Wildan Suharso
Department of Informatics, University of Muhammadiyah Malang

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

Analysis of the Combination of Naïve Bayes and MHR (Mean of Horner’s Rule) for Classification of Keystroke Dynamic Authentication Zamah Sari; Didih Rizki Chandranegara; Rahayu Nurul Khasanah; Hardianto Wibowo; Wildan Suharso
JOIN (Jurnal Online Informatika) Vol 7 No 1 (2022)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v7i1.839

Abstract

Keystroke Dynamics Authentication (KDA) is a technique used to recognize somebody dependent on typing pattern or typing rhythm in a system. Everyone's typing behavior is considered unique. One of the numerous approaches to secure private information is by utilizing a password. The development of technology is trailed by the human requirement for security concerning information and protection since hacker ability of information burglary has gotten further developed (hack the password). So that hackers can use this information for their benefit and can disadvantage others. Hence, for better security, for example, fingerprint, retina scan, et cetera are enthusiastically suggested. But these techniques are considered costly. The advantage of KDA is the user would not realize that the system is using KDA. Accordingly, we proposed the combination of Naïve Bayes and MHR (Mean of Horner’s Rule) to classify the individual as an attacker or a non-attacker. We use Naïve Bayes because it is better for classification and simple to implement than another. Furthermore, MHR is better for KDA if combined with the classification method which is based on previous research. This research showed that False Acceptance Rate (FAR) and Accuracy are improving than the previous research.
Analysis of the Combination of Naïve Bayes and MHR (Mean of Horner’s Rule) for Classification of Keystroke Dynamic Authentication Zamah Sari; Didih Rizki Chandranegara; Rahayu Nurul Khasanah; Hardianto Wibowo; Wildan Suharso
JOIN (Jurnal Online Informatika) Vol 7 No 1 (2022)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v7i1.839

Abstract

Keystroke Dynamics Authentication (KDA) is a technique used to recognize somebody dependent on typing pattern or typing rhythm in a system. Everyone's typing behavior is considered unique. One of the numerous approaches to secure private information is by utilizing a password. The development of technology is trailed by the human requirement for security concerning information and protection since hacker ability of information burglary has gotten further developed (hack the password). So that hackers can use this information for their benefit and can disadvantage others. Hence, for better security, for example, fingerprint, retina scan, et cetera are enthusiastically suggested. But these techniques are considered costly. The advantage of KDA is the user would not realize that the system is using KDA. Accordingly, we proposed the combination of Naïve Bayes and MHR (Mean of Horner’s Rule) to classify the individual as an attacker or a nonattacker. We use Naïve Bayes because it is better for classification and simple to implement than another. Furthermore, MHR is better for KDA if combined with the classification method which is based on previous research. This research showed that False Acceptance Rate (FAR) and Accuracy are improving than the previous research.
A Comparison of Ryu and Pox Controllers: A Parallel Implementation Muhammad Ikhwananda Rizaldi; Elsa Annas Sonia Yusuf; Denar Regata Akbi; Wildan Suharso
JOIN (Jurnal Online Informatika) Vol 9 No 1 (2024)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v9i1.1181

Abstract

Software Defined Network (SDN) network controllers have limitations in handling large volumes of data generated by switches, which can slow down their performance. Using parallel programming methods such as threading, multiprocessing, and MPI aims to improve the performance of the controller in handling a large number of switches. By considering factors such as memory usage, CPU consumption, and execution time. The test results show that although RYU outperforms POX in terms of faster execution time and lower CPU utilization rate, POX shows its prowess by exhibiting less memory usage despite higher CPU utilization rate than RYU. The use of the parallel approach proves advantageous as both controllers exhibit enhanced efficiency levels. Ultimately, RYU's impressive speed and superior resource optimization capabilities may prove to be more strategic than POX over time. Taking into account the specific needs and prerequisites of a given system, this research provides insights in selecting the most suitable controller to handle large-scale switches with optimal efficiency.