Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Baskoro Adi Pratomo is active.

Publication


Featured researches published by Baskoro Adi Pratomo.


international conference on technologies and applications of artificial intelligence | 2013

Falls Detection and Notification System Using Tri-axial Accelerometer and Gyroscope Sensors of a Smartphone

Waskitho Wibisono; Dedy Nur Arifin; Baskoro Adi Pratomo; Tohari Ahmad; Royyana Muslim Ijtihadie

Fall situations can be risky especially for elderly people with health problems. This fact has highlighted the need of fall detection systems. Various fall detection systems have been proposed. The proposed systems commonly used special devices placed at several position of users body. On the other hand, smartphones with various sensors including gyroscopes are available in the market nowadays. This has motivated us to propose a prototype system of fall detection application designed for a smart phone. A threshold based fall detection algorithm is adapted for the proposed system since it relatively requires lower computational processes compared to complex reasoning techniques. Hence is more suitable to be implemented in smart phones with limited resource and processing power. The basic idea of the algorithm is to detect dynamic situations of posture, followed by unintentional falls to lying postures. The algorithm monitors sets of linear acceleration data and angular velocity and compares them to set of thresholds obtained from training data from the observed user. The process to detect a fall situation followed by sending notification to colleagues can be done in real-time manners while still maintain high accuracy for certain fall situations.


2014 International Symposium on Technology Management and Emerging Technologies | 2014

SQL injection detection and prevention system with raspberry Pi honeypot cluster for trapping attacker

Supeno Djanali; F. X. Arunanto; Baskoro Adi Pratomo; Hudan Studiawan; Satrio Gita Nugraha

One of the most common security attack for web application is SQL injection. It is an attack to acquire access to applications database through injection of script or malicious query attributes. This attack can be executed in any page of web application which interacts with database. SQL injection could be more dangerous if the victim was an enterprise system such as online banking. Many methods have been researched and developed to prevent SQL injection attacks. One of them is the use of a honeypot. This paper proposed a method for increasing systems capability to detect and prevent SQL injection attacks based on removal of SQL query attribute values and honeypot for trapping attackers. A honeypot is placed as decoy system to hide actual web server from attacker. Malicious queries from attackers will be sent to honeypot while normal queries will be sent directly to the real web server. Honeypot is also used to provide activity logging of each attack which can be used for further analysis. We play with Raspberry Pi because it is cheap and effective to be used as a honeypot. Due to its limited computational ability, we make cluster to improve its power. Based on conducted experiments, we could achieve up to 64% accuracy of SQL injection attack. Moreover, with the redirection, our honeypot could get more attack data to be analyzed.


international conference on information and communication technology | 2016

Clustering of SSH brute-force attack logs using k-clique percolation

Hudan Studiawan; Baskoro Adi Pratomo; Radityo Anggoro

The brute-force attacks to SSH service still persist in the server environments. The existing methods have not applied graph theory to analyze authentication log that records this attack. Therefore, we model the log as a graph and propose k-clique percolation to cluster auth.log file to assist the system administrators to inspect this incident. The k-clique percolation has proven in clustering of biological networks and we will deploy it to this problem. We then provide the mechanism for edge removal to separate the generated clusters and make clear the clustering outputs. The experimental results show that this approach is appropriate to cluster raw logs of SSH brute-force attacks.


Jurnal Teknologi Informasi dan Ilmu Komputer | 2016

Optimasi Pemilihan Layanan Streaming Multimedia Berbasis UPnP Untuk Kondisi Dinamis

Fariz Andri Bakhtiar; Waskitho Wibisono; Baskoro Adi Pratomo

Abstrak Universal Plug and Play (UPnP) memungkinkan adanya jaringan tanpa konfigurasi dan administrasi manual. UPnP bekerja pada jaringan yang mendukung pesan multicast . Ia mengatur pengalamatan, penemuan, deskripsi, serta pemilihan perangkat dan layanan. Proses penemuan layanan dalam lingkungan dinamis harus mengurangi konfigurasi manual, memungkinkan penemuan otomatis dan pemilihan layanan yang optimal, serta menawarkan secara terkini layanan-layanan yang tersedia. Pada kondisi di mana beberapa host menyediakan layanan yang sama, bagaimana klien memilih layanan menjadi permasalahan tersendiri. Pemilihan layanan yang paling sesuai dapat dilakukan secara otomatis oleh klien UPnP. Pemilihan layanan dilaksanakan berdasarkan parameter yang mencerminkan kondisi jaringan saat itu, seperti delay dan packet loss . Pada aplikasi-aplikasi streaming multimedia berbasis UPnP yang ada, pemilihan layanan dilakukan tanpa penentuan prioritas sama sekali. Aplikasi klien mengambil begitu saja salah satu layanan streaming multimedia dari sejumlah perangkat penyedia layanan di jaringan, bahkan secara acak. Implementasi aplikasi streaming multimedia di lingkungan dinamis menyebabkan perlunya optimasi terhadap mekanisme pemilihan layanan yang sudah ada. Pada penelitian ini diusulkan metode dalam melakukan optimasi pada pemilihan layanan streaming multimedia berbasis UPnP untuk kondisi dinamis, yaitu kondisi di mana dapat terjadi perubahan pada delay , packet loss , dan ketersediaan layanan. Dari hasil percobaan, terbukti bahwa optimasi tersebut menurunkan end-to-end delay rata-rata antara klien dengan penyedia layanan streaming multimedia sebesar 35,343%, meski terdapat anomali pada beberapa skenario, yaitu naiknya end-to-end delay rata-rata, yang bisa jadi dipengaruhi oleh peningkatan beban kerja penyedia layanan. Kata kunci : pemilihan layanan, streaming, UPnP Abstract Universal Plug and Play (UPnP) enables networking without manual configuration and administration. UPnP works at a network supporting multicast messages. It arranges addressing, discovery, description, and also device and service selection. The process of service discovery in dynamic environment should reduce manual configuration, enable automatic discovery and optimal service selection, and also offer up-to-date services available. In a condition where some hosts run same services, how clients select them becomes one interesting issue. The selection of the most appropriate service is to be done automatically by UPnP clients. Service selection will be held based on current condition of the network, such as delay and packet loss. On existing multimedia streaming applications, service selection is done without any prioritizing. Client applications just fetch a service from a number of service providers in the network, even randomly. Implementations of multimedia streaming applications in dynamic environment, where there might be changes on delay, packet loss, and the availability of services at service providers, causes the urgency of optimization in existing service selection mechanism. In this study, a method of optimizing the UPnP-based service selection of multimedia streaming for dynamic condition is proposed. Experiments prove that the optimization reduces average end-to-end delay between clients and multimedia streaming service providers at the rate of 35.343%. There were anomalies at some scenarios though. Some delay grew higher, which could be affected by the increase of service providers’ load. Keywords : service selection, streaming, UPnP


international conference on information technology, computer, and electrical engineering | 2014

Aggressive web application honeypot for exposing attacker's identity

Supeno Djanali; F. X. Arunanto; Baskoro Adi Pratomo; Abdurrazak Baihaqi; Hudan Studiawan; Ary Mazharuddin Shiddiqi


Electronic Government, An International Journal | 2018

Vote identification and integrity of ballot in paper-based e-voting system

Supeno Djanali; Danang Prawira Nugraha; Hudan Studiawan; Baskoro Adi Pratomo


international conference on information and communication technology | 2016

Design and development of voting data security for electronic voting (E-Voting)

Supeno Djanali; Baskoro Adi Pratomo; Karsono Puguh Nindyo Cipto; Astandro Koesriputranto; Hudan Studiawan


Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control | 2016

PENGEMBANGAN MEKANISME OTENTIKASI DAN OTORISASI MANAJEMEN CONFIG PADA KASUS SHARED WEB HOSTING BERBASIS LINUX CONTAINER

Saifuddin Saifuddin; Royyana Muslim Ijtihadie; Baskoro Adi Pratomo


Jurnal Teknik ITS | 2016

Evaluasi Sistem Pendeteksi Intrusi Berbasis Anomali dengan N-gram dan Incremental Learning

I Made Agus Adi Wirawan; Royyana Muslim Ijtihadie; Baskoro Adi Pratomo


JUTI: Jurnal Ilmiah Teknologi Informasi | 2016

SISTEM DETEKSI INTRUSI MENGGUNAKAN N-GRAM DAN COSINE SIMILARITY

Baskoro Adi Pratomo; Royyana Muslim Ijtihadie

Collaboration


Dive into the Baskoro Adi Pratomo's collaboration.

Top Co-Authors

Avatar

Hudan Studiawan

Sepuluh Nopember Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Royyana Muslim Ijtihadie

Sepuluh Nopember Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Supeno Djanali

Sepuluh Nopember Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Ary Mazharuddin Shiddiqi

Sepuluh Nopember Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

F. X. Arunanto

Sepuluh Nopember Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Tohari Ahmad

Sepuluh Nopember Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Waskitho Wibisono

Sepuluh Nopember Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Abdurrazak Baihaqi

Sepuluh Nopember Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Astandro Koesriputranto

Sepuluh Nopember Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Dedy Nur Arifin

Sepuluh Nopember Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge