Nashrul Hakiem
Syarif Hidayatullah State Islamic University Jakarta
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Nashrul Hakiem.
2013 IEEE Symposium on Computers & Informatics (ISCI) | 2013
A Haris Rangkuti; Nashrul Hakiem; Rizal Broer Bahaweres; Agus Harjoko; Agfianto Eko Putro
This paper carried out to develop the concept of CBIR by using Wavelet Transform Methods for feature form and texture extraction and adaptive histogram for feature color extraction. The method is not only recognize the images that have been stored in database, but also be able to find some resemblance ornament image or texture as well as form. Although They are different size, direction of slope, and the layout of texture and color. In calculating the percentage of similarity is not only based on performance measurement precision but also the image of the relevant. Basically Grade value calculation is using the fuzzyfication process to get the similarity values with the S-curve which is then used as input to perform retrieval of image with the threshold algorithm. It will display the image based on the representation of the highest grade in each query image, which has been compared with the image database. High grade values indicates that the characteristic image of the sample (query) is similar to the image database and others. After that proceed by comparing the value of grade representation of the image by using the min operator in fuzzy logic. The Advantage threshold algorithm is the simplicity of similarity image process when the performance of CBIR becomes more reliable.
international conference on computer and communication engineering | 2012
Nashrul Hakiem; Mohammad Umar Siddiqi; Sigit Puspito Wigati Jarot
The paper presents results of collision probability evaluation of a one-to-many reversible mapping between user space and IPv6 address space which is developed to improve of IPv6 addresses generation in a local area network (LAN). Each time a user accesses the network, a dynamic unicast IPv6 address is given via DHCPv6 (Dynamic Host Configuration Protocol for IPv6) server to protect users from unwanted behavior analysis exploiting IPv6 addresses, thus protecting user privacy. This IPv6 address is generated dynamically using CFB (Cipher Feedback) mode of AES (Advanced Encryption Standard) algorithm based on user identity. The dynamic address can be uniquely linked to user if the need arises to allow network administrator to identify user based on captured IPv6 address during any security event. Checksum has been used for validation of probability of coincidental match of randomly generated Interface Id or generated by some other mechanism. The collision probability of the one-to-many reversible mapping for stateful IPv6 address assignment is evaluated using birthday paradox. The results show that the collision probability is very small indeed. The one-to-many reversible mechanism may be incorporated as an extension to the current DHCPv6 software.
Archive | 2012
Nashrul Hakiem; Akhmad Unggul Priantoro; Mohammad Umar Siddiqi; Talib Hashim Hasan
The proliferation of enterprise wireless network raises the security concern in any organization despite the unarguable benefits it brings about. At the same time, the initiative to migrate from IPv4 (Internet Protocol version four) to IPv6 (Internet Protocol version six) is gaining momentum across the globe to resolve the IP address depletion problem as well as reaping the benefit of it. This research proposes a new scheme to manage IPv6 addresses in an enterprise wireless local area network (WLAN) which may be incorporated into DHCPv6 (Dynamic Host Configuration Protocol for IPv6) software. In this scheme each user is assigned a dynamic IPv6 address that is generated cryptographically. Each time a user tries to access the network, different IPv6 address will be given which is generated using CFB (Cipher Feedback) mode of AES (Advanced Encryption Standard) algorithm, whereby there is a one-to-many reversible mapping between user and IPv6 addresses. In this way, it is possible for the network administrator to identify users in real time from their IPv6 address although a user’s IP address regularly changed. Dynamically changing IP address will impede an external network adversary’s effort to track user’s online behavior, thus enhancing privacy.
international conference on computer and communication engineering | 2010
Nashrul Hakiem; Akhmad Unggul Priantoro; Abdul Mutholib; Mohammad Umar Siddiqi; Talib Hashim Hasan
This paper discusses the implementation of IPv6 address generation/assignment mechanism proposed in [1] in Dibbler DHCPv6. In the mechanism, each user is assigned with random address which uniquely allocated for his/her exclusive use. It is shown that it can be incorporated into existing Dibbler software and tested under various network topologies. The proposed mechanism will enhance user privacy by dynamic address assignment and yet does not compromise network visibility since users can be traced individually regardless of dynamically changing IPv6.
international conference on information and communication technology | 2010
Nashrul Hakiem; Akhmad Unggul Priantoro; Mohammad Umar Siddiqi; Talib Hashim Hasan
The proliferation of enterprise wireless network raises the security concern in any organization despite the unarguable benefits it brings about. At the same time, the initiatives to migrate from IPv4 (Internet Protocol version four) to IPv6 (Internet Protocol version six) is gaining momentum across the globe to resolve the IP address depletion problem as well as reaping the benefit of it.
information integration and web-based applications & services | 2016
Syopiansyah Jaya Putra; Khodijah Hulliyah; Nashrul Hakiem; Rayi Pradono Iswara; Asep Fajar Firmansyah
This paper presents a work in generating Weighted Vector for each Concept in Indonesian Translation of Quran (ITQ). This task is done in aiming to provide a resource needed in implementing a semantic-based question answering system (QAS) for Indonesian ITQ, particularly in retrieving semantically related verses. Semantic approach on QAS employs Ontology concepts of the domain. Since there is no Ontology for ITQ remains, we built one by utilizing the existing Ontology from Quranic Arabic corpus (http://corpus.quran.com/). Furthermore, each leaf concept that enriched by related Quran verse (as its instance) had a representation vector of terms that occur in the corresponding Quran verse to express how strength the concept in relates with verse terms. This vector is assigned with a weight resulted from applying TFIDF method. From 222 leaf concepts in the Ontology, we applied the process only to those that categorized as a member group of Person, Location, and Time named entity. They are 107 in a total. The result shows that the most strength concept in association with verse terms is syaitan which is scored at 0.895 of 1. In overall, 16.82 % concepts had score that more than 0.4, following by 14.95%, 23.36% and 11.21% concepts scored at more than 0.3 ,0.2 and less than 0.1 respectively, and finally the rest ones were the biggest in volume where 33.64% concepts obtained score more than 0.1 and less than 0.2.
International Journal of Network Security | 2015
Nashrul Hakiem; Mohammad Umar Siddiqi; Hashum Mohamed Rafiq
Owner identification is an important aspect of improving network visibility and enhancing network security within local area networks deploying IPv6. This paper presents a simulation study for owner identification in an enterprise local area network from their IPv6 addresses. The study is based around the reverse implementation (many-to-one mapping) of a one-to-many reversible mapping. The paper reviews the many-to-one mechanism and the associated simulation software development, followed by presentation of results obtained from required functional tests. The IPv6 address data can be obtained from the output of any network monitoring software. In addition to a text format for verification, it also uses a checksum for validation which is used during the IPv6 address generation and identification. The simulation software given here can easily identify an IPv6 address owner if the IPv6 address is properly generated by the mechanism and it can display particular verification messages.
2017 International Young Engineers Forum (YEF-ECE) | 2017
Hibatul Wafi; Andrew Fiade; Nashrul Hakiem; Rizal Broer Bahaweres
Todays Internet technology is not free from problems. Unfortunately, it is used by people who have no right to steal important data. The National ICT Training and Research Center (PUSTIKNAS) Ministry of Communication and Information Technology the Republic of Indonesia is one of the government agencies that often suffer experimental intrusion by outsiders. One solution is to implement a honeypot system that can be used to improve the security of the Internet network and can detect intrusion attempts or attacks. A honeypot system with a Modern Honey Network (MHN) has been developed to make deployment and management easier and to make the honeypot more secure. The honeypots used in this study are the Kippo, Glastopf, Dionaea honeypots. With testing of the honeypot system in the form of an intrusive attack, it can be concluded that the honeypot system managed to outwit the attacker by opening ports on a server that turned the port into a hoax and was cleared. In addition, the suspicious activity was recorded and the attacks detected.
2016 International Conference on Informatics and Computing (ICIC) | 2016
Siti Ummi Masruroh; Fadly Robby; Nashrul Hakiem
A Routing Protocol is a rule that determines how routers can communicate with each other. The development of modern computer networks such as the Internet makes routing protocols increasingly required to find the best and efficient route. This study examined the performance of routing protocols RIPng, OSPFv3, and EIGRP in an IPv6 network by using GNS3 based on parameters of throughput, jitter and packet loss. Throughput is the actual speed of a network, the higher the throughput then the faster the data transfer can be completed. Jitter is the difference in the arrival time interval between packets at the destination node. To get a better value of QoS (Quality of Service), the value of jitter must be kept to a minimum. Packet loss is the number of lost data packets during the data transmission process. To get a better QoS value, the value of packet loss must also be kept to a minimum. The results of this research indicate that the RIPng routing protocol has the highest throughput value, whilst a combination of OSPFv3-EIGRP routing protocols has the smallest jitter value. Lastly, the RIPng routing protocol has the smallest value for packet loss.
international conference on information and communication technology | 2014
Nashrul Hakiem; Abdul Mutholib; Umar Aditiawarman
This paper presents the development of a mobile based voter information management system for the 2014 Indonesian Presidential Election with regard to the case of the Indonesian voters in Malaysia. The growth of the number of smart phone users across the whole world has significantly increased over the last decade, especially in Asia. In keeping with this situation, the need for information has also indicated an ascending trend. One of smart phone advantages is the ability to meet the information needs of users by providing mobile applications with high portability.