There are several ways to increase detection accuracy result on the intrusion detection systems (... more There are several ways to increase detection accuracy result on the intrusion detection systems (IDS), one way is feature extraction. The existing original features are filtered and then converted into features with lower dimension. This paper uses the Principal Components Analysis (PCA) for features extraction on intrusion detection system with the aim to improve the accuracy and precision of the detection. The impact of features extraction to attack detection was examined. Experiments on a network traffic dataset created from an Internet of Thing (IoT) testbed network topology were conducted and the results show that the accuracy of the detection reaches 100 percent
In a secret message, cryptography is more directed to the encrypted message while steganography i... more In a secret message, cryptography is more directed to the encrypted message while steganography is more directed at the hidden message. However, both methods have the same goal, namely the attempt to conceal the message. On the other side, it turns out the use of cryptography can often be solved / translated by another person or cryptanalyst. This is possible because usually a text message unreadable gives someone suspicion that the text message contains a certain meaning for the owner of the message. Thus, the cryptanalyst attempts to break the encrypted message. While the use of steganography owner of the information is difficult to determine the method or pattern to be formed in composing the message that will be hidden. In this paper, the authors modify the Caesar cipher method that produces ciphertext that can be read. With the ciphertext that can be read, then cryptanalysis not suspicious of the ciphertext. Caesar cipher modification is done by replacing the alphabet into two parts, the vocals were replaced with the alphabet vocal too, and the consonant alphabet was replaced with a consonantal alphabet. However, there are some alphabet consonants are not replaced, this is because the frequency of the alphabet is rarely used in an Indonesian text. From the test results obtained ciphertext that can be read. With the ciphertext that can be read, then the cryptanalyst not suspicious of the message so that the cryptanalyst does not attempt to solve the ciphertext
Internet banking services is strongly influenced by developments in information technology, which... more Internet banking services is strongly influenced by developments in information technology, which on the one hand can make the running of banking transactions more convenient and comfortable, but on the other hand internet banking service also has risks. Looking at it, the safety factor should be a very important concern in this internet banking service. This is possible because the internet banking application is done of course through internet access. By connecting the network to the Internet opens the potential for security holes (security hole) that was able to be covered by the physical security mechanisms. Some aspects of security including confidentiality, integrity, authentication and availablelity, have been met in the internet banking service on klikBCA and BSMNetbanking. But there is a difference between the two methods of security aspects of the banking services. In the aspect of confidentiality in the access log, klikBCA username contains 12 characters consisting of eight-character alphabet and four numeric characters, and six numeric characters in the password. While the load BSMNetbanking username only eight numeric characters and four numeric characters in the password. Transaction authorization on KlikBCA memua two layers authorization (Apply 1 and apply2) via Token Key. While BSMNetbanking only one layer of authorization through TAN sheet. For certification KlikBCA authentication using BSMNetbanking cybertrust while using Verisign.
Salah satu dari perkembangan teknologi informasi dan komunikasi adalah adanya komunikasi
melal... more Salah satu dari perkembangan teknologi informasi dan komunikasi adalah adanya komunikasi melalui pesan teks atau lebih dikenal dengan SMS (Short Message Service). SMS adalah sebuah layanan komunikasi pesan teks yang ditempatkan pada perangkat telepon genggam (handphone) dimana pengguna saling berkomunikasi melalui perangkat handphone untuk bertukar informasi melalui pesan teks. Isi dari pesan teks tersebut bervariasi mulai dari pesan yang bersifat umum hingga pada pesan yang sifatnya rahasia. Apabila pesan yang disampaikan bersifat rahasia, lalu disadap oleh pihak lain, maka pesan tersebut dapat terbuka dan dibaca oleh pihak yang menyadap. Artinya pesan yang disampaikan melalui media komunikasi handphone rentan terhadap penyadapan. Algoritma RC6 merupakan metode kriptografi yang mampu mengacak informasi atau pesan dengan baik. Aplikasi CryptoSMS RC6 dapat membantu mengamankan pesan dengan baik sehingga pihak-pihak tertentu tidak dapat membaca pesan tersebut.
There are several ways to increase detection accuracy result on the intrusion detection systems (... more There are several ways to increase detection accuracy result on the intrusion detection systems (IDS), one way is feature extraction. The existing original features are filtered and then converted into features with lower dimension. This paper uses the Principal Components Analysis (PCA) for features extraction on intrusion detection system with the aim to improve the accuracy and precision of the detection. The impact of features extraction to attack detection was examined. Experiments on a network traffic dataset created from an Internet of Thing (IoT) testbed network topology were conducted and the results show that the accuracy of the detection reaches 100 percent
In a secret message, cryptography is more directed to the encrypted message while steganography i... more In a secret message, cryptography is more directed to the encrypted message while steganography is more directed at the hidden message. However, both methods have the same goal, namely the attempt to conceal the message. On the other side, it turns out the use of cryptography can often be solved / translated by another person or cryptanalyst. This is possible because usually a text message unreadable gives someone suspicion that the text message contains a certain meaning for the owner of the message. Thus, the cryptanalyst attempts to break the encrypted message. While the use of steganography owner of the information is difficult to determine the method or pattern to be formed in composing the message that will be hidden. In this paper, the authors modify the Caesar cipher method that produces ciphertext that can be read. With the ciphertext that can be read, then cryptanalysis not suspicious of the ciphertext. Caesar cipher modification is done by replacing the alphabet into two parts, the vocals were replaced with the alphabet vocal too, and the consonant alphabet was replaced with a consonantal alphabet. However, there are some alphabet consonants are not replaced, this is because the frequency of the alphabet is rarely used in an Indonesian text. From the test results obtained ciphertext that can be read. With the ciphertext that can be read, then the cryptanalyst not suspicious of the message so that the cryptanalyst does not attempt to solve the ciphertext
Internet banking services is strongly influenced by developments in information technology, which... more Internet banking services is strongly influenced by developments in information technology, which on the one hand can make the running of banking transactions more convenient and comfortable, but on the other hand internet banking service also has risks. Looking at it, the safety factor should be a very important concern in this internet banking service. This is possible because the internet banking application is done of course through internet access. By connecting the network to the Internet opens the potential for security holes (security hole) that was able to be covered by the physical security mechanisms. Some aspects of security including confidentiality, integrity, authentication and availablelity, have been met in the internet banking service on klikBCA and BSMNetbanking. But there is a difference between the two methods of security aspects of the banking services. In the aspect of confidentiality in the access log, klikBCA username contains 12 characters consisting of eight-character alphabet and four numeric characters, and six numeric characters in the password. While the load BSMNetbanking username only eight numeric characters and four numeric characters in the password. Transaction authorization on KlikBCA memua two layers authorization (Apply 1 and apply2) via Token Key. While BSMNetbanking only one layer of authorization through TAN sheet. For certification KlikBCA authentication using BSMNetbanking cybertrust while using Verisign.
Salah satu dari perkembangan teknologi informasi dan komunikasi adalah adanya komunikasi
melal... more Salah satu dari perkembangan teknologi informasi dan komunikasi adalah adanya komunikasi melalui pesan teks atau lebih dikenal dengan SMS (Short Message Service). SMS adalah sebuah layanan komunikasi pesan teks yang ditempatkan pada perangkat telepon genggam (handphone) dimana pengguna saling berkomunikasi melalui perangkat handphone untuk bertukar informasi melalui pesan teks. Isi dari pesan teks tersebut bervariasi mulai dari pesan yang bersifat umum hingga pada pesan yang sifatnya rahasia. Apabila pesan yang disampaikan bersifat rahasia, lalu disadap oleh pihak lain, maka pesan tersebut dapat terbuka dan dibaca oleh pihak yang menyadap. Artinya pesan yang disampaikan melalui media komunikasi handphone rentan terhadap penyadapan. Algoritma RC6 merupakan metode kriptografi yang mampu mengacak informasi atau pesan dengan baik. Aplikasi CryptoSMS RC6 dapat membantu mengamankan pesan dengan baik sehingga pihak-pihak tertentu tidak dapat membaca pesan tersebut.
Uploads
Papers by Benni Purnama
melalui pesan teks atau lebih dikenal dengan SMS (Short Message Service). SMS adalah sebuah
layanan komunikasi pesan teks yang ditempatkan pada perangkat telepon genggam (handphone)
dimana pengguna saling berkomunikasi melalui perangkat handphone untuk bertukar informasi
melalui pesan teks. Isi dari pesan teks tersebut bervariasi mulai dari pesan yang bersifat umum
hingga pada pesan yang sifatnya rahasia. Apabila pesan yang disampaikan bersifat rahasia, lalu
disadap oleh pihak lain, maka pesan tersebut dapat terbuka dan dibaca oleh pihak yang
menyadap. Artinya pesan yang disampaikan melalui media komunikasi handphone rentan
terhadap penyadapan. Algoritma RC6 merupakan metode kriptografi yang mampu mengacak
informasi atau pesan dengan baik. Aplikasi CryptoSMS RC6 dapat membantu mengamankan
pesan dengan baik sehingga pihak-pihak tertentu tidak dapat membaca pesan tersebut.
melalui pesan teks atau lebih dikenal dengan SMS (Short Message Service). SMS adalah sebuah
layanan komunikasi pesan teks yang ditempatkan pada perangkat telepon genggam (handphone)
dimana pengguna saling berkomunikasi melalui perangkat handphone untuk bertukar informasi
melalui pesan teks. Isi dari pesan teks tersebut bervariasi mulai dari pesan yang bersifat umum
hingga pada pesan yang sifatnya rahasia. Apabila pesan yang disampaikan bersifat rahasia, lalu
disadap oleh pihak lain, maka pesan tersebut dapat terbuka dan dibaca oleh pihak yang
menyadap. Artinya pesan yang disampaikan melalui media komunikasi handphone rentan
terhadap penyadapan. Algoritma RC6 merupakan metode kriptografi yang mampu mengacak
informasi atau pesan dengan baik. Aplikasi CryptoSMS RC6 dapat membantu mengamankan
pesan dengan baik sehingga pihak-pihak tertentu tidak dapat membaca pesan tersebut.