Deris Stiawan
Universitas Sriwijaya

Published : 32 Documents
Articles

Found 32 Documents
Search

Attack and Vulnerability Penetration Testing: FreeBSD Stiawan, Deris; Idris, Mohd. Yazid; Abdullah, Abdul Hanan
TELKOMNIKA Telecommunication, Computing, Electronics and Control Vol 11, No 2: June 2013
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (474.412 KB)

Abstract

Computer system security has become a major concern over the past few years. Attacks, threasts or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM) data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.
PERSONAL DATA PROTECTION AND LIABILITY OF INTERNET SERVICE PROVIDER: A COMPARATIVE APPROACH Dharmawan, Ni Ketut Supasti; Kasih, Desak Putu Dewi; Stiawan, Deris
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 4: August 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (428.654 KB) | DOI: 10.11591/ijece.v9i4.pp3175-3184

Abstract

The users of electronic service provider often suffered losses caused by internet services did not work properly including losses due to leakage of personal data protection stored in cloud computing.  The study aims to examine electronic service provider liability upon their failure performing internet services properly and security attacks on cloud computing. This study was normative legal research by examining national and international legal materials. The finding shows that the electronic provider shall be responsible based on right and obligation agreed under the agreement.  Related to cloud computing, providing adequate security to avoid security attacks and misuse of private data that caused losses to the users becoming the liability of service provider. Based on the Federal Trade Commission Act, the liability arises on the grounds of deceptive and unfair trade practices.  Under the General Data Protection Regulation of the European Union, the liability arises on the basis as the controller then provider liable for compensation for user?s suffered damage. In Indonesia, based on the Electronic Information and Transaction Law Amendment, the liability to the owner of personal data whose rights are violated and suffered losses arises due to a failure of ISP protect the data security. For better protection in Indonesia, the protection of big data and clear territorial scope of protection become necessary to consider.
The Architecture of Indonesian Publication Index: A Major Indonesian Academic Database Subroto, Imam Much Ibnu; Sutikno, Tole; Stiawan, Deris
TELKOMNIKA Telecommunication, Computing, Electronics and Control Vol 12, No 1: March 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (447.819 KB)

Abstract

Journal articles are required all researchers as references to improve the quality of research so that the results are better than existing studies. The presence of many journal indexers that collect articles from many publishers and repositories are very helpful to lecturers and researchers to locate articles in their specific areas of interest. The main issues in the indexing include: (i) the selection and collection process articles data, (ii) the management of indexing based on source and relevance of science (iii) the accuracy and speed of the search process, and (iv) the relationship between the articles each other called citation. The desirable by readers from the indexer is to get relevant and good-quality articles easily and accurately. While the interest of the journal managers is to supply their article which reader preferred then hope many cited to their journals. This is where the position of an indexer to bridge publisher and reader. This paper presents the architecture of Indonesian Publications Index (IPI) as the bridge. This architecture is designed with three layers. The layers are the data collection layer, storage layer, and service layer. The functionality of the first layer is IPI collaboration with publishers, the second layer is the index management system, the third layer is a service to the readers. Service layer built on a variety of applications such as web based applications, mobile applications and e-library.
THE AUTHORITY OF GOVERNMENT IN CLEARING HATEFULL AND HOSTILITIES ELECTRONIC INFORMATION BASED ON TRIBE, RELEGION, RACE AND INTERGROUP Yusa, I Gede; Bunga, Dewi; Stiawan, Deris
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 6: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (474.818 KB) | DOI: 10.11591/ijece.v7i6.pp3735-3744

Abstract

The Act Number 19 of 2016 concerning the amendment of The Act Number 11 of 2008 concerning Information and Electronic Transaction governing the authority of government in clearing hateful and hostilities electronic information based on tribe, religion, race and intergroup. On the one hand, the government authority aims to protect the public interest and the integrity of the nation, but on the other hand, termination of access to information would restrict the right to freedom of opinion and the right to privacy of Internet users. This study was a normative legal research, which examined the basic authority for the government to shut down negative content in cyberspace. Legal materials were collected through library research. The analysis was conducted qualitatively. This study examined three issues, namely; spreading hatred and hostility in cyberspace, legality government to close the spreading hatred and hostility and electronic evidence in spreading hatred and hostility. Spreading hatred and hostility were criminal acts that used the Internet as facilities. Internet was used by extremists to disseminate his teachings, even being used to commit acts of terrorism (cyber terrorism). In maintaining the unity and integrity, then the government had the authority to shut down access to the unlawful electronic system. The closure should be accompanied by proof of electronic information that contains hatred and hostility based on tribe, religion, race and intergroup
Prototipe Laboratotium Bahasa Berbasis Komputer Menggunakan Model Arsitektur Three-Tier Rini, Dian Palupi; Stiawan, Deris; Lestari, Endang
Jurnal GENERIC Vol 4, No 2 (2009)
Publisher : Fakultas Ilmu Komputer - Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Laboratorium bahasa adalah sebuah ruang yang berisi perangkat keras dan perangkat lunak yang berfungsi sebagai tempat para siswa untuk melatih dan mengujikemampuan bahasanya. Prototipe laboratorium bahasa  berbasis komputer adalah sebuah perangkat lunak yang mengadopsi fungsi dari sebagian atau keseluruhan sebuah laboratorium bahasa. Three-Tier adalah arsitektur client-server dimana masingmasing  user interface,  functional process logic (business rules), data storage dan  data access dikembangkan dan disusun sebagai modul-modul yang berdiri sendiri. "three-tier" atau "threelayer", adalah bagian dari  multitier architectures. Sistem  threetier yang diterapkan pada prototipe laboratorium bahasa berbasis komputer memberi kemudahan pada pengelolaan aplikasi perangkat lunak yang berada pada layer logik dan pengelolaan data pada layer data, karena perubahan yang terjadi pada layer logic dan layer data tidak akan memberi pengaruh pada layer presentasi.
Optimalisasi Interkoneksi VPN Menggunakan Hardware Based dan Iix (Indonesia Internet Exchange) Sebagai Alternatif Jaringan Skala Luas (WAN) Stiawan, Deris; Rini, Dian Palupi
Jurnal GENERIC Vol 4, No 1 (2009)
Publisher : Fakultas Ilmu Komputer - Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (207.528 KB)

Abstract

Optimalisasi Interkoneksi VPN Menggunakan Hardware Based dan Iix (Indonesia Internet Exchange) Sebagai Alternatif Jaringan Skala Luas (WAN)
Attack and Vulnerability Penetration Testing: FreeBSD Stiawan, Deris; Idris, Mohd. Yazid; Abdullah, Abdul Hanan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 2: June 2013
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (556.113 KB) | DOI: 10.12928/telkomnika.v11i2.942

Abstract

 Computer system security has become a major concern over the past few years. Attacks, threats or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM) data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.
An Introduction to Journal Phishings and Their Detection Approach Dadkhah, Mehdi; Sutikno, Tole; Davarpanah Jazi, Mohammad; Stiawan, Deris
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (101.864 KB) | DOI: 10.12928/telkomnika.v13i2.1436

Abstract

Nowadays, the most important risk and challenge in online system are online scam and phishing attacks. Phishing attacks have been always used to steal important information of users. In this kind of scam, attacker direct victim to fake pages using social engineering techniques, then, starts stealing users` important information such as passwords. In order to confronting these attacks, numerous techniques have been invented which have the ability to confront different kinds of these attacks. Our goal in this paper is to introducing new kind of phishing attacks which are not identifiable by techniques and methods which have been invented to confronting phishing attacks. Unlike other kinds of phishing attacks which target all kinds of users, researchers are the victims of these kinds of journal phishing attacks. Finally, we`ll introduce an approach based on classification algorithms to identify these kind of journal phishing attacks and then we`ll check our suggested approach in error rate.
HUBUNGAN PRILAKU REMAJA BERINTERNET DI INDERALAYA Malik, Reza Firsandaya; Stiawan, Deris; Erwin, Erwin; Passarella, Rossi; sutarno, sutarno; Sembiring, Sarmayanta; Heryanto, Ahmad
Annual Research Seminar (ARS) Vol 1, No 1 (2015)
Publisher : Annual Research Seminar (ARS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Indralaya known as the City of Students and Education, also has more than 30 boarding school, and 60 senior high school / vocational school spread over Ogan Ilir. Implementation of community service performed in Inderalaya to determine the relationship of the behavior of teenagers surfs the internet and provide knowledge about healthy and safe while surfing an internet. The method of data collection using questionnaires. Number of questionnaires distributed as many as 27 participants from SMAN 1 Inderalaya Utara and Pondok Pesantren Al Ittifaqiyah based on age from 15 to 17 years. Results showed teenagers have the tendency to access the internet every day with a duration of 1-2 hours and mostly done in the bedroom. Applications often they use is social networking. The teens also have the courage to meet with people who are known via online with a percentage of 29.6%.
NETWORK-ON-CHIP PARADIGM FOR SYSTEM-ON-CHIP COMMUNICATION Budiarto, Rahmat; Siregar, Lelyzar; Stiawan, Deris
Computer Engineering and Applications Journal Vol 6 No 1 (2017)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (36.543 KB) | DOI: 10.18495/comengapp.v6i1.186

Abstract

Developments of modern technologies in electronics, such as communication, Internet, pervasive and ubiquitous computing and ambient intelligence have figured largely our life. In our day micro-electronic products inspire the ways of learning, communication and entertainment. These products such as laptop computer, mobile phones, and personal handheld sets are becoming faster, lighter in weight, smaller in size, larger in capacity, lower in power consumptions, cheaper and functionally enhanced. This trend will persistently continue. Following this trend, we could integrate more and more complex applications and even systems onto a single chip. The System-on-Chip (SoC) technologies, where complex applications are integrated onto single ULSI chips became key driving force for the developments.