首页 > 最新文献

2022 International Conference on Information Technology Systems and Innovation (ICITSI)最新文献

英文 中文
CANTool An In-Vehicle Network Data Analyzer CANTool车载网络数据分析仪
Pub Date : 2022-11-08 DOI: 10.1109/ICITSI56531.2022.9970968
Md Rezanur Islam, Insu Oh, Kangbin Yim
In recent years, IoT devices have drawn attention to big data, complicating connectivity, and daily data processing. The automotive sector is no exception. The right way of vehicle data analysis is becoming essential every day for detecting internal errors, protecting against attackers, and connected vehicle concepts such as V2X. Some researchers use raw data to secure CAN, but that's not enough. On the other hand, deep learning is essential to secure autonomous driving and CAN, and data labeling is an obstacle. So, data analysis played an important role in data labeling. There are major flaws in data analysis, feature extraction, and data labeling for in-vehicle networks. Therefore, we proposed a CAN message analysis tool concept that can provide deep label analysis results and new features. There are many data analysis techniques these days, and we are trying to include suitable CAN message analysis techniques in our tool concept.
近年来,物联网设备引起了人们对大数据、复杂连接和日常数据处理的关注。汽车行业也不例外。正确的车辆数据分析方法对于检测内部错误、防范攻击者以及V2X等联网车辆概念日益重要。一些研究人员使用原始数据来保护CAN,但这还不够。另一方面,深度学习对于确保自动驾驶和CAN至关重要,而数据标记是一个障碍。因此,数据分析在数据标注中起着重要的作用。车载网络在数据分析、特征提取、数据标注等方面存在较大缺陷。因此,我们提出了一种可以提供深度标签分析结果和新功能的CAN消息分析工具概念。目前有许多数据分析技术,我们正在尝试在我们的工具概念中包含合适的CAN消息分析技术。
{"title":"CANTool An In-Vehicle Network Data Analyzer","authors":"Md Rezanur Islam, Insu Oh, Kangbin Yim","doi":"10.1109/ICITSI56531.2022.9970968","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970968","url":null,"abstract":"In recent years, IoT devices have drawn attention to big data, complicating connectivity, and daily data processing. The automotive sector is no exception. The right way of vehicle data analysis is becoming essential every day for detecting internal errors, protecting against attackers, and connected vehicle concepts such as V2X. Some researchers use raw data to secure CAN, but that's not enough. On the other hand, deep learning is essential to secure autonomous driving and CAN, and data labeling is an obstacle. So, data analysis played an important role in data labeling. There are major flaws in data analysis, feature extraction, and data labeling for in-vehicle networks. Therefore, we proposed a CAN message analysis tool concept that can provide deep label analysis results and new features. There are many data analysis techniques these days, and we are trying to include suitable CAN message analysis techniques in our tool concept.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121326031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile Health Application Security Assesment Based on OWASP Top 10 Mobile Vulnerabilities 基于OWASP的移动医疗应用安全十大漏洞评估
Pub Date : 2022-11-08 DOI: 10.1109/ICITSI56531.2022.9970949
Dimas Febriyan Priambodo, Guntur Satria Ajie, Hendy Aulia Rahman, Aldi Cahya Fajar Nugraha, Aulia Rachmawati, Marcella Risky Avianti
The increase of smartphone users in Indonesia is the reason for various sectors to improve their services through mobile applications, including the healthcare sector. The healthcare sector is considered a critical sector as it stores various health data of its users classified as confidential. This is the basis for the need to conduct a security analysis for mobile health applications, which are widely used in Indonesia. MobSF (Mobile Security Framework) and MARA (Mobile Application Reverse Engineering and Analysis) Framework are mobile application security analysis methods capable of assessing security levels based on OWASP (Open Web Application Security Project) Mobile Top 10 2016 classification, CVSS (Common Vulnerability Scoring System) and CWE (Common Weakness Enumeration). It is expected that the test results with MobSF and MARA can provide a safety metric for mobile health applications as a means of safety information for users and application developers.
印度尼西亚智能手机用户的增加是各个部门通过移动应用程序改善服务的原因,包括医疗保健部门。医疗保健部门被认为是一个关键部门,因为它存储了被列为机密的用户的各种健康数据。这是需要对在印度尼西亚广泛使用的移动保健应用程序进行安全分析的基础。MobSF(移动安全框架)和MARA(移动应用逆向工程与分析)框架是基于OWASP(开放Web应用安全项目)2016年移动十大分类、CVSS(常见漏洞评分系统)和CWE(常见弱点枚举)的移动应用安全分析方法,能够评估安全级别。预计MobSF和MARA的测试结果可以为移动健康应用程序提供安全度量,作为用户和应用程序开发人员提供安全信息的手段。
{"title":"Mobile Health Application Security Assesment Based on OWASP Top 10 Mobile Vulnerabilities","authors":"Dimas Febriyan Priambodo, Guntur Satria Ajie, Hendy Aulia Rahman, Aldi Cahya Fajar Nugraha, Aulia Rachmawati, Marcella Risky Avianti","doi":"10.1109/ICITSI56531.2022.9970949","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970949","url":null,"abstract":"The increase of smartphone users in Indonesia is the reason for various sectors to improve their services through mobile applications, including the healthcare sector. The healthcare sector is considered a critical sector as it stores various health data of its users classified as confidential. This is the basis for the need to conduct a security analysis for mobile health applications, which are widely used in Indonesia. MobSF (Mobile Security Framework) and MARA (Mobile Application Reverse Engineering and Analysis) Framework are mobile application security analysis methods capable of assessing security levels based on OWASP (Open Web Application Security Project) Mobile Top 10 2016 classification, CVSS (Common Vulnerability Scoring System) and CWE (Common Weakness Enumeration). It is expected that the test results with MobSF and MARA can provide a safety metric for mobile health applications as a means of safety information for users and application developers.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125533004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Road Improvement Decision Support System Based on Road Damage Severe Analysis 基于道路损伤严重程度分析的道路改造决策支持系统
Pub Date : 2022-11-08 DOI: 10.1109/ICITSI56531.2022.9971074
Wita Dewisari Tasya, F. Hidayat
The severity of road damage needs to be known in making decisions about when road repairs will be carried out. The system helps enter a severity measure and finally maps out how severe the damage was. The severity of road damage that has been combined with the classification of road damage can be integrated into a decision support system. The value of the pavement condition index (IKP) can be calculated from the identified damage. The aim of this paper is to improve the pavement condition index calculation with interpolation to calculate the reduction factor and corrected total reduction factor. With a more accurate IKP, it is possible to prioritize road damage that needs to be addressed within the existing budget constraints.
在决定何时进行道路维修时,需要了解道路损坏的严重程度。该系统帮助输入严重程度度量,并最终绘制出损坏的严重程度。将道路损伤的严重程度与道路损伤的分类相结合,可以集成到决策支持系统中。路面状况指数(IKP)可由识别出的损伤值计算得到。本文的目的是改进路面状况指数的插值计算,计算折减系数和修正的总折减系数。有了更准确的IKP,就可以在现有预算限制下优先处理需要解决的道路损坏问题。
{"title":"Road Improvement Decision Support System Based on Road Damage Severe Analysis","authors":"Wita Dewisari Tasya, F. Hidayat","doi":"10.1109/ICITSI56531.2022.9971074","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9971074","url":null,"abstract":"The severity of road damage needs to be known in making decisions about when road repairs will be carried out. The system helps enter a severity measure and finally maps out how severe the damage was. The severity of road damage that has been combined with the classification of road damage can be integrated into a decision support system. The value of the pavement condition index (IKP) can be calculated from the identified damage. The aim of this paper is to improve the pavement condition index calculation with interpolation to calculate the reduction factor and corrected total reduction factor. With a more accurate IKP, it is possible to prioritize road damage that needs to be addressed within the existing budget constraints.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123819353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Knowledge Requirement for E-government Implementation in Indonesia: A Mixed Method 印尼电子政府实施的知识需求:一种混合方法
Pub Date : 2022-11-08 DOI: 10.1109/ICITSI56531.2022.9970893
Elin Cahyaningsih, Natascha Lestari Eunike Silalahi, Siti Rohajawati, Muhammad Vallen Firdaus
Knowledge is an organizational intangible asset it describes organizational core value. Knowledge defines in individual and organizational artefact. Indonesia began assessing e-government implementation in 2018 and faced various problems and challenges which can be solved by skill and experience in e-government implementation. This research aimed to identify knowledge requirements of e-government implementation in Indonesia and divided it into 4 domains. A mixed methods approach was used to discover some findings related to the required knowledge. Content analysis is used to codify the knowledge require based on the regulation. Then, correspondence analysis is used to analyze the contingency value of each knowledge and domain. The result shows there are 75 knowledge required for e-Government implementation which is divided into 4 domains. BIPLOT diagram represents the association and similarity between each knowledge and the domain.
知识是组织的无形资产,它描述了组织的核心价值。知识在个人和组织的工件中定义。印度尼西亚于2018年开始评估电子政务实施情况,面临各种问题和挑战,这些问题和挑战可以通过电子政务实施的技能和经验来解决。本研究旨在确定印尼电子政务实施的知识需求,并将其分为4个领域。使用混合方法方法来发现与所需知识相关的一些发现。内容分析是根据法规对所需要的知识进行编码。然后,利用对应分析方法分析各知识和领域的权变值。结果表明,实施电子政务需要75项知识,分为4个领域。BIPLOT图表示每个知识与领域之间的关联和相似度。
{"title":"Knowledge Requirement for E-government Implementation in Indonesia: A Mixed Method","authors":"Elin Cahyaningsih, Natascha Lestari Eunike Silalahi, Siti Rohajawati, Muhammad Vallen Firdaus","doi":"10.1109/ICITSI56531.2022.9970893","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970893","url":null,"abstract":"Knowledge is an organizational intangible asset it describes organizational core value. Knowledge defines in individual and organizational artefact. Indonesia began assessing e-government implementation in 2018 and faced various problems and challenges which can be solved by skill and experience in e-government implementation. This research aimed to identify knowledge requirements of e-government implementation in Indonesia and divided it into 4 domains. A mixed methods approach was used to discover some findings related to the required knowledge. Content analysis is used to codify the knowledge require based on the regulation. Then, correspondence analysis is used to analyze the contingency value of each knowledge and domain. The result shows there are 75 knowledge required for e-Government implementation which is divided into 4 domains. BIPLOT diagram represents the association and similarity between each knowledge and the domain.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121141127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Blockchain-based Traceability System to Achieve the Quality Objectives in the Production Process of A Manufacturing Industry 基于区块链的可追溯系统,实现制造业生产过程中的质量目标
Pub Date : 2022-11-08 DOI: 10.1109/ICITSI56531.2022.9970822
Anggastya Diah Andita H. P, I. B. Nugraha
ISO 9001 is a standard for an organization that focuses on quality management. In ISO 9001, the organization must implement seven main clauses in achieving the certification or audit if the company has obtained ISO 9001 certification. One of the clauses is clause 6.2, which is related to quality objectives and focuses on process. The organization can achieve this clause if all SOPs in the organization are appropriately implemented. Therefore, if the SOP is well implemented, the process inside also runs well, and the quality objectives will be in line with the expectations. Manufacturing industry will be the case of the organization for this study. This study proposed a tracing system for the procedure in the SOP that used to achieve clause 6.2, quality objectives in ISO 9001. The database has an important role in system development because the system will store all information in it. Databases with conventional method have various weaknesses in data handling, such as centralized data storage and lack of security. Centralized data will make it difficult for each staff in the organization to access data if the main server is down. This study will focus on blockchain applied to traceability system as database technology because it can minimize the shortcomings of the database with conventional method. The results show that the data traceability system can trace procedures well and the data running well according to its function in storing data with blockchain. Based on these results, the traceability system in this study can trace procedures in achieving quality objectives in ISO 9001.
ISO 9001是一个专注于质量管理的组织的标准。在ISO 9001中,如果公司获得了ISO 9001认证,组织在获得认证或审核时必须实施七个主要条款。其中第6.2条与质量目标有关,侧重于过程。如果组织内的所有标准操作规程得到适当实施,组织就能实现这一条款。因此,如果SOP执行得好,内部的过程也会运行得好,质量目标也会符合预期。本文将以制造业为组织案例进行研究。本研究提出了一个用于实现ISO 9001第6.2条质量目标的SOP程序的跟踪系统。数据库在系统开发中起着重要的作用,因为系统将所有信息存储在数据库中。传统方法的数据库在数据处理方面存在数据集中存储、安全性不足等缺点。如果主服务器宕机,集中的数据将使组织中的每个员工都难以访问数据。本研究将重点研究区块链作为数据库技术应用于可追溯系统,因为它可以最大限度地减少传统方法数据库的缺点。结果表明,根据区块链存储数据的功能,数据可追溯系统可以很好地跟踪流程,数据运行良好。基于这些结果,本研究中的可追溯系统可以追溯实现ISO 9001质量目标的程序。
{"title":"A Blockchain-based Traceability System to Achieve the Quality Objectives in the Production Process of A Manufacturing Industry","authors":"Anggastya Diah Andita H. P, I. B. Nugraha","doi":"10.1109/ICITSI56531.2022.9970822","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970822","url":null,"abstract":"ISO 9001 is a standard for an organization that focuses on quality management. In ISO 9001, the organization must implement seven main clauses in achieving the certification or audit if the company has obtained ISO 9001 certification. One of the clauses is clause 6.2, which is related to quality objectives and focuses on process. The organization can achieve this clause if all SOPs in the organization are appropriately implemented. Therefore, if the SOP is well implemented, the process inside also runs well, and the quality objectives will be in line with the expectations. Manufacturing industry will be the case of the organization for this study. This study proposed a tracing system for the procedure in the SOP that used to achieve clause 6.2, quality objectives in ISO 9001. The database has an important role in system development because the system will store all information in it. Databases with conventional method have various weaknesses in data handling, such as centralized data storage and lack of security. Centralized data will make it difficult for each staff in the organization to access data if the main server is down. This study will focus on blockchain applied to traceability system as database technology because it can minimize the shortcomings of the database with conventional method. The results show that the data traceability system can trace procedures well and the data running well according to its function in storing data with blockchain. Based on these results, the traceability system in this study can trace procedures in achieving quality objectives in ISO 9001.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121761546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modified RC4 Algorithm for Improve Data Protection in Cloud Environment 改进RC4算法,提高云环境下的数据保护
Pub Date : 2022-11-08 DOI: 10.1109/ICITSI56531.2022.9971094
Ethar Abdul Wahhab Hachim, Thekra Abbas, M. Gaata
The rapid growth of digital technologies that depending on cloud computing has seriously increased the threats related to information security. This will certainly pose a major threat to the trust of users of the cloud environment. For this reason, the use of algorithms like Rivest Ciphers 4 (RC4) algorithms to encrypt data and then store in the cloud became essential issue. So, because of the simplicity and ease of RC4 algorithm and its suitability to encrypt most data form efficiently, it has been widely used. But, the RC4 algorithm suffers from some weaknesses in both of Key Schedule Algorithm (KSA) and Pseudo-Random Generation Algorithm (PRGA) stages. As, the intruder may be able to follow the traces and thus retrieve the key based on the internal state or the stream of output. There were a lot of modifications in many literature reviews to improve the security and performance of the RC4 algorithm. In this paper, the focus was placed on improving the RC4 algorithm in both of (KSA) and (PRGA) in order to increase the security level. The performance of our improved RC4 algorithm was tested and evaluated by increasing the randomness of the generated key. The experimental results prove that high security level for output based on the security average of ciphertext with various keys and various files size. Thus, get more security level for the personal data that is stored in the cloud.
以云计算为依托的数字技术的快速发展,严重增加了与信息安全相关的威胁。这无疑会对云环境用户的信任构成重大威胁。因此,使用Rivest Ciphers 4 (RC4)算法等算法对数据进行加密,然后将其存储在云中就成为了关键问题。因此,由于RC4算法的简便性和对大多数数据形式的有效加密,它得到了广泛的应用。但是,RC4算法在密钥调度算法(KSA)和伪随机生成算法(PRGA)两个阶段都存在一定的缺陷。因此,入侵者可能能够跟踪跟踪,从而根据内部状态或输出流检索密钥。为了提高RC4算法的安全性和性能,在很多文献综述中都做了很多修改。本文重点对(KSA)和(PRGA)中的RC4算法进行了改进,以提高安全级别。改进后的RC4算法的性能通过增加生成密钥的随机性进行了测试和评估。实验结果证明,基于不同密钥和不同文件大小的密文的安全平均值,输出具有较高的安全级别。因此,为存储在云中的个人数据提供更高的安全级别。
{"title":"Modified RC4 Algorithm for Improve Data Protection in Cloud Environment","authors":"Ethar Abdul Wahhab Hachim, Thekra Abbas, M. Gaata","doi":"10.1109/ICITSI56531.2022.9971094","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9971094","url":null,"abstract":"The rapid growth of digital technologies that depending on cloud computing has seriously increased the threats related to information security. This will certainly pose a major threat to the trust of users of the cloud environment. For this reason, the use of algorithms like Rivest Ciphers 4 (RC4) algorithms to encrypt data and then store in the cloud became essential issue. So, because of the simplicity and ease of RC4 algorithm and its suitability to encrypt most data form efficiently, it has been widely used. But, the RC4 algorithm suffers from some weaknesses in both of Key Schedule Algorithm (KSA) and Pseudo-Random Generation Algorithm (PRGA) stages. As, the intruder may be able to follow the traces and thus retrieve the key based on the internal state or the stream of output. There were a lot of modifications in many literature reviews to improve the security and performance of the RC4 algorithm. In this paper, the focus was placed on improving the RC4 algorithm in both of (KSA) and (PRGA) in order to increase the security level. The performance of our improved RC4 algorithm was tested and evaluated by increasing the randomness of the generated key. The experimental results prove that high security level for output based on the security average of ciphertext with various keys and various files size. Thus, get more security level for the personal data that is stored in the cloud.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134434970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Feature Extraction TF-IDF to Perform Cyberbullying Text Classification: A Literature Review and Future Research Direction 特征提取TF-IDF进行网络欺凌文本分类:文献综述及未来研究方向
Pub Date : 2022-11-08 DOI: 10.1109/ICITSI56531.2022.9970942
Yudi Setiawan, Dani Gunawan, Rusdi Efendi
Feature extraction on text documents becomes a challenging task for making natural language and machine learning classifications. A document has a complex wording with various meanings and expressions contained in it. The complexity and variety of perceptions make it difficult to find labels and classify documents. The feature extraction process can be carried out to capture important text, phrases and words contained in a document so that the text classification process can be carried out. Term Frequency-Inverse Document Frequency (TF-IDF) is a feature extraction method by performing a grouping process based on the statistics of the occurrence of words from the data collection used. In this paper, the authors present feature extraction with the TF-IDF method with variations of the model approach. Such as; weighting on the occurrence of the word, the filter process on the words in the document, creation rules on term documents, extraction for two or more syllables, and combination with other extraction methods, to improve the text classification process in cyberbullying detection. This paper also opens up opportunities that can be done in the future regarding feature extraction with variations of statistical models of word occurrences in textual detection.
文本文档的特征提取是进行自然语言和机器学习分类的一个具有挑战性的任务。文档的措辞复杂,包含各种含义和表达。感知的复杂性和多样性使得查找标签和分类文档变得困难。特征提取过程可以捕获文档中包含的重要文本、短语和单词,从而进行文本分类过程。术语频率-逆文档频率(TF-IDF)是一种特征提取方法,它基于所使用的数据集合中单词的出现统计数据执行分组处理。在本文中,作者提出了基于TF-IDF方法的特征提取方法和模型方法的变体。等;对单词的出现次数进行加权,对文档中的单词进行过滤,对术语文档进行创建规则,对两个或多个音节进行提取,并结合其他提取方法,改进网络欺凌检测中的文本分类过程。本文还为将来在文本检测中使用不同的单词出现统计模型进行特征提取提供了机会。
{"title":"Feature Extraction TF-IDF to Perform Cyberbullying Text Classification: A Literature Review and Future Research Direction","authors":"Yudi Setiawan, Dani Gunawan, Rusdi Efendi","doi":"10.1109/ICITSI56531.2022.9970942","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970942","url":null,"abstract":"Feature extraction on text documents becomes a challenging task for making natural language and machine learning classifications. A document has a complex wording with various meanings and expressions contained in it. The complexity and variety of perceptions make it difficult to find labels and classify documents. The feature extraction process can be carried out to capture important text, phrases and words contained in a document so that the text classification process can be carried out. Term Frequency-Inverse Document Frequency (TF-IDF) is a feature extraction method by performing a grouping process based on the statistics of the occurrence of words from the data collection used. In this paper, the authors present feature extraction with the TF-IDF method with variations of the model approach. Such as; weighting on the occurrence of the word, the filter process on the words in the document, creation rules on term documents, extraction for two or more syllables, and combination with other extraction methods, to improve the text classification process in cyberbullying detection. This paper also opens up opportunities that can be done in the future regarding feature extraction with variations of statistical models of word occurrences in textual detection.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126566261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey on MAC Protocol of Mobile Ad hoc Network for Tactical Data Link System 战术数据链系统移动自组网MAC协议研究
Pub Date : 2022-11-08 DOI: 10.1109/ICITSI56531.2022.9971025
Riyanto, S. Supangkat, Iskandar
Tactical Data Link (TDL) is one of the important elements in Network Centric Warfare (NCW). TDL provides the means for rapid exchange of tactical information between air, ground, sea units and command centers. In military operations, TDL has high demands for resilience, responsiveness, reliability, availability and security. MANET has characteristics that are suitable for the combat environment, namely the ability to self-form and self-healing so that this network may be applied to the TDL system. To produce high performance in MANET adapted for TDL system, an efficient MAC Protocol method is needed. This paper provides a survey of several MAC Protocol methods on a tactical MANET. In this paper also suggests some improvements to the MANET MAC protocol to improve TDL system performance.
战术数据链(TDL)是网络中心战(NCW)的重要组成部分。TDL提供了在空中、地面、海上单位和指挥中心之间快速交换战术信息的手段。在军事行动中,TDL对弹性、响应性、可靠性、可用性和安全性有很高的要求。MANET具有适合作战环境的特性,即自形成和自修复能力,因此该网络可以应用于TDL系统。为了使MANET具有较高的性能,需要一种有效的MAC协议方法。本文综述了战术机动网络中的几种MAC协议方法。为了提高TDL系统的性能,本文还对MANET MAC协议提出了一些改进建议。
{"title":"Survey on MAC Protocol of Mobile Ad hoc Network for Tactical Data Link System","authors":"Riyanto, S. Supangkat, Iskandar","doi":"10.1109/ICITSI56531.2022.9971025","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9971025","url":null,"abstract":"Tactical Data Link (TDL) is one of the important elements in Network Centric Warfare (NCW). TDL provides the means for rapid exchange of tactical information between air, ground, sea units and command centers. In military operations, TDL has high demands for resilience, responsiveness, reliability, availability and security. MANET has characteristics that are suitable for the combat environment, namely the ability to self-form and self-healing so that this network may be applied to the TDL system. To produce high performance in MANET adapted for TDL system, an efficient MAC Protocol method is needed. This paper provides a survey of several MAC Protocol methods on a tactical MANET. In this paper also suggests some improvements to the MANET MAC protocol to improve TDL system performance.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133567128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain in Banking 区块链在银行业的应用
Pub Date : 2022-11-08 DOI: 10.1109/ICITSI56531.2022.9970827
Nurul Hidayah Arrifin, Ulaganathan Subramanian
Blockchain technology is one of the innovations in financial technology that serves as the backbone of Bitcoin and Cryptocurrency. A blockchain is a secure ledger of all data transfer activities that eliminate the need for third-party involvement. It is a technology that records transactions using distributed databases and cryptography. There are three types of blockchain which are public, private, and Consortium or Federated blockchain. Many industries have used blockchain technology. Blockchain in banking is one of the industries that use blockchain the most and need by the country and organization. Many use cases on blockchain in banking, such as Know Your Customer (KYC), clearing and settlement, trade finance, payments, smart contract, and syndicated loans. These use cases could see the impact of implementing blockchain in banking.
区块链技术是金融技术的创新之一,是比特币和加密货币的支柱。区块链是所有数据传输活动的安全分类账,消除了第三方参与的需要。它是一种使用分布式数据库和密码学记录事务的技术。区块链有三种类型,即公共、私有和联盟或联邦区块链。许多行业都使用了区块链技术。银行区块链是国家和组织使用区块链最多、最需要的行业之一。区块链在银行业的许多用例,如了解你的客户(KYC)、清算和结算、贸易融资、支付、智能合约和银团贷款。这些用例可以看到在银行业实施区块链的影响。
{"title":"Blockchain in Banking","authors":"Nurul Hidayah Arrifin, Ulaganathan Subramanian","doi":"10.1109/ICITSI56531.2022.9970827","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970827","url":null,"abstract":"Blockchain technology is one of the innovations in financial technology that serves as the backbone of Bitcoin and Cryptocurrency. A blockchain is a secure ledger of all data transfer activities that eliminate the need for third-party involvement. It is a technology that records transactions using distributed databases and cryptography. There are three types of blockchain which are public, private, and Consortium or Federated blockchain. Many industries have used blockchain technology. Blockchain in banking is one of the industries that use blockchain the most and need by the country and organization. Many use cases on blockchain in banking, such as Know Your Customer (KYC), clearing and settlement, trade finance, payments, smart contract, and syndicated loans. These use cases could see the impact of implementing blockchain in banking.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127787850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Android Malware Evasion Framework For Auditing Anti-Malware Resistance Against Various Obfuscation Technique And Dynamic Code Loading Android恶意软件规避框架,用于审计反恶意软件对各种混淆技术和动态代码加载的抵抗力
Pub Date : 2022-11-08 DOI: 10.1109/ICITSI56531.2022.9970912
Steven Prasetya Ohello, Suhardi
Malware is one of the biggest threats to the Android system today. Anti-malware researchers and malware developers are constantly competing to produce their best product. In this study we tried to evaluate the robustness of anti-malware on the market by auditing it from the point of view of malware authors. By understanding how an attack technique is developed, hopefully we can come up with better defenses in the future. Several studies have shown that transformation with code obfuscation and the use of dynamic code loading has proven to be effective in avoiding detection. But the research so far has only focused on how to bypass anti-malware. Existing studies have not discussed how to bypass Play Protect and permission based checks on the android system and get permission from the user. We propose a framework for auditing anti-malware using various obfuscation techniques and dynamic code loading. Malware will be embedded into legitimate apps to bypass play protect detection. This framework has a mechanism to check and add a number of permissions that malware needs into the application and force the user to grant permissions at runtime. In addition we also added a feature to randomize the order of the obfuscation process and also randomly generate certificates. From the experiments we conducted, each of these features was able to reduce the detection rate of the virustotal by 50%. The overall implementation and testing of our framework shows a significant reduction in detection. The malware was also successfully installed on the real device and carried out its functions properly without being detected.
恶意软件是当今Android系统最大的威胁之一。反恶意软件研究人员和恶意软件开发人员不断竞争,以生产出他们最好的产品。在这项研究中,我们试图通过从恶意软件作者的角度审计来评估市场上反恶意软件的鲁棒性。通过了解攻击技术是如何发展的,我们有望在未来提出更好的防御措施。一些研究表明,使用代码混淆和动态代码加载的转换在避免检测方面是有效的。但迄今为止的研究只关注如何绕过反恶意软件。现有的研究还没有讨论如何绕过Play Protect和基于android系统的权限检查,并获得用户的许可。我们提出了一个使用各种混淆技术和动态代码加载来审计反恶意软件的框架。恶意软件将嵌入到合法的应用程序,以绕过播放保护检测。这个框架有一种机制来检查和添加一些恶意软件需要的权限到应用程序中,并强制用户在运行时授予权限。此外,我们还添加了一个特性来随机化混淆过程的顺序,并随机生成证书。从我们进行的实验来看,这些特征中的每一个都能够将虚拟病毒的检测率降低50%。我们的框架的整体实现和测试表明,检测显著减少。恶意软件也成功安装在真实设备上,并在未被检测到的情况下正常执行其功能。
{"title":"Android Malware Evasion Framework For Auditing Anti-Malware Resistance Against Various Obfuscation Technique And Dynamic Code Loading","authors":"Steven Prasetya Ohello, Suhardi","doi":"10.1109/ICITSI56531.2022.9970912","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970912","url":null,"abstract":"Malware is one of the biggest threats to the Android system today. Anti-malware researchers and malware developers are constantly competing to produce their best product. In this study we tried to evaluate the robustness of anti-malware on the market by auditing it from the point of view of malware authors. By understanding how an attack technique is developed, hopefully we can come up with better defenses in the future. Several studies have shown that transformation with code obfuscation and the use of dynamic code loading has proven to be effective in avoiding detection. But the research so far has only focused on how to bypass anti-malware. Existing studies have not discussed how to bypass Play Protect and permission based checks on the android system and get permission from the user. We propose a framework for auditing anti-malware using various obfuscation techniques and dynamic code loading. Malware will be embedded into legitimate apps to bypass play protect detection. This framework has a mechanism to check and add a number of permissions that malware needs into the application and force the user to grant permissions at runtime. In addition we also added a feature to randomize the order of the obfuscation process and also randomly generate certificates. From the experiments we conducted, each of these features was able to reduce the detection rate of the virustotal by 50%. The overall implementation and testing of our framework shows a significant reduction in detection. The malware was also successfully installed on the real device and carried out its functions properly without being detected.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114306396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 International Conference on Information Technology Systems and Innovation (ICITSI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1