Rahmat Budiarto Rahmat Budiarto Rahmat Budiarto Rahmat Budiarto Rahmat Budiarto Raja Zahilah Md Radzi Reza Firsandaya Malik Riyadi, Munawar A Rizki Kurniati Rossi Passarella Samsuryadi Samsuryadi Saparudin Saparudin Saparudin, Saparudin Sari Sandra Sarmayanta Sembiring Sasut A Valianta Sasut Analar Valianta Shahreen Kasim Sharipuddin Sharipuddin Sharipuddin Sharipuddin Sharipuddin Sharipuddin Sharipuddin Sharipuddin Sharipuddin, Sharipuddin Siti Hajar Othman Siti Nurmaini Sri Arttini Dwi Prasetyawati Sri Desy Siswanti Susanto Susanto Susanto Susanto Susanto, Susanto Sutarno Sutarno Syamsul Arifin, M. Agus Tasmi Salim tasmi salim Tole Sutikno Wan Isni Sofiah Wan Din Yaya Sudarya Triana Yazid Idris, Mohd. Yesi Novaria Kunang Yoga Yuniadi Yundari, Yundari