{"title":"Implementation and Analysis of USB based Password Stealer using PowerShell in Google Chrome and Mozilla Firefox","authors":"Abdul Azies Muslim, Avon Budiono, A. Almaarif","doi":"10.1109/IC2IE50715.2020.9274566","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274566","url":null,"abstract":"Along with the development of the Windows operating system, browser applications to surf the internet are also growing rapidly. The most widely used browsers today are Google Chrome and Mozilla Firefox. Both browsers have a username and password management feature that makes users login to a website easily, but saving usernames and passwords in the browser is quite dangerous because the stored data can be hacked using brute force attacks or read through a program. One way to get a username and password in the browser is to use a program that can read Google Chrome and Mozilla Firefox login data from the computer’s internal storage and then show those data. In this study, an attack will be carried out by implementing Rubber Ducky using BadUSB to run the ChromePass and PasswordFox program and the PowerShell script using the Arduino Pro Micro Leonardo device as a USB Password Stealer. The results obtained from this study are the username and password on Google Chrome and Mozilla Firefox successfully obtained when the USB is connected to the target device, the average time of the attack is 14 seconds then sending it to the author’s email.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124177835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fitri Wijayanti, D. I. Sensuse, A. Putera, Andy Syahrizal
{"title":"Assessment of Information Security Management System: A Case Study of Data Recovery Center in Ministry XYZ","authors":"Fitri Wijayanti, D. I. Sensuse, A. Putera, Andy Syahrizal","doi":"10.1109/IC2IE50715.2020.9274574","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274574","url":null,"abstract":"The DRC of the Ministry XYZ has suffered from a system breach. The DRC's problem will lead to a lack of system information security, availability, and an increasing threat to the whole system of Ministry XYZ. In 2019, the KAMI Index assessment of the Ministry XYZ stated that the level of maturity and completeness of the application of ISO 27001 standards of the XYZ Ministry were at the level of fulfillment of the basic framework. There is a gap between the assessment result and the operational problem within the DRC of Ministry XYZ due to the lack of an information security management system. Therefore, this study conducts the same KAMI Index assessment within the scope of the DRC only and aims to offer a recommendation based on ISO 27001 as the basis of the KAMI Index assessment. This study used discussion, observation, and KAMI Index assessment tools for collecting data and analyze the result. The assessment result of the DRC showed that the maturity level of the ISO 27001 standard on the DRC is on the application of the basic framework. The suggested recommendations to improve the information security management system of the DRC were mostly in the aspect of the information security framework and assets management.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"115 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128394159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khan Md Hasib, Md. Imran Hossain Showrov, Anik Das
{"title":"Accidental Prone Area Detection in Bangladesh using Machine Learning Model","authors":"Khan Md Hasib, Md. Imran Hossain Showrov, Anik Das","doi":"10.1109/IC2IE50715.2020.9274581","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274581","url":null,"abstract":"Nowadays road accident in Bangladesh is a buzzword due to its lack of carefulness of the driver of the vehicle where some parameter exists. The traffic safety of the roadway is an essential concern not only for transportation governing agencies but also for citizens of our country. For safe driving suggestions, the important thing is to find the variables that are tensed to relate to the fatal accidents that are occurring often. In this paper, we create a model using a machine learning approach on the countrywide traffic accident dataset of Bangladesh as an aim to address this problem. The model also helps out to find the diversity of the data by grouping similar objects together to find the accident-prone areas in the country concerning different accident factors as well as detects the cooperation between these factors and causalities.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133749986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IC2IE 2020 TOC","authors":"","doi":"10.1109/ic2ie50715.2020.9274611","DOIUrl":"https://doi.org/10.1109/ic2ie50715.2020.9274611","url":null,"abstract":"","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114478850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Annisa Dwiayu Ramadhanty, Avon Budiono, A. Almaarif
{"title":"Implementation and Analysis of Keyboard Injection Attack using USB Devices in Windows Operating System","authors":"Annisa Dwiayu Ramadhanty, Avon Budiono, A. Almaarif","doi":"10.1109/IC2IE50715.2020.9274631","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274631","url":null,"abstract":"Windows is one of the popular operating systems in use today, while Universal Serial Bus (USB) is one of the mechanisms used by many people with practical plug and play functions. USB has long been used as a vector of attacks on computers. One method of attack is Keylogger. The Keylogger can take advantage of existing vulnerabilities in the Windows 10 operating system attacks carried out in the form of recording computer keystroke activity without the victim knowing. In this research, an attack will be carried out by running a Powershell Script using BadUSB to be able to activate the Keylogger program. The script is embedded in the Arduino Pro Micro device. The results obtained in the Keyboard Injection Attack research using Arduino Pro Micro were successfully carried out with an average time needed to run the keylogger is 7.474 seconds with a computer connected to the internet. The results of the keylogger will be sent to the attacker via email.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"22 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132870039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Time-Series Outliers Detection Algorithm with Clustering Approach on Non-Linear Trends","authors":"H. Widiputra, Adele Mailangkay, Elliana Gautama","doi":"10.1109/IC2IE50715.2020.9274644","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274644","url":null,"abstract":"It has been found that the existence of outliers, particularly in time-series data, can be significantly influenced the modelling and analysis results that are conducted on the data, which is further may lead to improper decision making. Nevertheless, the task of time-series outlier detection can be quite challenging when dealing with collection of data that retain non-linear trends over time as the progression of series may shifted and would be infer as possible outliers. In this study, an algorithm for time-series outlier detection that makes use of a clustering approach on time-series data to construct a set of localized trend models that is capable to identify anomalous data in a collection of non-linear trends is proposed. Decisively, results from conducted experiments confirm that the procedure performs prompt, incremental valuation of information as soon as it becomes accessible, able to handle significant amount of data, and does not need any pre-classification of anomalies. Furthermore, trials with real-world data from insurance field confirm that the proposed method is able to correctly identify abnormal data and can be of help to increase decision making process.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115081894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Yusup Zakaria, E. C. Djamal, Fikri Nugraha, Fatan Kasyidi
{"title":"Speech Emotion Identification Using Linear Predictive Coding and Recurrent Neural","authors":"Muhammad Yusup Zakaria, E. C. Djamal, Fikri Nugraha, Fatan Kasyidi","doi":"10.1109/IC2IE50715.2020.9274629","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274629","url":null,"abstract":"Social, affective communication in recent years shows significant developments, especially in the verbal understanding of emotions. Human connection naturally adjusts to their responses based on the actions of their interlocutor in a particular matter. Previous research has shown that the use of neural network architecture can identify emotions based on speech, but the results of accuracy are not good due to the imbalance of data and problems with the design of the classification system. This study uses Linear Predictive Coding (LPC). LPC can represent the pronunciation of one’s dialogue. From 16 coefficient LPC is used as a vector feature as input for voice emotion identification using Recurrent Neural Network (RNN). Long Short Term Memory (LSTM) or Gated Recurrent Unit (GRU) architecture is used to overcome vanishing or exploding gradient. At the identification stage, that uses forward propagation with a softmax activation function. We have conducted a simulation using RNN as a method for making emotional identification. The results of this study RNNGRU using Adam optimization model with a learning rate of 0.001 get an accuracy of 90.93% and a losses value of 0.216. In comparison, the RNN-LSTM got an accuracy of 87.50% and losses value of 0.262. The experimental results show that the best model is achieved when using the RNN-GRU with the Adam optimization method. The F-Measure value obtained is 0.91.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123687488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Brain-Computer Interface of Motor Imagery Using ICA and Recurrent Neural Networks","authors":"Anita Safitri, E. C. Djamal, Fikri Nugraha","doi":"10.1109/IC2IE50715.2020.9274681","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274681","url":null,"abstract":"Brain-Computer Interface (BCI) is a device that can connect brain commands without the need for movement, gesture, or voice. Usually, BCI uses the Electroencephalogram (EEG) signal as an intermediate device. EEG signals need to be extracted into waves that represent the action in mind. In this study used Wavelet transformation to obtain the imagery motor component from the EEG signal. However, the problem also arises in the considerable channel redundancy in EEG signal recording. Therefore, it requires a signal reduction process. This paper proposed the problem using Independent Component Analysis (ICA). Then ICA components are features of Recurrent Neural Networks (RNN) to classify BCI information into four classes. The experimental results showed that using ICA improved accuracy by up to 99.06%, compared to Wavelet and RNN only, which is only 94.06%. We examined three optimization models, particularly Adam, AdaDelta, and AdaGrad. However, two optimization models provided the best recognition capabilities, i.e., AdaDelta, and AdaGrad.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121386036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interactive Augmented Reality For The Depth Of An Object Using The Model-Based Occlusion Method","authors":"Tonny Hidayat, Ika Asti Astuti","doi":"10.1109/IC2IE50715.2020.9274565","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274565","url":null,"abstract":"The general concept in marker-based Augmented Reality is to add virtual objects in the real world using markers as object tracking. In its development AR devices can detect 3D real objects as object tracking (3D Object Tracking) so as to allow interaction between virtual objects and real objects. However, the application of AR for general devices such as Android smartphones that do not have depth sensors, virtual objects are added without having depth information from the real world so that virtual content is always displayed in front of or on top of real objects and causes Occlusion problems. Occlusion refers to the problem when real objects that are closer to the user are covered by more distant virtual objects. This research formulates the handling of the Occlusion problem using the Model-Based Occlusion method in which the geometry information of the model from real objects must be known and registered in advance to the system. To maintain the suitability of the model’s geometry information with its real object, Tracking is needed. In this case using 3D Object Tracking by utilizing real objects that have been registered in the ModelBased Occlusion. The results of this study are the virtual objects that appear can occupy the correct position in the Augmented Reality application. In this case using 3D Object Tracking by utilizing real objects that have been registered in the ModelBased Occlusion. The results of this study are the virtual objects that appear can occupy the correct position in the Augmented Reality application. In this case using 3D Object Tracking by utilizing real objects that have been registered in the ModelBased Occlusion. The results of this study are the virtual objects that appear can occupy the correct position in the Augmented Reality application.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130008803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Urban Area Change Detection with Combining CNN and RNN from Sentinel-2 Multispectral Remote Sensing Data","authors":"Uus Khusni, H. I. Dewangkoro, A. M. Arymurthy","doi":"10.1109/IC2IE50715.2020.9274617","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274617","url":null,"abstract":"Change detection is one of the hot issues related to world observation and has been extensively studied in recent decades. The application of remote sensing technology provides inputs to systems for urban change detection primarily focus on the urban data user environment. Urban change detection refers to the general problem of monitoring the urban system and discerning changes that are occurring within that system that use to urban planners, managers, and researchers. Current methods based on a simple mechanism for independently encoding bi-temporal images to get their representation vectors. In fact, these methods do not make full use of the rich information between bi-temporal images. We propose to combine deep learning methods such as Convolutional Neural Network (U-Net) for feature extraction and Recurrent Neural Network (BiLSTM) temporal modeling. Our developed model while the validation phase gets 97.418% overall accuracy on the Onera Satellite Change Detection (OSCD) Sentinel-2 bi-temporal dataset.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117123481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}