nur widiyasono | Siliwangi university (original) (raw)
Papers by nur widiyasono
Journal of Advanced Research in Applied Sciences and Engineering Technology 50, Issue 1 (2025) 121-135, 2024
The growing versatility of Internet of Things devices increases the possibility of multiple attac... more The growing versatility of Internet of Things devices increases the possibility of multiple attacks occurring and being carried out continuously. The limited processing capabilities and memory capacity of Internet of Things devices pose challenges for security and forensic analysis in collecting and documenting various attacks targeting
these devices during the forensic investigation process. Thus, forensic investigative
analysis goes beyond expectations, offering a holistic understanding of the complex
consequences arising from IoT device attacks that have occurred. These issues and
challenges provide important insights into vulnerabilities, potential future threats, and
steps to effectively increase the resilience of the IoT ecosystem against the evolving
cyber-attack risk landscape. Apart from that, the large amount of IoT attack data
generated raises several problems. Such as the difficulty of quickly identifying threats
and in-depth forensic analysis of each very diverse attack. The implementation of
artificial intelligence is a very useful solution in overcoming the forensic investigation
challenges that arise due to IoT attacks with the enormous increase in data volume and
complexity. Therefore, this research aims and proposes to improve the IoT forensic
readiness framework by collecting and analyzing digital evidence in detecting various attacks from various IoT devices automatically based on an artificial intelligence approach and functioning as an early warning system. Enhanced the proposed IoT forensic readiness framework based on ISO/IEC 27043 serves as a prototype for detecting and collecting various types of attacks as potential digital evidence from various IoT devices, as well as effective forensic investigation of digital evidence with
the utilization of smart repository.
Journal of Advanced Research in Applied Sciences and Engineering Technology48, Issue 2(2025) 49-62, 2024
Stealer is a malware variant discovered in early March 2020 by proof point analyst. Redline is fa... more Stealer is a malware variant discovered in early March 2020 by proof point analyst. Redline is famous for its ability to bypass the antivirus scan. Redline Stealer was created by hacker with the purpose to steal victim's information such as login data, password and credit card information from the browser application that used in infected computer. This research uses static and dynamic methods to analyze redline stealers. The process of static analysis is carried out by observing the malware's sample file, while dynamic analysis is carried out by monitoring malware's activity when the malware is running on the system. This research show that Redline Stealer uses the obfuscation feature based on .net, which can run only when there is an internet connection, stealing sensitive information, especially in a browser application. The conclusion of this research is Redline Stealer can be classified as a stealer malware that can steal important data on the infected system. The result of the analysis using the strings extract and decompile did not find any information because this malware uses the obfuscation feature, so the static analysis did find fewer information than the dynamic method.
IAES International Journal of Robotics and Automation (IJRA) Vol. 13, No. 3, September 2024, pp. 247~254, 2024
Navigation is one of the crucial aspects of automation technology within the field of agriculture... more Navigation is one of the crucial aspects of automation technology within the field of agriculture, such as robotics systems or autonomous agricultural vehicles. Despite many navigation systems having been developed for agricultural land, due to their high development and component costs, these systems are difficult to access for farmers or organizations with limited capital.
In this study, the Canny-edge detection and Hough transform methods are
implemented in a path detection system on agricultural land to find an
alternative, cost-effective navigation system for autonomous farming robots or vehicles. The system is tested on ground-level view images, which are captured from a low perspective and under three different lighting conditions.
The testing and experimentation process involves adjusting the parameters of the Canny-edge detection and Hough transform methods for different lighting conditions. Subsequently, an evaluation is conducted using Intersection over Union to obtain the best accuracy results, followed by fine-tuning of the canny-edge detection and Hough transform method parameters. The identified parameters, specifically a 15×15 Gaussian kernel, low threshold of 50, high threshold of 150, Hough threshold, minimum line length of 150, and maximum line gap, have been discerned as optimal for the canny-edge and Hough transform algorithms under medium lighting conditions (G=1.0). The observed efficacy of these parameter configurations suggests the method’s viability for
implementation in path detection systems for agricultural vehicles or robots.
This underscores its potential to deliver reliable performance and navigate
seamlessly across diverse lighting scenarios within the agricultural context.
SAIS | Scientific Articles of Informatics Students, Dec 31, 2018
Generation Journal, Oct 16, 2022
2022 International Conference on Advanced Creative Networks and Intelligent Systems (ICACNIS)
JOIV : International Journal on Informatics Visualization
Data collection has become a necessity today, especially since many sources of data on the intern... more Data collection has become a necessity today, especially since many sources of data on the internet can be used for various needs. The main activity in data collection is collecting quality information that can be analyzed and used to support decisions or provide evidence. The process of retrieving data from the internet is also known as web scraping. There are various methods of web scraping that are commonly used. The amount of data scattered on the internet will be quite time-consuming if the web scraping is done on a large scale. By applying the parallel concept, the multi-processing approach can help complete a job. This study aimed to determine the performance of the web scraping method with the application of multi-processing. Testing is done by doing the process of scraping data from a predetermined target web. Four web scraping methods: CSS Selector, HTML DOM, Regex, and XPath, were selected to be used in the experiment measured based on the parameters of CPU usage, memory ...
Jurnal Ilmu Politik dan Pemerintahan
Saat ini perkembangan dunia akan kebutuhan komunikasi data sangat penting secara fix (tetap), ata... more Saat ini perkembangan dunia akan kebutuhan komunikasi data sangat penting secara fix (tetap), ataupun secara mobile dalam menentukan perkembangan peradaban manusia pada berbagai lini kehidupan secara langsung dengan pertukaran informasi. Perkembangan dunia akan kebutuhan komunikasi data sangat penting secara tetap ataupun secara mobile dalam menentukan peradaban manusia pada berbagai lini kehidupan, maka dari itu diperlukan sebuah protokol dalam jaringan yang mampu mengimbangi perkembangan dunia dalam segi komunikasi jaringan. Penelitian ini menggunakan protokol Open Shortest Path First (OSPF) yang memiliki kelebihan pengaturan jaringan skala luas. Metode Acces Control List (ACL) dirasa perlu digunakan untuk menambahkan keamanan jaringan pada protokol OSPF. Penelitian ini bertujuan untuk mengetahui efektifitas dari penambahan metode ACL pada protokol OSPF, dengan media ilustrasi menggunakan cisco packet tracer dan penggunaan node sebanyak 7 buah. Hasil dari dua belas jalur pengujian...
JOIV : International Journal on Informatics Visualization
The development of computing technology in increasing the accessibility and agility of daily acti... more The development of computing technology in increasing the accessibility and agility of daily activities currently uses the Internet of Things (IoT). Over time, the increasing number of IoT device users impacts access and delivery of valuable data. This is the primary goal of cybercriminals to operate malicious software. In addition to the positive impact of using technology, it is also a negative impact that creates new problems in security attacks and cybercrimes. One of the most dangerous cyberattacks in the IoT environment is the Mirai botnet malware. The malware turns the user's device into a botnet to carry out Distributed Denial of Service (DDoS) attacks on other devices, which is undoubtedly very dangerous. Therefore, this study proposes a k-nearest neighbor algorithm to classify Mirai malware-type DDOS attacks on IoT device environments. The malware classification process was carried out using rapid miner machine learning by conducting four experiments using SYN, ACK, UD...
Computatio : Journal of Computer Science and Information Systems
Image compression with lossy techniques removes some information so it does not match the data re... more Image compression with lossy techniques removes some information so it does not match the data received. This research was conducted to determine differences in the quality of original and compressed images, specifically on mark-based tracking. Image compression is done by implementing the Discrete Cosine Transform algorithm in the MATLAB program. DCT image compression test results can compress images up to 26% of the original size without significantly reducing image quality. The assessment results shown by the markers, in Vuforia, there was no change in star ratings, while in ARCore, there was an increase in the rating of 5-40 quality scores.DCT algorithm can be applied to image compression in marker-based tracking, especially in improving the quality of markers in ARCore.AbstrakKompresi citra dengan teknik lossy menghilangkan beberapa informasi sehingga tidak persis seperti data aslinya. Penelitian ini dilakukan untuk mengetahui perbedaan kualitas citra asli dan terkompresi, khus...
Jurnal Siliwangi Seri Sains dan Teknologi, May 30, 2021
Krishi sewa online magazine, 2021
Jurnal Teknik Informatika dan Sistem Informasi, 2017
JIF: Jurnal Imiah Informatika, Oct 2, 2019
Jurnal Siliwangi Seri Sains dan Teknologi, Dec 30, 2020
SAIS | Scientific Articles of Informatics Students, Jun 30, 2019
SinkrOn, 2018
Perkembangan jumlah pengguna aplikasi Instant Messenger (IM) yang sangat pesat menyebabkan naikny... more Perkembangan jumlah pengguna aplikasi Instant Messenger (IM) yang sangat pesat menyebabkan naiknya potensi tindakan kriminal dilakukan melalui aplikasi IM. Fitur keamanan data aplikasi IM yang ditujukan untuk melindungi privasi penggunanya, digunakan oleh pelaku kriminal untuk menyembunyikan bukti digital dari aktivitas kriminalnya. Penelitian ini membahas mengenai analisa dan perbandingan bukti digital dari aplikasi IM pada Android yang telah diunduh sebanyak 500 juta orang di Play Store, yaitu WhatsApp, Telegram, Line, dan IMO. Proses analisa dilakukan pada bukti digital dari penggunaan fitur yang ada di aplikasi IM, sehingga proses pengumpulan data dibantu dengan simulasi dari beberapa skenario yang berpotensi terjadi dalam tindakan kriminal. Teknik akuisisi data dilakukan dengan metode physical imaging untuk mendapatkan akses penuh pada memori smartphone. Hasil analisa disimpulkan dalam bentuk tabel perbandingan yang dapat dirujuk oleh investigator forensik ketika melakukan inve...
Article history: Diterima xx-xx-xx Diperbaiki xx-xx-xx Disetujui xx-xx-xx Forensik dari volatile ... more Article history: Diterima xx-xx-xx Diperbaiki xx-xx-xx Disetujui xx-xx-xx Forensik dari volatile memory memainkan peran penting dalam penyelidikan cybercrime. Akuisisi RAM Memori atau istilah lain dump RAM dapat membantu penyelidik forensik dalam mengambil banyak informasi yang berkaitan dengan kejahatan. Ada berbagai alat yang tersedia untuk analisis RAM termasuk Volatilitas, yang saat ini mendominasi alat RAM forensik open-source. Telah terjadi bahwa banyak penyelidik forensik berpikir bahwa mereka mungkin memiliki malware dalam dump RAM. Dan, jika mereka benar-benar ada, mereka masih belum mampu menganalisis Malware, jadi sulit bagi mereka untuk menganalisis kemungkinan malware dalam dump RAM. Ketersediaan alat-alat seperti Volatilitas memungkinkan penyelidik forensik untuk mengidentifikasi dan menghubungkan berbagai komponen untuk menyimpulkan apakah kejahatan itu dilakukan dengan menggunakan malware atau tidak. Namun, penggunaan volatilitas membutuhkan pengetahuan tentang perin...
Forensics from volatile memory plays an important role in the investigation of cyber crime. The a... more Forensics from volatile memory plays an important role in the investigation of cyber crime. The acquisition of RAM Memory or other terms of RAM dump can assist forensic investigators in retrieving much of the information related to crime. There are various tools available for RAM analysis including Volatility, which currently dominates open source forensic RAM tools. It has happened that many forensic investigators are thinking that they probably have malware in the RAM dump. And, if they do exist, they're still not very capable Malware Analysts, so it's hard for them to analyze the possibilities of malware in a RAM dump. The availability of tools such as Volatility allows forensic investigators to identify and link the various components to conclude whether the crime was committed using malware or not. However, the use of volatility requires knowledge of basic commands as well as static malware analysis. This work is done to assist forensic investigators in detecting and an...
Journal of Advanced Research in Applied Sciences and Engineering Technology 50, Issue 1 (2025) 121-135, 2024
The growing versatility of Internet of Things devices increases the possibility of multiple attac... more The growing versatility of Internet of Things devices increases the possibility of multiple attacks occurring and being carried out continuously. The limited processing capabilities and memory capacity of Internet of Things devices pose challenges for security and forensic analysis in collecting and documenting various attacks targeting
these devices during the forensic investigation process. Thus, forensic investigative
analysis goes beyond expectations, offering a holistic understanding of the complex
consequences arising from IoT device attacks that have occurred. These issues and
challenges provide important insights into vulnerabilities, potential future threats, and
steps to effectively increase the resilience of the IoT ecosystem against the evolving
cyber-attack risk landscape. Apart from that, the large amount of IoT attack data
generated raises several problems. Such as the difficulty of quickly identifying threats
and in-depth forensic analysis of each very diverse attack. The implementation of
artificial intelligence is a very useful solution in overcoming the forensic investigation
challenges that arise due to IoT attacks with the enormous increase in data volume and
complexity. Therefore, this research aims and proposes to improve the IoT forensic
readiness framework by collecting and analyzing digital evidence in detecting various attacks from various IoT devices automatically based on an artificial intelligence approach and functioning as an early warning system. Enhanced the proposed IoT forensic readiness framework based on ISO/IEC 27043 serves as a prototype for detecting and collecting various types of attacks as potential digital evidence from various IoT devices, as well as effective forensic investigation of digital evidence with
the utilization of smart repository.
Journal of Advanced Research in Applied Sciences and Engineering Technology48, Issue 2(2025) 49-62, 2024
Stealer is a malware variant discovered in early March 2020 by proof point analyst. Redline is fa... more Stealer is a malware variant discovered in early March 2020 by proof point analyst. Redline is famous for its ability to bypass the antivirus scan. Redline Stealer was created by hacker with the purpose to steal victim's information such as login data, password and credit card information from the browser application that used in infected computer. This research uses static and dynamic methods to analyze redline stealers. The process of static analysis is carried out by observing the malware's sample file, while dynamic analysis is carried out by monitoring malware's activity when the malware is running on the system. This research show that Redline Stealer uses the obfuscation feature based on .net, which can run only when there is an internet connection, stealing sensitive information, especially in a browser application. The conclusion of this research is Redline Stealer can be classified as a stealer malware that can steal important data on the infected system. The result of the analysis using the strings extract and decompile did not find any information because this malware uses the obfuscation feature, so the static analysis did find fewer information than the dynamic method.
IAES International Journal of Robotics and Automation (IJRA) Vol. 13, No. 3, September 2024, pp. 247~254, 2024
Navigation is one of the crucial aspects of automation technology within the field of agriculture... more Navigation is one of the crucial aspects of automation technology within the field of agriculture, such as robotics systems or autonomous agricultural vehicles. Despite many navigation systems having been developed for agricultural land, due to their high development and component costs, these systems are difficult to access for farmers or organizations with limited capital.
In this study, the Canny-edge detection and Hough transform methods are
implemented in a path detection system on agricultural land to find an
alternative, cost-effective navigation system for autonomous farming robots or vehicles. The system is tested on ground-level view images, which are captured from a low perspective and under three different lighting conditions.
The testing and experimentation process involves adjusting the parameters of the Canny-edge detection and Hough transform methods for different lighting conditions. Subsequently, an evaluation is conducted using Intersection over Union to obtain the best accuracy results, followed by fine-tuning of the canny-edge detection and Hough transform method parameters. The identified parameters, specifically a 15×15 Gaussian kernel, low threshold of 50, high threshold of 150, Hough threshold, minimum line length of 150, and maximum line gap, have been discerned as optimal for the canny-edge and Hough transform algorithms under medium lighting conditions (G=1.0). The observed efficacy of these parameter configurations suggests the method’s viability for
implementation in path detection systems for agricultural vehicles or robots.
This underscores its potential to deliver reliable performance and navigate
seamlessly across diverse lighting scenarios within the agricultural context.
SAIS | Scientific Articles of Informatics Students, Dec 31, 2018
Generation Journal, Oct 16, 2022
2022 International Conference on Advanced Creative Networks and Intelligent Systems (ICACNIS)
JOIV : International Journal on Informatics Visualization
Data collection has become a necessity today, especially since many sources of data on the intern... more Data collection has become a necessity today, especially since many sources of data on the internet can be used for various needs. The main activity in data collection is collecting quality information that can be analyzed and used to support decisions or provide evidence. The process of retrieving data from the internet is also known as web scraping. There are various methods of web scraping that are commonly used. The amount of data scattered on the internet will be quite time-consuming if the web scraping is done on a large scale. By applying the parallel concept, the multi-processing approach can help complete a job. This study aimed to determine the performance of the web scraping method with the application of multi-processing. Testing is done by doing the process of scraping data from a predetermined target web. Four web scraping methods: CSS Selector, HTML DOM, Regex, and XPath, were selected to be used in the experiment measured based on the parameters of CPU usage, memory ...
Jurnal Ilmu Politik dan Pemerintahan
Saat ini perkembangan dunia akan kebutuhan komunikasi data sangat penting secara fix (tetap), ata... more Saat ini perkembangan dunia akan kebutuhan komunikasi data sangat penting secara fix (tetap), ataupun secara mobile dalam menentukan perkembangan peradaban manusia pada berbagai lini kehidupan secara langsung dengan pertukaran informasi. Perkembangan dunia akan kebutuhan komunikasi data sangat penting secara tetap ataupun secara mobile dalam menentukan peradaban manusia pada berbagai lini kehidupan, maka dari itu diperlukan sebuah protokol dalam jaringan yang mampu mengimbangi perkembangan dunia dalam segi komunikasi jaringan. Penelitian ini menggunakan protokol Open Shortest Path First (OSPF) yang memiliki kelebihan pengaturan jaringan skala luas. Metode Acces Control List (ACL) dirasa perlu digunakan untuk menambahkan keamanan jaringan pada protokol OSPF. Penelitian ini bertujuan untuk mengetahui efektifitas dari penambahan metode ACL pada protokol OSPF, dengan media ilustrasi menggunakan cisco packet tracer dan penggunaan node sebanyak 7 buah. Hasil dari dua belas jalur pengujian...
JOIV : International Journal on Informatics Visualization
The development of computing technology in increasing the accessibility and agility of daily acti... more The development of computing technology in increasing the accessibility and agility of daily activities currently uses the Internet of Things (IoT). Over time, the increasing number of IoT device users impacts access and delivery of valuable data. This is the primary goal of cybercriminals to operate malicious software. In addition to the positive impact of using technology, it is also a negative impact that creates new problems in security attacks and cybercrimes. One of the most dangerous cyberattacks in the IoT environment is the Mirai botnet malware. The malware turns the user's device into a botnet to carry out Distributed Denial of Service (DDoS) attacks on other devices, which is undoubtedly very dangerous. Therefore, this study proposes a k-nearest neighbor algorithm to classify Mirai malware-type DDOS attacks on IoT device environments. The malware classification process was carried out using rapid miner machine learning by conducting four experiments using SYN, ACK, UD...
Computatio : Journal of Computer Science and Information Systems
Image compression with lossy techniques removes some information so it does not match the data re... more Image compression with lossy techniques removes some information so it does not match the data received. This research was conducted to determine differences in the quality of original and compressed images, specifically on mark-based tracking. Image compression is done by implementing the Discrete Cosine Transform algorithm in the MATLAB program. DCT image compression test results can compress images up to 26% of the original size without significantly reducing image quality. The assessment results shown by the markers, in Vuforia, there was no change in star ratings, while in ARCore, there was an increase in the rating of 5-40 quality scores.DCT algorithm can be applied to image compression in marker-based tracking, especially in improving the quality of markers in ARCore.AbstrakKompresi citra dengan teknik lossy menghilangkan beberapa informasi sehingga tidak persis seperti data aslinya. Penelitian ini dilakukan untuk mengetahui perbedaan kualitas citra asli dan terkompresi, khus...
Jurnal Siliwangi Seri Sains dan Teknologi, May 30, 2021
Krishi sewa online magazine, 2021
Jurnal Teknik Informatika dan Sistem Informasi, 2017
JIF: Jurnal Imiah Informatika, Oct 2, 2019
Jurnal Siliwangi Seri Sains dan Teknologi, Dec 30, 2020
SAIS | Scientific Articles of Informatics Students, Jun 30, 2019
SinkrOn, 2018
Perkembangan jumlah pengguna aplikasi Instant Messenger (IM) yang sangat pesat menyebabkan naikny... more Perkembangan jumlah pengguna aplikasi Instant Messenger (IM) yang sangat pesat menyebabkan naiknya potensi tindakan kriminal dilakukan melalui aplikasi IM. Fitur keamanan data aplikasi IM yang ditujukan untuk melindungi privasi penggunanya, digunakan oleh pelaku kriminal untuk menyembunyikan bukti digital dari aktivitas kriminalnya. Penelitian ini membahas mengenai analisa dan perbandingan bukti digital dari aplikasi IM pada Android yang telah diunduh sebanyak 500 juta orang di Play Store, yaitu WhatsApp, Telegram, Line, dan IMO. Proses analisa dilakukan pada bukti digital dari penggunaan fitur yang ada di aplikasi IM, sehingga proses pengumpulan data dibantu dengan simulasi dari beberapa skenario yang berpotensi terjadi dalam tindakan kriminal. Teknik akuisisi data dilakukan dengan metode physical imaging untuk mendapatkan akses penuh pada memori smartphone. Hasil analisa disimpulkan dalam bentuk tabel perbandingan yang dapat dirujuk oleh investigator forensik ketika melakukan inve...
Article history: Diterima xx-xx-xx Diperbaiki xx-xx-xx Disetujui xx-xx-xx Forensik dari volatile ... more Article history: Diterima xx-xx-xx Diperbaiki xx-xx-xx Disetujui xx-xx-xx Forensik dari volatile memory memainkan peran penting dalam penyelidikan cybercrime. Akuisisi RAM Memori atau istilah lain dump RAM dapat membantu penyelidik forensik dalam mengambil banyak informasi yang berkaitan dengan kejahatan. Ada berbagai alat yang tersedia untuk analisis RAM termasuk Volatilitas, yang saat ini mendominasi alat RAM forensik open-source. Telah terjadi bahwa banyak penyelidik forensik berpikir bahwa mereka mungkin memiliki malware dalam dump RAM. Dan, jika mereka benar-benar ada, mereka masih belum mampu menganalisis Malware, jadi sulit bagi mereka untuk menganalisis kemungkinan malware dalam dump RAM. Ketersediaan alat-alat seperti Volatilitas memungkinkan penyelidik forensik untuk mengidentifikasi dan menghubungkan berbagai komponen untuk menyimpulkan apakah kejahatan itu dilakukan dengan menggunakan malware atau tidak. Namun, penggunaan volatilitas membutuhkan pengetahuan tentang perin...
Forensics from volatile memory plays an important role in the investigation of cyber crime. The a... more Forensics from volatile memory plays an important role in the investigation of cyber crime. The acquisition of RAM Memory or other terms of RAM dump can assist forensic investigators in retrieving much of the information related to crime. There are various tools available for RAM analysis including Volatility, which currently dominates open source forensic RAM tools. It has happened that many forensic investigators are thinking that they probably have malware in the RAM dump. And, if they do exist, they're still not very capable Malware Analysts, so it's hard for them to analyze the possibilities of malware in a RAM dump. The availability of tools such as Volatility allows forensic investigators to identify and link the various components to conclude whether the crime was committed using malware or not. However, the use of volatility requires knowledge of basic commands as well as static malware analysis. This work is done to assist forensic investigators in detecting and an...