Deris Stiawan
Sriwijaya University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Deris Stiawan.
international conference on education technology and computer | 2010
Deris Stiawan; Abdul Hanan Abdullah; Mohd. Yazid Idris
In recent years, Intrusion Prevention System (IPS) have been widely implemented to prevent from suspicious threat. Unlike traditional Intrusion Detection System, IPS has additional features to secure computer network system. The additional features identifying and recognizing suspicious threat trigger alarm, event notification, through responsible response. However, IPS has issues problem, which affect the utilized overall system. In this paper we present the main challenging problem and steps to avoid that, such as (i) accuracy signature, (ii) the traffic volume, (iii) topology design, (iv) quota usage logging, (v) protecting intrusion prevention system, (vii) monitoring sensor, and (viii) collaboration of UTM. Finally, as part of our enhancements, we explored the possibility of making framework to collaborate and integrated various technologies of defense system, we called Unified Threat Management (UTM).
International Journal of Computer Applications | 2011
Deris Stiawan; Mohd. Yazid Idris; Abdullah Hanan Abdullah
the last few years, the Internet has experienced explosive growth. Along with the widespread evolution of new emerging services, the quantity and impact of attacks have been continuously increases, attackers continuously find vulnerabilities at various levels, from the network it self to operating system and applications, exploit the to crack system and services. Defense system and network monitoring has becomes essential component of computer security to predict and prevent attacks. Unlike traditional Intrusion Detection System (IDS), Intrusion Prevention System (IPS) has additional features to secure computer network system. In this paper, we present mapping problem and challenges of IPS. When this study was started in late 2000, there are some models and theories have been developed. Unfortunately, only a few works have done mapping the problem in IPS area, especially in hybrid mechanism. Throughout this paper, we summarize the main current methods and the promising and interesting future directions and challenges research field in IPS.
Journal of Information Processing Systems | 2015
Deris Stiawan; Mohammad Yazid Bin Idris; Abdul Hanan Abdullah
Along with the evolution of Internet and its new emerging services, the quantity and impact of attacks have been continuously increasing. Currently, the technical capability to attack has tended to decrease. On the contrary, performances of hacking tools are evolving, growing, simple, comprehensive, and accessible to the public. In this work, network penetration testing and auditing of the Redhat operating system (OS) are highlighted as one of the most popular OS for Internet applications. Some types of attacks are from a different side and new attack method have been attempted, such as: scanning for reconnaissance, guessing the password, gaining privileged access, and flooding the victim machine to decrease availability. Some analyses in network auditing and forensic from victim server are also presented in this paper. Our proposed system aims confirmed as hackable or not and we expect for it to be used as a reference for practitioners to protect their systems from cyber-attacks.
International Journal of Electrical and Computer Engineering | 2016
Tole Sutikno; Lina Handayani; Deris Stiawan; Munawar Agus Riyadi; Imam Much Ibnu Subroto
Tole Sutikno, Lina Handayani, Deris Stiawan, Munawar Agus Riyadi, Imam Much Ibnu Subroto Department of Electrical Engineering, Universitas Ahmad Dahlan, Yogyakarta, Indonesia Faculty of Public Health, Universitas Ahmad Dahlan, Yogyakarta, Indonesia Department of Computer Engineering, Universitas Sriwijaya, Palembang, Indonesia Department of Electrical Engineering, Universitas Diponegoro, Semarang, Indonesia Department of Informatics Engineering, Universitas Islam Sultan Agung, Semarang, Indonesia
International Conference on Informatics Engineering and Information Science, ICIEIS 2011 | 2011
Zohair Ihsan; Mohd. Yazid Idris; Khalid Hussain; Deris Stiawan; Khalid Mahmood Awan
Internet is based on best effort and end to end design principles. Although they are the reasons for the Internet’s high efficiency and popularity, they also resulted in many inherent security problems such as the Bandwidth Attacks. There are two main characteristics of bandwidth attack. First, during an attack the incoming traffic rate is much higher than the outgoing traffic rate. Second, the proportion of protocol exploited by the attacker is higher as compare to other protocols in the traffic. Based on these two characteristics, a UDP bandwidth attack detection system based on Protocol Share Based Traffic Rate Analysis (PSBTRA) is proposed. Experiments on real world network shows that this approach can effectively detect UDP bandwidth attacks.
international conference on information technology and electrical engineering | 2016
Deris Stiawan; Mohd. Yazid Idris; Reza Firsandaya Malik; Siti Nurmaini; Rahmat Budiarto
The Internet of Things (IoT) presents unique challenges in detecting anomaly and monitoring all connected devices in a network. Moreover, one of the objectives of anonymity in communication is to protect the data traffic of devices. The summary status visualization is indispensable to depict all devices/sensors that are most indicative of a pending failure and a predictive power/energy. Thus, this paper proposes a multi-platform monitoring and anomaly detection system that supports heterogeneous devices. The proposed system addresses the problems of: (i) how to monitor the network to prevent device failures and (ii) how to design a comprehensive feature for the early anomaly detection of IoT communication.
international conference on electrical engineering | 2017
Napsiah Amelia Putri; Deris Stiawan; Ahmad Heryanto; Tri Wanda Septian; Lelyzar Siregar; Rahmat Budiarto
Visualization became one of the solutions in showing the attack on the network. With Visualize the attack, it would be easier in recognizing and conclude the pattern from the complex image visual. The target of DoS attacks can be addressed to the various parts of the network, it can be routing, web, electronic mail or DNS servers (Domain Name System). The purpose of the DoS attacks create a server shutdown, reboot, crashes or not responding. The pattern of DoS attacks on the dataset ISCX form a pattern where much of his hosts IP just to exploit to a single server. Snort detects a DoS attack on testbed ISCX dataset as much as 42 alert HttpDoS attack. Percentage accuracy of the clustering algorithm using k-means of 97,83%, to its rate of detection 98,63%, and the false alarm of the programme amounting to 0.02%. Meanwhile, the value of the percentage accuracy of the clustering algorithm using k-means with tool WEKA of 99,69%, the detection rate of 99.01% and false alarms of 3.70%. The difference in accuracy between value and clustering tool WEKA caused the value of the centroid is used in mneg-cluster data packets randomly selected from a data value pack.
IOP Conference Series: Materials Science and Engineering | 2017
Siti Nurmaini; Reza Firsandaya Malik; Deris Stiawan; Firdaus; Saparudin; Bambang Tutuko
The information framework aims to holistically address the problems and issues posed by unwanted peat and land fires within the context of the natural environment and socioeconomic systems. Informed decisions on planning and allocation of resources can only be made by understanding the landscape. Therefore, information on fire history and air quality impacts must be collected for future analysis. This paper proposes strategic framework based on technology approach with data fusion strategy to produce the data analysis about peat land fires and air quality management in in South Sumatera. The research framework should use the knowledge, experience and data from the previous fire seasons to review, improve and refine the strategies and monitor their effectiveness for the next fire season. Communicating effectively with communities and the public and private sectors in remote and rural landscapes is important, by using smartphones and mobile applications. Tools such as one-stop information based on web applications, to obtain information such as early warning to send and receive fire alerts, could be developed and promoted so that all stakeholders can share important information with each other.
IOP Conference Series: Materials Science and Engineering | 2017
Munawar Agus Riyadi; Sad Prasetyowati; Tole Sutikno; Deris Stiawan
Note from Editors The 3rd International Conference of Electrical Engineering, Computer Science and Informatics (EECSI) 2016 was held in Semarang, Indonesia from 23th to 25th November, 2016. The conference was organized by Universitas Islam Sultan Agung as the host in collaboration with Universitas Diponegoro, Universitas Ahmad Dahlan and Universitas Sriwijaya, and with full technical support from IAES Indonesia Section. Authors and participants from 10 countries made the conference truly international in scope. Participants have delivered their talks of valuable research outputs that vary from many fields of electrical engineering (power electronics, telecommunication, electronics engineering, control system and signal processing) to the field of computer science and informatics. These wide range of topics have colorized this conference. This volume of IOP Conference Series: Materials Science and Engineering contains selected articles from those presented in the conference. After presentation, the revised papers were peer reviewed by fellow reviewers to ensure the quality of published materials. Finally, Editors decided to select and publish as many as 49 papers. It is hoped that the presented papers can offer more insight towards broad audience. On behalf of Editors, we appreciate enormous work of all staffs and reviewers in the preparation of this volume. We would like to express our sincere thanks to all authors and presenters for their valuable contributions. We hope to see you again in the next event of EECSI 2017 which will be held in Yogyakarta, Indonesia, next year. Guest Editors Munawar A Riyadi, PhD Dr. Sri Arttini Dwi Prasetyowati, Tole Sutikno, PhD Deris Stiawan, PhD
international conference on information technology and electrical engineering | 2016
Zahra Eskandari; Seyed Amin Hosseini Seno; Deris Stiawan; Bedine Kerim; Rahmat Budiarto
Clustering is a hierarchical method to data transmission in wireless sensor networks, which has a considerable effect on energy conservation. A balanced and efficient clustering has an important role in these networks. This paper discusses an optimal clustering method in wireless sensor network. Firstly, by considering energy and distance parameters, we model the clustering problem using two techniques, Integer Linear Programming and Linear Programming. Then we propose a clustering algorithm based on the optimal selected cluster heads. Experimental results shown that Linear Programming technique has better performance in energy consumption and network lifetime in comparison to the Integer Linear Programming technique.