Pub Date : 2015-11-01DOI: 10.1109/ICWT.2015.7449217
N. Hendrarini, Ema
The issue of this paper is about computer development in the field of aviation. This is in accordance with the technological development of aircraft that shifted from manual to computer-based conditions. Many things can be learned about computerization in the aviation world especially associated with the control mechanism of the aircraft or aircraft communications system. The research related to control of aircraft by utilizing wireless technology and computers. This control technology embeds a special system on another system-computer based. Intelligent system is a system that is filed with artificial immune algorithm. This algorithm is expected to be known to prevent all potential failures. This control technology is intended to be implemented on electrical-based aircraft Redundancy became a matter of support in obtaining reliable and robust performance of system. Sensor system with the support of the microprocessor as a data processor becomes major system of this control system. Setup and configuration of sensors with certain consideration, good data communication systems and realtime applications become necessary to obtain the expected outcomes. Wireless data communication based on certain setting and proper topology is important thing to support the aircraft control system. System to be built also considers the existing standard computer on airplanes.
{"title":"Artificial immune wireless intelligent sensor and actuator network (WISAN) for more electrical aircraft performance monitoring system (Study case: 80 passenger aircraft)","authors":"N. Hendrarini, Ema","doi":"10.1109/ICWT.2015.7449217","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449217","url":null,"abstract":"The issue of this paper is about computer development in the field of aviation. This is in accordance with the technological development of aircraft that shifted from manual to computer-based conditions. Many things can be learned about computerization in the aviation world especially associated with the control mechanism of the aircraft or aircraft communications system. The research related to control of aircraft by utilizing wireless technology and computers. This control technology embeds a special system on another system-computer based. Intelligent system is a system that is filed with artificial immune algorithm. This algorithm is expected to be known to prevent all potential failures. This control technology is intended to be implemented on electrical-based aircraft Redundancy became a matter of support in obtaining reliable and robust performance of system. Sensor system with the support of the microprocessor as a data processor becomes major system of this control system. Setup and configuration of sensors with certain consideration, good data communication systems and realtime applications become necessary to obtain the expected outcomes. Wireless data communication based on certain setting and proper topology is important thing to support the aircraft control system. System to be built also considers the existing standard computer on airplanes.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115774336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ICWT.2015.7449206
Y. A. Siregar, Iskandar
As a natural limited resources, the radio frequency spectrum should be managed and used as efficiently as possible. The Government as regulator has a responsibility to manage and regulate the spectrum to prevent interference. One example of the many problems in Indonesia that must be solved is the spectrum in 2.1 MHz frequency band for 3G services. The CDMA 2000 and UMTS system occupy adjacent band and that very potential to cause interference each other. The CDMA 2000 downlink channel which is separated by only 3.125 MHz guard band, have the potential to interfere the UMTS uplink channel. It is especially in the last channel with a center frequency of 1977.5 MHz. In this paper we evaluate an interference that occur between the two system by computer simulation and experimentally measurement. We propose three methods to cope with this problem, namely spectrum segmentation with sufficient separation band, geographical separation, and additional filters on the BTS. Antenna spatial isolation method is also used so that both systems can operate co-location in which the level of the interference is acceptable. With the arrangement of the antenna vertically by 1,1 meters separation, the additional attenuation of 15.2 dB can be obtained to reduce interference.
{"title":"Frequency interference analysis between UMTS and CDMA 2000 in 2.1 GHz frequency band","authors":"Y. A. Siregar, Iskandar","doi":"10.1109/ICWT.2015.7449206","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449206","url":null,"abstract":"As a natural limited resources, the radio frequency spectrum should be managed and used as efficiently as possible. The Government as regulator has a responsibility to manage and regulate the spectrum to prevent interference. One example of the many problems in Indonesia that must be solved is the spectrum in 2.1 MHz frequency band for 3G services. The CDMA 2000 and UMTS system occupy adjacent band and that very potential to cause interference each other. The CDMA 2000 downlink channel which is separated by only 3.125 MHz guard band, have the potential to interfere the UMTS uplink channel. It is especially in the last channel with a center frequency of 1977.5 MHz. In this paper we evaluate an interference that occur between the two system by computer simulation and experimentally measurement. We propose three methods to cope with this problem, namely spectrum segmentation with sufficient separation band, geographical separation, and additional filters on the BTS. Antenna spatial isolation method is also used so that both systems can operate co-location in which the level of the interference is acceptable. With the arrangement of the antenna vertically by 1,1 meters separation, the additional attenuation of 15.2 dB can be obtained to reduce interference.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129519075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ICWT.2015.7449244
Bramantyo Ibrahim Supriyatno, T. Hidayat, Andriyan Bayu Susksmono, A. Munir
This paper presents the development of radio telescope receiver based on GNU radio and Universal Software Radio Peripheral (USRP). Usually an existing radio telescope receiver is only able to be used for fixed frequency and signal processing system; hence the other different frequency receiver needs to be carried out with different types of observation. Here, the development of radio telescope receiver includes the hardware system and the signal processing system. Then, the design of radio telescope receiver is developed based on GNU Radio and implemented by using USRP. From the result, it shows that the implemented radio telescope receiver which is applied for continuum observation can clearly detect signals at frequencies of 322MHz and 406MHz n which those frequencies are usually used in radio telescope.
{"title":"Development of radio telescope receiver based on GNU radio and USRP","authors":"Bramantyo Ibrahim Supriyatno, T. Hidayat, Andriyan Bayu Susksmono, A. Munir","doi":"10.1109/ICWT.2015.7449244","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449244","url":null,"abstract":"This paper presents the development of radio telescope receiver based on GNU radio and Universal Software Radio Peripheral (USRP). Usually an existing radio telescope receiver is only able to be used for fixed frequency and signal processing system; hence the other different frequency receiver needs to be carried out with different types of observation. Here, the development of radio telescope receiver includes the hardware system and the signal processing system. Then, the design of radio telescope receiver is developed based on GNU Radio and implemented by using USRP. From the result, it shows that the implemented radio telescope receiver which is applied for continuum observation can clearly detect signals at frequencies of 322MHz and 406MHz n which those frequencies are usually used in radio telescope.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129813365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ICWT.2015.7449208
M. D. Putro, T. B. Adji, Bondhan Winduratna
This research consists of a classification system to determine the adult and benign image. Adult image in this research was defined as image that is perceived as pornographic by Indonesian people. The method in this research combines face detection and HS skin color detection on an image. Face detection is done by using the Viola-Jones method. After face detection process, skin detection is performed on the image. Based on the results of face and skin detections, a set of features is extracted and inserted into the classifier. The classification used in determining adult or benign image will be based on the percentage of face area in the image, the position of face in the image, and the percentage of the skin color in the image. For each feature, the threshold value is defined in this research. The results of the classifier is whether an input image is benign or adult images. From 30 sample images, the classification process classifies 5 pieces of images as benign images and 25 images as adult images. False positive rate are 2 images and false negative rate is 1 image with the accuracy of 90%.
{"title":"Adult image classifiers based on face detection using Viola-Jones method","authors":"M. D. Putro, T. B. Adji, Bondhan Winduratna","doi":"10.1109/ICWT.2015.7449208","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449208","url":null,"abstract":"This research consists of a classification system to determine the adult and benign image. Adult image in this research was defined as image that is perceived as pornographic by Indonesian people. The method in this research combines face detection and HS skin color detection on an image. Face detection is done by using the Viola-Jones method. After face detection process, skin detection is performed on the image. Based on the results of face and skin detections, a set of features is extracted and inserted into the classifier. The classification used in determining adult or benign image will be based on the percentage of face area in the image, the position of face in the image, and the percentage of the skin color in the image. For each feature, the threshold value is defined in this research. The results of the classifier is whether an input image is benign or adult images. From 30 sample images, the classification process classifies 5 pieces of images as benign images and 25 images as adult images. False positive rate are 2 images and false negative rate is 1 image with the accuracy of 90%.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130603867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ICWT.2015.7449262
N. Faradina, Iskandar
This paper tried to design the implementation of WRAN 802.22 as a new proposed and interesting standard to provide broadband service in tv white space (unused spectrum digital television), specially in hard to reach and low density population area. With the standard parameter WRAN that have been drafted, we calculate the total amount of site needed in Banten, one of the province in Indonesia. In this paper, we use frequency 650 MHz, 30 dB transmit power, 10 m receiver's height and 30 meter of transmitter height. By using okumura hata propagation, Banten needs 245 site to cover all the area.
{"title":"Coverage simulation for WRAN base station network","authors":"N. Faradina, Iskandar","doi":"10.1109/ICWT.2015.7449262","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449262","url":null,"abstract":"This paper tried to design the implementation of WRAN 802.22 as a new proposed and interesting standard to provide broadband service in tv white space (unused spectrum digital television), specially in hard to reach and low density population area. With the standard parameter WRAN that have been drafted, we calculate the total amount of site needed in Banten, one of the province in Indonesia. In this paper, we use frequency 650 MHz, 30 dB transmit power, 10 m receiver's height and 30 meter of transmitter height. By using okumura hata propagation, Banten needs 245 site to cover all the area.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122128597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ICWT.2015.7449236
Astari Nandhiasa, S. Haryadi
This paper derives Over-the-Top (OTT) regulation analysis. OTT services have gained popularity worldwide and started to replace conventional telecommunication services. The propositions in this paper are deemed necessary as the concepts to protect operators in Indonesia from the eroding revenues caused by OTT services without harming the user.
{"title":"Indonesian regulation management recommendation for Over-the-Top services","authors":"Astari Nandhiasa, S. Haryadi","doi":"10.1109/ICWT.2015.7449236","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449236","url":null,"abstract":"This paper derives Over-the-Top (OTT) regulation analysis. OTT services have gained popularity worldwide and started to replace conventional telecommunication services. The propositions in this paper are deemed necessary as the concepts to protect operators in Indonesia from the eroding revenues caused by OTT services without harming the user.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126313068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ICWT.2015.7449229
S. Haryadi, Jordia Ibrahim
Along with the increased use of telecommunications networks for social media activities, the risk to information security increases, including the risk of flooding traffic. This paper studied the effect of flooding on the QoS traffic in the backbone network and needs to be met by security to face the traffic flooding. Security requirements required include: Centralized resource, identity management that supports Identity Recovery, Transaction Logging, Policy Management, mechanisms of basic security (authentication, confidentiality, etc.) minimization of data, and access control, monitoring system, secure Intranet, secure Internet and Extranet, and physical security.
{"title":"Security requirements planning to anticipate the traffic flooding on the backbone network","authors":"S. Haryadi, Jordia Ibrahim","doi":"10.1109/ICWT.2015.7449229","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449229","url":null,"abstract":"Along with the increased use of telecommunications networks for social media activities, the risk to information security increases, including the risk of flooding traffic. This paper studied the effect of flooding on the QoS traffic in the backbone network and needs to be met by security to face the traffic flooding. Security requirements required include: Centralized resource, identity management that supports Identity Recovery, Transaction Logging, Policy Management, mechanisms of basic security (authentication, confidentiality, etc.) minimization of data, and access control, monitoring system, secure Intranet, secure Internet and Extranet, and physical security.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133133632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ICWT.2015.7449215
Rizal Broer Bahaweres, Ahmad Fauzi, M. Alaydrus
Nowadays, world is on going to “Convergence Era”, where data, voice, and video overcome to pass through same network, like IP network. Unfortunately, the fast growth of application technology has not been supported yet by default IP network in the case of quality of service. We have known, that voice over IP services have sensitivity to delay, jitter and latency. And it require of different bandwidth which is also required some service guarantee. How to comparing queue mechanism of VoIP attributed to QoS?. In this case, we need to give guarantee of QoS relied on operation of data packages to be delivered along with its scheduling. Scheduling represent queue mechanism from an applying of network QoS's, that is an arrangement process of an exit and entry of assumed data packages queuing exceed CIR (Committed Information Rate) specified. Regulation of this data exit and entry can be formed with specified classification. This research compare queue method of First In First Out (FIFO) with two algorithm type of WFQ scheduling which at most used, that is Class Based Weighted Fair Queuing (CBWFQ) and Low Latency Queuing (LLQ). Based on delay, jitter, and MOS (Mean Opinion Score) obtained, LLQ give a better network performance.
如今,世界正在走向“融合时代”,数据、语音、视频跨越同一个网络,如IP网络。遗憾的是,在服务质量的情况下,默认IP网络还不能支持应用技术的快速发展。我们已经知道,IP语音服务对延迟、抖动和延迟很敏感。它需要不同的带宽,也需要一定的业务保障。如何比较基于QoS的VoIP队列机制?在这种情况下,我们需要根据将要发送的数据包的运行及其调度来保证QoS。调度是一种应用网络QoS的队列机制,即对假定的数据包排队超过CIR (Committed Information Rate,承诺信息率)的出、入进行安排的过程。对该数据的出口和输入可以形成规定的分类。本文将先进先出(FIFO)的队列方法与常用的两种WFQ调度算法——基于类的加权公平队列(CBWFQ)和低延迟队列(LLQ)进行了比较。从时延、抖动和得到的MOS (Mean Opinion Score)来看,LLQ能提供更好的网络性能。
{"title":"Comparative analysis of LLQ traffic scheduler to FIFO and CBWFQ on IP phone-based applications (VoIP) using Opnet (Riverbed)","authors":"Rizal Broer Bahaweres, Ahmad Fauzi, M. Alaydrus","doi":"10.1109/ICWT.2015.7449215","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449215","url":null,"abstract":"Nowadays, world is on going to “Convergence Era”, where data, voice, and video overcome to pass through same network, like IP network. Unfortunately, the fast growth of application technology has not been supported yet by default IP network in the case of quality of service. We have known, that voice over IP services have sensitivity to delay, jitter and latency. And it require of different bandwidth which is also required some service guarantee. How to comparing queue mechanism of VoIP attributed to QoS?. In this case, we need to give guarantee of QoS relied on operation of data packages to be delivered along with its scheduling. Scheduling represent queue mechanism from an applying of network QoS's, that is an arrangement process of an exit and entry of assumed data packages queuing exceed CIR (Committed Information Rate) specified. Regulation of this data exit and entry can be formed with specified classification. This research compare queue method of First In First Out (FIFO) with two algorithm type of WFQ scheduling which at most used, that is Class Based Weighted Fair Queuing (CBWFQ) and Low Latency Queuing (LLQ). Based on delay, jitter, and MOS (Mean Opinion Score) obtained, LLQ give a better network performance.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114217017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ICWT.2015.7449216
Cindy Rambitan, Ari Samadhi, A. Kewo, Thomas Suwanto
The development of technology is increasing rapidly. These developments have a huge impact on all areas, including The Health Field. Blood is one very important component in supporting the health of the human body. The lack of information about blood stock availability in hospitals and the Indonesian Red Cross (PMI) makes people often have difficulty in getting the blood they needs. Today many people are willing to donate blood to help people who in needs for blood, but time and cost became their main obstacle, because they need to find the nearest hospital or Indonesian PMI to do so. This application is built to be able to help people get information about existing blood stocks and provide media that can deliver information to people who want to donate their blood. This application is built using Hypertext Preprocessor programming language (PHP). The methodology use is Rapid Application Development (RAD) and using UML (Unified Modeling Language) as a modeling tool. The test result showed that this application is properly function and this application can assist the people in ordering the blood it needs and the people who wants to donate their blood without having to go to the nearby hospital or PMI.
{"title":"Blood provision and service application for people in manado using mobile web technology","authors":"Cindy Rambitan, Ari Samadhi, A. Kewo, Thomas Suwanto","doi":"10.1109/ICWT.2015.7449216","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449216","url":null,"abstract":"The development of technology is increasing rapidly. These developments have a huge impact on all areas, including The Health Field. Blood is one very important component in supporting the health of the human body. The lack of information about blood stock availability in hospitals and the Indonesian Red Cross (PMI) makes people often have difficulty in getting the blood they needs. Today many people are willing to donate blood to help people who in needs for blood, but time and cost became their main obstacle, because they need to find the nearest hospital or Indonesian PMI to do so. This application is built to be able to help people get information about existing blood stocks and provide media that can deliver information to people who want to donate their blood. This application is built using Hypertext Preprocessor programming language (PHP). The methodology use is Rapid Application Development (RAD) and using UML (Unified Modeling Language) as a modeling tool. The test result showed that this application is properly function and this application can assist the people in ordering the blood it needs and the people who wants to donate their blood without having to go to the nearby hospital or PMI.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123175727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ICWT.2015.7449255
Yudha Purwanto, Kuspriyanto, Hendrawan, B. Rahardjo
Anomaly traffic detection is one method to detect attack in internet, especially Distributed Denial of Service (DDoS). Here, traffic analysis which reveal the observed traffic pattern is key important process as the anomaly decision was taken based on traffic analysis. This research analyzed several statistical analysis of traffic datasets categorized as normal, DDoS attack and flashcrowd. Analysis done in aggregate and per-flow traffic level which showed similarity and difference in each category. Windowing technic used to measure instantaneous statistical value. The result showed several statistical difference which could be used to categorized types of anomaly, especially to identify normal threshold. Flow to normal average flow distance distribution perform not followed Gaussian distribution.
{"title":"Statistical analysis on aggregate and flow based traffic features distribution","authors":"Yudha Purwanto, Kuspriyanto, Hendrawan, B. Rahardjo","doi":"10.1109/ICWT.2015.7449255","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449255","url":null,"abstract":"Anomaly traffic detection is one method to detect attack in internet, especially Distributed Denial of Service (DDoS). Here, traffic analysis which reveal the observed traffic pattern is key important process as the anomaly decision was taken based on traffic analysis. This research analyzed several statistical analysis of traffic datasets categorized as normal, DDoS attack and flashcrowd. Analysis done in aggregate and per-flow traffic level which showed similarity and difference in each category. Windowing technic used to measure instantaneous statistical value. The result showed several statistical difference which could be used to categorized types of anomaly, especially to identify normal threshold. Flow to normal average flow distance distribution perform not followed Gaussian distribution.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132529483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}