18 research outputs found

    2FYSH: two-factor authentication you should have for password replacement

    Get PDF
    Password has been the most used authentication system these days. However, strong passwords are hard to remember and unique to every account. Unfortunately, even with the strongest passwords, password authentication system can still be breached by some kind of attacks. 2FYSH is two tokens-based authentication protocol designed to replace the password authentication entirely. The two tokens are a mobile phone and an NFC card. By utilizing mobile phones as one of the tokens, 2FYSH is offering third layer of security for users that lock their phone with some kind of security. 2FYSH is secure since it uses public and private key along with challenge-response protocol. 2FYSH protects the user from usual password attacks such as man-in-the-middle attack, phishing, eavesdropping, brute forcing, shoulder surfing, key logging, and verifier leaking. The secure design of 2FYSH has made 90% of the usability test participants to prefer 2FYSH for securing their sensitive information. This fact makes 2FYSH best applied to secure sensitive data needs such as bank accounts and corporate secrets

    Meta Analisis Platform Media Digital Ramah Penyandang Disabilitas

    Get PDF
    One of the main functions of mass media is providing information. At the same time, the access to information is everyone's right. Therefore, the mass media have to open the possibilities for people to access information, including disabled people. Act. Number 8 of 2016 concerning disabled people also mandates this right. The act will come into force in 2018, so various parties need to make various preparatory efforts, including conducting research. This study aims to map online news sites that are friendly and unfriendly to disabilities. To achieve this goal, researchers use standards in the Web Content Accessibility Guidelines (WCAG) to map online media in Indonesia that are friendly to access for disabled people. To obtain this information the researchers conducted a quantitative study of 62 cyber media sites in Indonesia by measuring the level of accessibility of the media to disabled people. The findings indicate that there are no cyber media sites in Indonesia that are friendly to access for disabled people. Sites like Riau24.com, Manadonews.co.id and Ayobandung.com are sites with the highest percentage of success among the 62 sites analyzed

    Pengaruh Algoritma Stemming Nazief-Adriani Terhadap Kinerja Algoritma Winnowing Untuk Mendeteksi Plagiarisme Bahasa Indonesia

    No full text
    Winnowing algorithm is one among many algorithms for detecting document similarity and plagiarism. Some studies show that Winnowing algorithm performs quite well. One form of plagiarism is paraphrase plagiarism. Paraphrase plagiarism can be done by changing sentence structure, changing vocabulary, and adding or changing affixes. Based on some of our previous experiments, detecting document resemblances can be enhanced by changing the words containing affixes to their basic words. In computer science, this technique is known as stemming - a technique to extract the basic word from an affixed word. Usually this technique is required in the filtering process to save storage media. For Indonesian, the Nazief-Adriani stemming algorithm is by far the most appropriate. This study examines how the effect of Nazief-Adriani stemming algorithm on Winnowing algorithm's performance against Indonesian texts. The results showed that the stemming process using Bloom-Filter on the Winnowing algorithm tends to decrease the similarity level achieved, but it accelerates processing time by approximately 30%

    2FYSH: two-factor authentication you should have for password replacement

    No full text
    Password has been the most used authentication system these days. However, strong passwords are hard to remember and unique to every account. Unfortunately, even with the strongest passwords, password authentication system can still be breached by some kind of attacks. 2FYSH is two tokens-based authentication protocol designed to replace the password authentication entirely. The two tokens are a mobile phone and an NFC card. By utilizing mobile phones as one of the tokens, 2FYSH is offering third layer of security for users that lock their phone with some kind of security. 2FYSH is secure since it uses public and private key along with challenge-response protocol. 2FYSH protects the user from usual password attacks such as man-in-the-middle attack, phishing, eavesdropping, brute forcing, shoulder surfing, key logging, and verifier leaking. The secure design of 2FYSH has made 90% of the usability test participants to prefer 2FYSH for securing their sensitive information. This fact makes 2FYSH best applied to secure sensitive data needs such as bank accounts and corporate secrets

    Penambahan Layanan pada Firmware DD-WRT untuk Wireless Router Linksys WRT160NL

    No full text
    Jaringan wireless LAN banyak digunakan dalam perkantoran yang memberikan keuntungan seperti Samba Server, Printer, Squid Server, dan Torrent Client. Namun pada umumnya dibutuhkan paling tidak sebuah komputer untuk menjalankan layanan-layanan tersebut. Dalam jaringan wireless LAN dibutuhkan perangkat wireless router yang dilengkapi dengan firmware agar bisa berjalan dengan baik. Firmware DD-WRT dinyatakan sebagai firmware open source yang memberikan keleluasaan kepada user untuk menambahkan layanan pada sebuah wireless router. Penelitian ini bertujuan untuk mempelajari penambahan layanan pada wireless router berbasis DDWRT serta menguji kinerja layanan yang ditambahkan tersebut pada wireless router. Hasil pengujian menunjukkan DD-WRT dapat digunakan sebagai firmware alternatif untuk memenuhi kebutuhan layanan pada skala kecil. Namun, penambahan layanan ini harus memperhatikan spesifikasi wireless router

    A Conceptual Reference Model for Human as a Service Provider in Cyber Physical Systems

    No full text
    In Cyber Physical Systems humans are often kept in the loop as operators and/or service users. Yet in many cases, humans and machines collaborate and provide services to each other. Research on service models and service composition for CPS exist; however, humans as service providers have not been adequately considered as part of the CPS service composition model. We provide a classification of human-as-a-service in CPS, and we propose a Service Oriented Architecture (SOA) ontology model for the CPS environment as part of the Everything-as-a-Service paradigm. The model considers human characteristics and their dynamics, as a service provider or collaborator with the machine. As the ontology model is an enabler for engineering a self-adaptive CPS with human-machine collaboration as service providers, we describe how a commonly used self-adaptive reference model can be refined to benefit from the vision. We evaluate the ontological contribution against criteria that relates to accuracy, completeness, adaptability, clarity, and consistency. We demonstrate the feasibility of our conceptual reference model using a use case from the medical domain and we show how human-machine service provision is possible

    SKOSYN: Simple Knowledge Organization System for synonym search on content management system

    No full text
    The development of Content Management System (CMS) technology undoubtedly eases website content organization. Creative writing is a common challenge in producing written content. One solution is to use synonyms, which conventionally can be found in a thesaurus. In this research, Simple Knowledge Organization System (SKOS) data model, which is suitable for organizing knowledge such as thesauri, is implemented as a plugin for searching synonyms in Bahasa Indonesia. This plugin will complement the default text editor on CMS to edit the written content in a convenient way. This plugin also provides a feature for getting definitions using the XML web service from Kateglo, so that users can understand exactly the meaning of synonyms they use. Based on experiments done in this research, SKOS data can be loaded into triplestore by ARC2 in shorter time than the regular MySQL database which uses integrity constraints. Moreover, the experiments have also shown that time stability for getting synonyms from triplestore using ARC2 can be more maintained than obtaining synonyms from XML document

    Utilizing Instant Messaging for Real-Time Notification and Information Retrieval of Snort Intrusion Detection System

    No full text
    Snort is widely used Intrusion Detection System (IDS) software for detecting security incidents on the network. The Snort alerts are stored in a database that can be accessed by additional interfaces such as BASE web application. That architecture should be checked periodically to avoid missing an attack. However it is possible, an attack known sometime after the event so that the response may be too late to do. This research aims to build a cheap and reliable solution for Snort reporting system that provides notification of Snort alerts in a real time manner which can be accessed mobile. We utilize an instant messaging application to alert the user and as a command line interface (CLI) that enables user to obtain detail information of each alert sent by the server. Experiment results show that the system is able to send notifications to the user within an acceptable delay interval of 0.87 seconds, on average
    corecore