Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Budi Rahardjo is active.

Publication


Featured researches published by Budi Rahardjo.


international conference on telecommunication systems services and applications | 2014

Traffic anomaly detection in DDos flooding attack

Yudha Purwanto; Kuspriyanto; Hendrawan; Budi Rahardjo

Researches have been conducted to overcome Distributed Denial of Service (DDoS) flooding attack. Beside the use of signature based detection, anomaly based detection is also used to detect the attack. Several methods such as statistic, information theory, data mining and forecasting have been proposed. In several researches, they just focused to detect the traffic anomaly, but not to recognize the types of anomaly that were detected such as flashcrowd, types of botnet, types of DDoS, and prevention action. In this paper we categorize anomaly traffic detection system based on process and capability focus. Anomaly detection system process including traffic features, preprocessing, and detection process. Capability focus based on each main research problem to be solved, there are detectingonly anomaly, types of anomaly, and prevention system that include process to overcome the attack. At the end of paper, we provide overview of research direction and opportunities that may be done in future research.


international conference on electrical engineering and informatics | 2011

Composite field multiplier based on look-up table for elliptic curve cryptography implementation

Marisa W. Paryasto; Budi Rahardjo; Fajar Yuliawan; Intan Muchtadi-Alamsyah; Kuspriyanto

In this work we propose the use of composite field to implement finite field multiplication, which will be use in ECC implementation. We use 299-bit keylength and GF((213)23) is used instead of GF(2299). Composite field multiplier can be implemented using conventional multiplication operation or using LUT (Look-Up Table). In this paper, LUT is used for multiplication in ground field and Karatsuba Offman Algorithm for the extension field multiplication. A generic architecture for the multiplier is presented. Implementation is done with VHDL with the target device Altera DE -2.


2016 4th International Conference on Cyber and IT Service Management | 2016

Designing an agile enterprise architecture for mining company by using TOGAF framework

Rika Yuliana; Budi Rahardjo

The role of ICT in the organization will continue to experience growth in line with business growth. However, in reality, there is a gap between ICT initiatives with the development (needs) of company business that is caused by yet inadequate of ICT strategic alignment. Therefore this study was conducted with the aim to create an agile enterprise architecture model rules, particularly in mining company, by using TOGAF framework. The results from the design development phase of the mining enterprise architecture meta model represents the domain of business, applications, data, and technology. The results of the design as a whole were analyzed from four perspectives, namely the perspective of contextual, conceptual, logical and physical. In the end, the quality assessment of the mining enterprise architecture is conducted to assess the suitability of the design standards and architectural principles.


2015 1st International Conference on Wireless and Telematics (ICWT) | 2015

Time based anomaly detection using residual polynomial fitting on aggregate traffic statistic

Yudha Purwanto; Kuspriyanto; Hendrawan; Budi Rahardjo

Flashcrowd and Distributed Denial of Service (DDoS) almost has similar symptom across network and server. But security element such Intrusion Detection System (IDS) must handle both differently. If IDS cannot differentiate flashcrowd and DDoS attack, Quality of Service of legal user traffic in flashcrowd will degraded. So it is important for IDS to differentiate between flashcrowd and DDoS. Many earlier comparison method could sense the anomalous event, but not pay much attention to identify which flow was the anomaly. We presented residual calculation between windowed aggregate traffic statistical value combination. With residual calculation among statistical percentile 10th and mean, a high accuracy of flashcrowd and DDoS differentiation of synthetic anomalous event gained. This method could directly identify the anomalous flow and perform visual analysis to detect the start to end of both event.


International Conference on ICT for Smart Society | 2013

Web application for Jigsaw-based cooperative learning

Oktariani Nurul Pratiwi; I Gusti Bagus Baskara Nugraha; Suhono Harso Supangkat; Budi Rahardjo

This paper describes an applications for supporting the cooperative learning by applying the Jigsaw method. Cooperative learning is the process which people gather in groups to teach each other what they know and understand. One of the famous method of cooperative learning is Jigsaw. But, using Jigsaw method need much time, hard to divide students into some groups and evaluation the learning process is not easy. We build a system that allows to help teachers support the cooperative learning process. In this paper we propose the cooperative learning tool that can help the teacher to grouping the students automatically, and help the teacher to evaluate the learning process.


international conference on electrical engineering and informatics | 2009

On applicability of chaos game method for block cipher randomness analysis

Budi Sulistyo; Budi Rahardjo; Dimitri Mahayana

Block cipher can be considered as a random permutation function which maps a set of plaintext character P to a set of ciphertext character C. Block cipher is designed in a way that the effort to distinguish it from a random permutation function will be very difficult or computationally infeasible. It this paper, block cipher randomness analysis is performed by using chaos game method. The method treats block cipher as a mapping function of a discrete time dynamical system. The system is used to generate a random sequence. Next, chaos game method analyzes the sequesnce in order to reveal its characteristics or regularities. The applicability of the method to reveal some characteristics of a block cipher is verified by using it for comparing the randomness of three-round and four-round SPN-network and distinguishing them from each other. So, the method can role as a distinguisher.


soft computing | 2015

Attribute Selection Based on Information Gain for Automatic Grouping Student System

Oktariani Nurul Pratiwi; Budi Rahardjo; Suhono Harso Supangkat

Cooperative learning is an approach of learning process together in small groups to solve problems together. Cooperative learning can enhance students’ ability higher than individual learning. One of the key that can affect the success of cooperative learning is formation. Heterogeneity in cooperative learning can improve cognitive performance. The problem is hard and need long time to determine students into an appropriate group. A student has many attributes that defined their characteristics from academic factor and non - academic factor, such as motivation in learning, self-interest, learning styles, friends, gender, age, educational background of parents, and other explanation of the uniqueness. The purpose of this study is to determine what is the most influential attribute in grouping process by calculate the information gain of each attributes. Then, we can reduce some attributes. The result of the experiment that the most influential and relevant attribute in the process of formating a group is learning style.


THE 5TH INTERNATIONAL CONFERENCE ON MATHEMATICS AND NATURAL SCIENCES | 2015

Implementation of Pollard Rho attack on elliptic curve cryptography over binary fields

Wienardo; Fajar Yuliawan; Intan Muchtadi-Alamsyah; Budi Rahardjo

Elliptic Curve Cryptography (ECC) is a public key cryptosystem with a security level determined by discrete logarithm problem called Elliptic Curve Discrete Logarithm Problem (ECDLP). John M. Pollard proposed an algorithm for discrete logarithm problem based on Monte Carlo method and known as Pollard Rho algorithm. The best current brute-force attack for ECC is Pollard Rho algorithm. In this research we implement modified Pollard Rho algorithm on ECC over GF (241). As the result, the runtime of Pollard Rho algorithm increases exponentially with the increase of the ECC key length. This work also presents the estimated runtime of Pollard Rho attack on ECC over longer bits.


Procedia Computer Science | 2015

Information Concealment Through Noise Addition

Budi Rahardjo; Kuspriyanto; Intan Muchtadi-Alamsyah; Marisa W. Paryasto

Abstract A novel method of concealing information is proposed. Encrypted data is mixed with noise to add the security. The cost of an attack increases linearly with the size of the added noise. Since generating noise is cheap, the size of noise can be as large as possible. However, there are issues in automatically detecting and separating noise in the intended recipient end. This stegocrypto method also provides protection from traffic analysis attack.


Electrical Engineering and Computer Science (ICEECS), 2014 International Conference on | 2015

Distributed intrusion detection system using cooperative agent based on ant colony clustering

Muhammad N. Abdurrazaq; Riyanto T. Bambang; Budi Rahardjo

Intrusion detection system (IDS) is another layer of protection as an important technology in information security. There are two major problems in the development of IDS, the algorithmic aspect of detection (computational), and aspects of the communication between components of detection (architectural). Computational problems including the ability of the novel-attack detection using ant colony clustering (ACC) is still lacking, large data traffic and computation overload. Architectural problems including the difficulty to overcome distributed and coordinated attacks, because it requires large amounts of distributed information, thus requiring synchronization between detection components of scattered information anyway. This paper proposes the multiagent architecture that implements distributed IDS based on ACC to recognize a new and coordinated attack, and the movement of large data handling, synchronization capabilities, the ability of cooperation between components without the presence of centralized computing components, good detection performance in real-time to turn on warning alarm.

Collaboration


Dive into the Budi Rahardjo's collaboration.

Top Co-Authors

Avatar

Kuspriyanto

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Intan Muchtadi-Alamsyah

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yudha Purwanto

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Hendrawan

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Oktariani Nurul Pratiwi

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Fajar Yuliawan

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Muhammad N. Abdurrazaq

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Suhono Harso Supangkat

Bandung Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge