Sigit Umar Anggono
Universitas Sains dan Teknologi Komputer

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

Enhancing Performance Using New Hybrid Intrusion Detection System Candra Supriadi; Charli Sitinjak; Fujiama Diapoldo Silalahi; Nia Dharma Pertiwi; Sigit Umar Anggono
Journal of Management and Informatics Vol 1 No 2 (2022): Agustus: Journal of management and informatics
Publisher : Universitas Sains dan Teknologi Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jmi.v1i1.134

Abstract

Intrusion Detection Systems (IDS) are an efficient defense against network attacks as well as host attacks as they allow network/host administrators to detect any policy violations. However, traditional IDS are vulnerable and unreliable for new malicious and genuine attacks. In other case, it is also inefficient to analyze large amount of data such as possibility logs. Furthermore, for typical OS, there are a lot of false positives and false negatives. There are some techniques to increase the quality and result of IDS where data mining is one of technique that is important to mining the information that useful from a large amount of data which noisy and random. The purpose of this study is to combine three technique of data mining to reduce overhead and to improve efficiency in intrusion detection system (IDS). The combination of clustering (Hierarchical) and two categories (C5, CHAID) is proposed in this study. The designed IDS is evaluated against the KDD'99 standard Data set (Knowledge Discovery and Data Mining), which is used to evaluate the efficacy of intrusion detection systems. The suggested system can detect intrusions and categorize them into four categories: probe, DoS, U2R (User to Root), and R2L (Remote to Local). The good performance of IDS in case of accuracy and efficiency was the result of this study.
Enhancing Performance Using New Hybrid Intrusion Detection System Candra Supriadi; Charli Sitinjak; Fujiama Diapoldo Silalahi; Nia Dharma Pertiwi; Sigit Umar Anggono
Journal of Technology Informatics and Engineering Vol 1 No 2 (2022): Agustus: Journal of Technology Informatics and Engineering
Publisher : Universitas Sains dan Teknologi Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i1.134

Abstract

Intrusion Detection Systems (IDS) are an efficient defense against network attacks as well as host attacks as they allow network/host administrators to detect any policy violations. However, traditional IDS are vulnerable and unreliable for new malicious and genuine attacks. In other case, it is also inefficient to analyze large amount of data such as possibility logs. Furthermore, for typical OS, there are a lot of false positives and false negatives. There are some techniques to increase the quality and result of IDS where data mining is one of technique that is important to mining the information that useful from a large amount of data which noisy and random. The purpose of this study is to combine three technique of data mining to reduce overhead and to improve efficiency in intrusion detection system (IDS). The combination of clustering (Hierarchical) and two categories (C5, CHAID) is proposed in this study. The designed IDS is evaluated against the KDD'99 standard Data set (Knowledge Discovery and Data Mining), which is used to evaluate the efficacy of intrusion detection systems. The suggested system can detect intrusions and categorize them into four categories: probe, DoS, U2R (User to Root), and R2L (Remote to Local). The good performance of IDS in case of accuracy and efficiency was the result of this study.
IMPACT OF EMBEDDED CLS ON EYE TRACKING REPLICATION Nuris Dwi Setiawan; Bagus Sudirman; Sigit Umar Anggono
Journal of Technology Informatics and Engineering Vol 1 No 3 (2022): Desember: Journal of Technology Informatics and Engineering
Publisher : Universitas Sains dan Teknologi Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i3.148

Abstract

Using different programming languages when software advancement is a familiar method in current software advancement. Nevertheless, using various languages that can hinder developer capacity is not widely known. This research simulated an unplanned controlled study examining the adoption of various languages in the situation of a directory programming task. Participants in this study were given programming tasks written in Java and one of three SQL-like embedded languages. Simple “SQL” over authority, “Java” program only, and a more Java-like hybrid embedded language. Furthermore, to transcribe the responses to the online quest and the participators' “task” solutions, the participators' eye movements were also recorded with an eye tracker. “Eye Tracker” or in this study call as “Eye-Trc” is the methodology of the study of software development that has developed nowadays and grants more in-depth info about how developers accomplish programming tasks. This Eye-Trc method is used as a data collection method in this study. Eye-Trc data was get by thirty-one participators (university background and Industrial Background) for different programming tasks. To analyze the impact of inter-group inconstant and professional experience and in-group “task” variables on the dependent variable Time in completion, this study used a mixed model ANOVA. The outcome of this study indicates that an important impact on productivity was not found, this is different from the initial research because of the language used. However, the same effect was found from the participators' expertise in programming activity indicating that more competent programmers were easy to full fill “polyglot programming tasks” more efficiently. In addition, it was raised that participators viewed the specimen code with the same proportion (time) for bringing “task” reckless of skills or language alternative provided. dominant-stage exploration management also remains mostly consistent over the experiences or language alternatives. Overall, it can be concluded that the programming stage of the linguist doesn’t have an important impact. The top-stage strategies that participators used came to be identical reckless of the language alternative presented to them. As a suggestion for future research, the impact of various characteristics of polyglot programming languages should be studied in depth for the conclusions reached to remain correct across various polyglot programming contexts.