Deris Stiawan
Universitas Sriwijaya

Published : 31 Documents
Articles

Found 31 Documents
Search

Attack and Vulnerability Penetration Testing: FreeBSD Stiawan, Deris; Idris, Mohd. Yazid; Abdullah, Abdul Hanan
TELKOMNIKA Telecommunication, Computing, Electronics and Control Vol 11, No 2: June 2013
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (474.412 KB)

Abstract

Computer system security has become a major concern over the past few years. Attacks, threasts or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM) data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.
The Implementation of Deep Neural Networks Algorithm for Malware Classification Afifah, Nurul; Stiawan, Deris
Computer Engineering and Applications Journal Vol 8 No 3 (2019)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18495/comengapp.v8i3.294

Abstract

Malware is very dangerous while attacked a device system. The device that can be attacked by malware is a Mobile Phone such an Android. Antivirus in the Android device is able to detect malware that has existed but antivirus has not been able to detect new malware that attacks an Android device. In this issue, malware detection techniques are needed that can grouping the files between malware or non-malware (benign) to improve the security system of Android devices. Deep Learning is the proposed method for solving problems in malware detection techniques. Deep Learning algorithm such as Deep Neural Network has succeeded in resolving the malware problem by producing an accuracy rate of 99.42%, precision level 99% and recall 99.4%.
Prototipe Laboratotium Bahasa Berbasis Komputer Menggunakan Model Arsitektur Three-Tier Rini, Dian Palupi; Stiawan, Deris; Lestari, Endang
Jurnal GENERIC Vol 4, No 2 (2009)
Publisher : Fakultas Ilmu Komputer - Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Laboratorium bahasa adalah sebuah ruang yang berisi perangkat keras dan perangkat lunak yang berfungsi sebagai tempat para siswa untuk melatih dan mengujikemampuan bahasanya. Prototipe laboratorium bahasa  berbasis komputer adalah sebuah perangkat lunak yang mengadopsi fungsi dari sebagian atau keseluruhan sebuah laboratorium bahasa. Three-Tier adalah arsitektur client-server dimana masingmasing  user interface,  functional process logic (business rules), data storage dan  data access dikembangkan dan disusun sebagai modul-modul yang berdiri sendiri. "three-tier" atau "threelayer", adalah bagian dari  multitier architectures. Sistem  threetier yang diterapkan pada prototipe laboratorium bahasa berbasis komputer memberi kemudahan pada pengelolaan aplikasi perangkat lunak yang berada pada layer logik dan pengelolaan data pada layer data, karena perubahan yang terjadi pada layer logic dan layer data tidak akan memberi pengaruh pada layer presentasi.
Optimalisasi Interkoneksi VPN Menggunakan Hardware Based dan Iix (Indonesia Internet Exchange) Sebagai Alternatif Jaringan Skala Luas (WAN) Stiawan, Deris; Rini, Dian Palupi
Jurnal GENERIC Vol 4, No 1 (2009)
Publisher : Fakultas Ilmu Komputer - Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (207.528 KB)

Abstract

Optimalisasi Interkoneksi VPN Menggunakan Hardware Based dan Iix (Indonesia Internet Exchange) Sebagai Alternatif Jaringan Skala Luas (WAN)
The Architecture of Indonesian Publication Index: A Major Indonesian Academic Database Subroto, Imam Much Ibnu; Sutikno, Tole; Stiawan, Deris
TELKOMNIKA Telecommunication, Computing, Electronics and Control Vol 12, No 1: March 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (447.819 KB)

Abstract

Journal articles are required all researchers as references to improve the quality of research so that the results are better than existing studies. The presence of many journal indexers that collect articles from many publishers and repositories are very helpful to lecturers and researchers to locate articles in their specific areas of interest. The main issues in the indexing include: (i) the selection and collection process articles data, (ii) the management of indexing based on source and relevance of science (iii) the accuracy and speed of the search process, and (iv) the relationship between the articles each other called citation. The desirable by readers from the indexer is to get relevant and good-quality articles easily and accurately. While the interest of the journal managers is to supply their article which reader preferred then hope many cited to their journals. This is where the position of an indexer to bridge publisher and reader. This paper presents the architecture of Indonesian Publications Index (IPI) as the bridge. This architecture is designed with three layers. The layers are the data collection layer, storage layer, and service layer. The functionality of the first layer is IPI collaboration with publishers, the second layer is the index management system, the third layer is a service to the readers. Service layer built on a variety of applications such as web based applications, mobile applications and e-library.
Prototipe Laboratotium Bahasa Berbasis Komputer Menggunakan Model Arsitektur Three-Tier Rini, Dian Palupi; Stiawan, Deris; Lestari, Endang
Jurnal GENERIC Vol 4, No 2 (2009)
Publisher : Fakultas Ilmu Komputer - Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Laboratorium bahasa adalah sebuah ruang yang berisi perangkat keras dan perangkat lunak yang berfungsi sebagai tempat para siswa untuk melatih dan mengujikemampuan bahasanya. Prototipe laboratorium bahasa  berbasis komputer adalah sebuah perangkat lunak yang mengadopsi fungsi dari sebagian atau keseluruhan sebuah laboratorium bahasa. Three-Tier adalah arsitektur client-server dimana masingmasing  user interface,  functional process logic (business rules), data storage dan  data access dikembangkan dan disusun sebagai modul-modul yang berdiri sendiri. "three-tier" atau "threelayer", adalah bagian dari  multitier architectures. Sistem  threetier yang diterapkan pada prototipe laboratorium bahasa berbasis komputer memberi kemudahan pada pengelolaan aplikasi perangkat lunak yang berada pada layer logik dan pengelolaan data pada layer data, karena perubahan yang terjadi pada layer logic dan layer data tidak akan memberi pengaruh pada layer presentasi.
Optimalisasi Interkoneksi VPN Menggunakan Hardware Based dan Iix (Indonesia Internet Exchange) Sebagai Alternatif Jaringan Skala Luas (WAN) Stiawan, Deris; Rini, Dian Palupi
Jurnal GENERIC Vol 4, No 1 (2009)
Publisher : Fakultas Ilmu Komputer - Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (207.528 KB)

Abstract

Optimalisasi Interkoneksi VPN Menggunakan Hardware Based dan Iix (Indonesia Internet Exchange) Sebagai Alternatif Jaringan Skala Luas (WAN)
Network-on-Chip Paradigm for System-on-Chip Communication Budiarto, Rahmat; Siregar, Lelyzar; Stiawan, Deris
Computer Engineering and Applications Journal Vol 6 No 1 (2017)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18495/comengapp.v6i1.186

Abstract

Developments of modern technologies in electronics, such as communication, Internet, pervasive and ubiquitous computing and ambient intelligence have figured largely our life. In our day micro-electronic products inspire the ways of learning, communication and entertainment. These products such as laptop computer, mobile phones, and personal handheld sets are becoming faster, lighter in weight, smaller in size, larger in capacity, lower in power consumptions, cheaper and functionally enhanced. This trend will persistently continue. Following this trend, we could integrate more and more complex applications and even systems onto a single chip. The System-on-Chip (SoC) technologies, where complex applications are integrated onto single ULSI chips became key driving force for the developments.
Attack and Vulnerability Penetration Testing: FreeBSD Stiawan, Deris; Idris, Mohd. Yazid; Abdullah, Abdul Hanan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 2: June 2013
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (556.113 KB) | DOI: 10.12928/telkomnika.v11i2.942

Abstract

 Computer system security has become a major concern over the past few years. Attacks, threats or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM) data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.
An Introduction to Journal Phishings and Their Detection Approach Dadkhah, Mehdi; Sutikno, Tole; Davarpanah Jazi, Mohammad; Stiawan, Deris
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (101.864 KB) | DOI: 10.12928/telkomnika.v13i2.1436

Abstract

Nowadays, the most important risk and challenge in online system are online scam and phishing attacks. Phishing attacks have been always used to steal important information of users. In this kind of scam, attacker direct victim to fake pages using social engineering techniques, then, starts stealing users` important information such as passwords. In order to confronting these attacks, numerous techniques have been invented which have the ability to confront different kinds of these attacks. Our goal in this paper is to introducing new kind of phishing attacks which are not identifiable by techniques and methods which have been invented to confronting phishing attacks. Unlike other kinds of phishing attacks which target all kinds of users, researchers are the victims of these kinds of journal phishing attacks. Finally, we`ll introduce an approach based on classification algorithms to identify these kind of journal phishing attacks and then we`ll check our suggested approach in error rate.