Pub Date : 2015-11-01DOI: 10.1109/ICWT.2015.7449261
Faisel E. M. Tubbal, A. Elarabi, Abdelmonem Etabeb, H. Marah, Khaled Beneljankou, Mosbah Bellid, Riyadh El-bouaishi, A. Amer, Wesam Shita, Saleh Srabet, Akram Alkaseh, Ahmed Turkman
In this paper we present the conceptual design of Libyan remote sensing satellite (LibyaSat-1) and its sub-systems requirements. LibyaSat-1 is a 300 kg mini satellite, which will be used to support high resolution multi-spectral earth imaging camera to fulfill the civilian needs. This satellite will operate at LEO of 775 km and will provide a resolution of 2.5 m for the panchromatic band and 10 m for the VIS/NIR bands with 30 km swath. We have presented the mission overview, mission operation concept and mission requirements. Moreover, the System Tool Kit (STK) simulation is used to show the ground trucks of LibyaSat-1 for three days and to find the contact numbers between LibyaSat-1 and both Murezeq and Tripoli stations. We have also presented the design of telemetry and command subsystem, code and data handling subsystem, electrical power subsystem, altitude orbit control subsystem, and structure subsystem.
{"title":"The design requirements for Libyan imaging mini-satellite (LibyaSat-1)","authors":"Faisel E. M. Tubbal, A. Elarabi, Abdelmonem Etabeb, H. Marah, Khaled Beneljankou, Mosbah Bellid, Riyadh El-bouaishi, A. Amer, Wesam Shita, Saleh Srabet, Akram Alkaseh, Ahmed Turkman","doi":"10.1109/ICWT.2015.7449261","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449261","url":null,"abstract":"In this paper we present the conceptual design of Libyan remote sensing satellite (LibyaSat-1) and its sub-systems requirements. LibyaSat-1 is a 300 kg mini satellite, which will be used to support high resolution multi-spectral earth imaging camera to fulfill the civilian needs. This satellite will operate at LEO of 775 km and will provide a resolution of 2.5 m for the panchromatic band and 10 m for the VIS/NIR bands with 30 km swath. We have presented the mission overview, mission operation concept and mission requirements. Moreover, the System Tool Kit (STK) simulation is used to show the ground trucks of LibyaSat-1 for three days and to find the contact numbers between LibyaSat-1 and both Murezeq and Tripoli stations. We have also presented the design of telemetry and command subsystem, code and data handling subsystem, electrical power subsystem, altitude orbit control subsystem, and structure subsystem.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130519065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ICWT.2015.7449214
Rizal Broer Bahaweres, Felki Fikiansyah, M. Alaydrus
This paper aims to analyze the interference between wireless traffic light controller and remote keyless entry for vehicles. Both systems are located closely to each other at the frequency 433-434 MHz. During the analysis, broadcast variant time delay on wireless traffic light versus distances between and RKE determined to ensure their interference. The interference impact is evaluated in a scenario where the wireless traffic light and RKE for vehicles operate on frequency 434 MHz and 433.9 MHz respectively. Three time delays 0 s, 0.2 s and 0.5 s were considered during the simulations. The results show that time delay 0 s and 0.2 s cause a very high probability of interference. Whereas time delay setting of 0.5 s provide probability of interference about 2 % at distance 5 m.
{"title":"Analysis of interference from wireless traffic light controller upon remote keyless entry for vehicles","authors":"Rizal Broer Bahaweres, Felki Fikiansyah, M. Alaydrus","doi":"10.1109/ICWT.2015.7449214","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449214","url":null,"abstract":"This paper aims to analyze the interference between wireless traffic light controller and remote keyless entry for vehicles. Both systems are located closely to each other at the frequency 433-434 MHz. During the analysis, broadcast variant time delay on wireless traffic light versus distances between and RKE determined to ensure their interference. The interference impact is evaluated in a scenario where the wireless traffic light and RKE for vehicles operate on frequency 434 MHz and 433.9 MHz respectively. Three time delays 0 s, 0.2 s and 0.5 s were considered during the simulations. The results show that time delay 0 s and 0.2 s cause a very high probability of interference. Whereas time delay setting of 0.5 s provide probability of interference about 2 % at distance 5 m.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130538072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ICWT.2015.7449241
Sarifah Putri Raflesia, K. Surendro
Organizations find new challenge which is related to employees' engagement along service support implementation. Gamified-service is defined as service support which integrated Information Technology Infrastructure Library (ITIL) and gamification model. This integration enables fun, challenge, and reward to boost employees' motivation. Pressure in the workplace and employees' personal issues become main triggrer to decrease productivity. According to this reason, we need to add persuasive approach along implementation of ITIL best practices. This research focused on designing gamified-service prototype in order to help organization build game-like workplace environment We believe that gamified-service will help employees do their job with fun way.
{"title":"Designing gamified-service towards user engagement and service quality improvement","authors":"Sarifah Putri Raflesia, K. Surendro","doi":"10.1109/ICWT.2015.7449241","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449241","url":null,"abstract":"Organizations find new challenge which is related to employees' engagement along service support implementation. Gamified-service is defined as service support which integrated Information Technology Infrastructure Library (ITIL) and gamification model. This integration enables fun, challenge, and reward to boost employees' motivation. Pressure in the workplace and employees' personal issues become main triggrer to decrease productivity. According to this reason, we need to add persuasive approach along implementation of ITIL best practices. This research focused on designing gamified-service prototype in order to help organization build game-like workplace environment We believe that gamified-service will help employees do their job with fun way.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133883378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ICWT.2015.7449212
Iskandar, R. Galih
This paper proposes throughput evaluation for LTE-Advanced network access in the particular service area employing carrier aggregation (CA) technique. From several kind of CA, we evaluate which one the best CA configuration in term of network throughput. 30 MHz aggregated bandwidth and two component carrier (CC) serve as a primary serving cell (PCell) and secondary serving cell (SCell) are used in the simulation. Simulation results show that the configuration of wider PCell bandwidth resulting better performance of the throughput. In particular, in CA intra-band scenario, the throughput of non-contiguous CA has better performance compared with CA contiguous. Whereas in the inter-band CA scenario, CC combination with lower frequency resulting better throughput performance.
{"title":"Throughput evaluation in LTE-Advanced network access using carrier aggregation","authors":"Iskandar, R. Galih","doi":"10.1109/ICWT.2015.7449212","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449212","url":null,"abstract":"This paper proposes throughput evaluation for LTE-Advanced network access in the particular service area employing carrier aggregation (CA) technique. From several kind of CA, we evaluate which one the best CA configuration in term of network throughput. 30 MHz aggregated bandwidth and two component carrier (CC) serve as a primary serving cell (PCell) and secondary serving cell (SCell) are used in the simulation. Simulation results show that the configuration of wider PCell bandwidth resulting better performance of the throughput. In particular, in CA intra-band scenario, the throughput of non-contiguous CA has better performance compared with CA contiguous. Whereas in the inter-band CA scenario, CC combination with lower frequency resulting better throughput performance.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124481050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ICWT.2015.7449256
Yudha Purwanto, Kuspriyanto, Hendrawan, B. Rahardjo
Flashcrowd and Distributed Denial of Service (DDoS) almost has similar symptom across network and server. But security element such Intrusion Detection System (IDS) must handle both differently. If IDS cannot differentiate flashcrowd and DDoS attack, Quality of Service of legal user traffic in flashcrowd will degraded. So it is important for IDS to differentiate between flashcrowd and DDoS. Many earlier comparison method could sense the anomalous event, but not pay much attention to identify which flow was the anomaly. We presented residual calculation between windowed aggregate traffic statistical value combination. With residual calculation among statistical percentile 10th and mean, a high accuracy of flashcrowd and DDoS differentiation of synthetic anomalous event gained. This method could directly identify the anomalous flow and perform visual analysis to detect the start to end of both event.
{"title":"Time based anomaly detection using residual polynomial fitting on aggregate traffic statistic","authors":"Yudha Purwanto, Kuspriyanto, Hendrawan, B. Rahardjo","doi":"10.1109/ICWT.2015.7449256","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449256","url":null,"abstract":"Flashcrowd and Distributed Denial of Service (DDoS) almost has similar symptom across network and server. But security element such Intrusion Detection System (IDS) must handle both differently. If IDS cannot differentiate flashcrowd and DDoS attack, Quality of Service of legal user traffic in flashcrowd will degraded. So it is important for IDS to differentiate between flashcrowd and DDoS. Many earlier comparison method could sense the anomalous event, but not pay much attention to identify which flow was the anomaly. We presented residual calculation between windowed aggregate traffic statistical value combination. With residual calculation among statistical percentile 10th and mean, a high accuracy of flashcrowd and DDoS differentiation of synthetic anomalous event gained. This method could directly identify the anomalous flow and perform visual analysis to detect the start to end of both event.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130912852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ICWT.2015.7449207
N. S. Sugiharto, Iskandar, T. Hendrawan, N. Rachmana
Digital television (TV) has been replacing analog TV in many countries. Content broadcasting applications therefore are developed widely including on the smart phone as the non-DVB enabler device. This paper aims at developing an application on the smart phone that receives program and transmits a request to the server as DVB-T transmitter. The target is to develop an application that allows smart phone interactively connected to DVB-T transmitter. As the first target we develop an android-based smart phone. We use DVB-T signal for downlink transmission and wifi for the uplink connection. This interactivity may include file sharing, polling, etc. using non-DVB enabler devices. Therefore the development of a system that can convert DVB signal into WiFi-IP based protocol signal is big challenge in this work.
在许多国家,数字电视已经取代了模拟电视。因此,内容广播应用被广泛开发,包括在智能手机上作为非dvb启用设备。本文旨在开发一种智能手机上的应用程序,该应用程序作为DVB-T发射机接收程序并向服务器发送请求。目标是开发一种可以让智能手机与DVB-T发射机交互连接的应用程序。作为第一个目标,我们开发了一款基于android的智能手机。我们使用DVB-T信号进行下行传输,使用wifi进行上行连接。这种交互性可能包括使用非dvb启用设备的文件共享、轮询等。因此,如何将DVB信号转换成基于wi - fi - ip的协议信号是这项工作的一大挑战。
{"title":"Mobile TV interactive in DVB-T broadcast network hybrid with WiFi","authors":"N. S. Sugiharto, Iskandar, T. Hendrawan, N. Rachmana","doi":"10.1109/ICWT.2015.7449207","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449207","url":null,"abstract":"Digital television (TV) has been replacing analog TV in many countries. Content broadcasting applications therefore are developed widely including on the smart phone as the non-DVB enabler device. This paper aims at developing an application on the smart phone that receives program and transmits a request to the server as DVB-T transmitter. The target is to develop an application that allows smart phone interactively connected to DVB-T transmitter. As the first target we develop an android-based smart phone. We use DVB-T signal for downlink transmission and wifi for the uplink connection. This interactivity may include file sharing, polling, etc. using non-DVB enabler devices. Therefore the development of a system that can convert DVB signal into WiFi-IP based protocol signal is big challenge in this work.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"363 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115974218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ICWT.2015.7449213
Arif Budiman, Sugihartono, D. Arseno
One of OFDM main problem is amount of PAPR (Peak Average Power Ratio). The magnitude of PAPR caused the summation of power by the wave in phase so that maximum power compared to average power becomes high. One method to reduce the amount of PAPR is switching null subcarrier with the data subcarrier. This method has advantages over other methods that do not damage the transmitted signal. BER is not increasing and does not require any side information to restore the signal to its original data. The problem in the switching method is the complexity of the system. In this paper will offered a method based on switching data subcarrier null subcarrier. The new method will provide lower complexity and the PAPR results lower than original OFDM but still higher than switching the data subcarrier null subcarrier method.
{"title":"PAPR reduction by data subcarriers and null subcarriers switching","authors":"Arif Budiman, Sugihartono, D. Arseno","doi":"10.1109/ICWT.2015.7449213","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449213","url":null,"abstract":"One of OFDM main problem is amount of PAPR (Peak Average Power Ratio). The magnitude of PAPR caused the summation of power by the wave in phase so that maximum power compared to average power becomes high. One method to reduce the amount of PAPR is switching null subcarrier with the data subcarrier. This method has advantages over other methods that do not damage the transmitted signal. BER is not increasing and does not require any side information to restore the signal to its original data. The problem in the switching method is the complexity of the system. In this paper will offered a method based on switching data subcarrier null subcarrier. The new method will provide lower complexity and the PAPR results lower than original OFDM but still higher than switching the data subcarrier null subcarrier method.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"9 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120819437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Complexity and flexibility are the main problems that will be faced in the world of the future network. To be able to answer these problems, a method called Software Defined Network (SDN) is being developed. The SDN concept is to separate the network's controller and forwarding plane of the hardware. In this research, SDN component, white box switch was built. To test its performance, RTT and throughput of some configuration were measured. The result is compared to conventional switch, which is Cisco Catalyst 2950. White Box Switch was created of a computer with 2.50 GHz processor and 32 GBytes memory. The result shows that performance of Cisco Catalyst 2950 is superior to white box switch because of its ASIC that allow it to forward data in hardware. Furthermore minimum specification of white box switch can be calculated, that is 1.225 GHz processor and 1 GBytes memory. To get the best performance, we can use single-board computer to be used as white box switch. Single-board computer contains all of its hardware in a single-board and it will give best performance of a computer.
{"title":"Performance analysis of white box switch on Software Defined Networking using open vSwitch","authors":"Aditya Widya Manggala, Hendrawan, Adrie Tanwidjaja","doi":"10.1109/ICWT.2015.7449257","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449257","url":null,"abstract":"Complexity and flexibility are the main problems that will be faced in the world of the future network. To be able to answer these problems, a method called Software Defined Network (SDN) is being developed. The SDN concept is to separate the network's controller and forwarding plane of the hardware. In this research, SDN component, white box switch was built. To test its performance, RTT and throughput of some configuration were measured. The result is compared to conventional switch, which is Cisco Catalyst 2950. White Box Switch was created of a computer with 2.50 GHz processor and 32 GBytes memory. The result shows that performance of Cisco Catalyst 2950 is superior to white box switch because of its ASIC that allow it to forward data in hardware. Furthermore minimum specification of white box switch can be calculated, that is 1.225 GHz processor and 1 GBytes memory. To get the best performance, we can use single-board computer to be used as white box switch. Single-board computer contains all of its hardware in a single-board and it will give best performance of a computer.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130315163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ICWT.2015.7449245
L. Novamizanti, Gelar Budiman, Iwan Iwut Tritoasmoro
Information security in mobile phones has become a challenge when large amounts of data exchanged on the Internet. Secure information transfer can be achieved by cryptography and steganography. Cryptography is a tool that provides encryption techniques for secure communication. Steganography is the technique of hiding information by way of the message of the picture, so that in addition to the person addressed, another person will not be aware of the existence of the message. In this study the issues to be discussed is the technique of message encryption with RSA (Rivest Shamir Adleman) method. Messages are encrypted after compressed by LZW (Lempel Ziv Welch) method, so it will reduce the size of the message that will be inserted and increase the capacity of messages that can be inserted. Messages that have been compressed and encrypted, is then hidden by DCT (Discrete Cosine Transform) techniques. With the incorporation of encryption techniques, steganography, and compression, the acquired information is more secure and its capacity is larger. For a 512×512 colored image there are 1536 characters enable for hiding. With LZW the amount of characters hiding will be about twice larger in this research.
{"title":"Designing secured data using a combination of LZW compression, RSA encryption, and DCT steganography","authors":"L. Novamizanti, Gelar Budiman, Iwan Iwut Tritoasmoro","doi":"10.1109/ICWT.2015.7449245","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449245","url":null,"abstract":"Information security in mobile phones has become a challenge when large amounts of data exchanged on the Internet. Secure information transfer can be achieved by cryptography and steganography. Cryptography is a tool that provides encryption techniques for secure communication. Steganography is the technique of hiding information by way of the message of the picture, so that in addition to the person addressed, another person will not be aware of the existence of the message. In this study the issues to be discussed is the technique of message encryption with RSA (Rivest Shamir Adleman) method. Messages are encrypted after compressed by LZW (Lempel Ziv Welch) method, so it will reduce the size of the message that will be inserted and increase the capacity of messages that can be inserted. Messages that have been compressed and encrypted, is then hidden by DCT (Discrete Cosine Transform) techniques. With the incorporation of encryption techniques, steganography, and compression, the acquired information is more secure and its capacity is larger. For a 512×512 colored image there are 1536 characters enable for hiding. With LZW the amount of characters hiding will be about twice larger in this research.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131567058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ICWT.2015.7449259
A. Jacobus, A. Sinsuw
The existence of intrusion detection systems in computer network as a part of network security tool is very important, with this tool a computer system can detect the intrusion action before it makes more damage. Traditional intrusion detection system using the rule that created by expert for detecting the intrusion, but because of the increasing of internet activity the data to be analyzed in order to establish that rules become large and create the possibility the new intrusion technique cannot detect. Using data mining techniques to find intrusion pattern from network packet data was success to detect intrusion in offline environment, but the effective intrusion detection system must able to detect the intrusion in online environment. Therefore needed a method that can be used to perform online processing of network packets data. This paper discusses the data processing network packets to establish the connection records are complete or incomplete in an effort to enabling the intrusion detection system detecting the intrusion online and based on the test result this method was success to detect the intrusion in online environment.
{"title":"Network packet data online processing for intrusion detection system","authors":"A. Jacobus, A. Sinsuw","doi":"10.1109/ICWT.2015.7449259","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449259","url":null,"abstract":"The existence of intrusion detection systems in computer network as a part of network security tool is very important, with this tool a computer system can detect the intrusion action before it makes more damage. Traditional intrusion detection system using the rule that created by expert for detecting the intrusion, but because of the increasing of internet activity the data to be analyzed in order to establish that rules become large and create the possibility the new intrusion technique cannot detect. Using data mining techniques to find intrusion pattern from network packet data was success to detect intrusion in offline environment, but the effective intrusion detection system must able to detect the intrusion in online environment. Therefore needed a method that can be used to perform online processing of network packets data. This paper discusses the data processing network packets to establish the connection records are complete or incomplete in an effort to enabling the intrusion detection system detecting the intrusion online and based on the test result this method was success to detect the intrusion in online environment.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125800704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}