{"title":"Influence of Relief Feature Selection on Random Forest and Support Vector Machine Classification Algorithm","authors":"Iustisia Natalia Simbolon, Romual Naibaho","doi":"10.1109/IWBIS56557.2022.9924782","DOIUrl":"https://doi.org/10.1109/IWBIS56557.2022.9924782","url":null,"abstract":"The classification technique is one of the popular techniques used in helping humans decide the target class of a data based on machine learning principles. Unfortunately the construction of a classification model has no limits and will always evolve over time. There is no surefire way to make a perfect classification model, but there are ways that at least make the classification model better. This study applies the feature selection method to produce a more optimal classification model accuracy value. Of the many feature selection algorithms, this research chooses Relief which is combined with a classification algorithm, namely Random Forest and Support Vector Machine. This research also applies the Grid Search Optimization method in selecting the most influential features. In addition, it is also used to select the best hyperparameters to build the classification model. For splitting the data set, the K Fold Cross Validation technique is used in order to get the most optimal proportion of data splitting. Compared to the accuracy values before and after feature selection, both classification algorithms after feature selection significantly outperform the classification model before feature selection. It was also found that the model’s capabilities in the real world, through validation with new data, performed quite well.","PeriodicalId":348371,"journal":{"name":"2022 7th International Workshop on Big Data and Information Security (IWBIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130851818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Change Detection from Areal Imagery Drones Using Siamese U-Net with Spatial Attention Module","authors":"L. Khalid, G. Jati, W. Caesarendra, W. Jatmiko","doi":"10.1109/IWBIS56557.2022.9924971","DOIUrl":"https://doi.org/10.1109/IWBIS56557.2022.9924971","url":null,"abstract":"This research discusses the development of a new model for task change detection. Siamese Neural networks with U-Net as basic architecture are combined with spatial attention modules to perform task change detection. This model is developed to get a lightweight model with good performance. In the implementation, there is no need to use enormous resources. To benchmark the model, we used the LEVIR-CD dataset, where this dataset has two paired images taken at different times. The information contained in the two paired images is that there are changes such as the presence of buildings such as houses that increase or decrease in a certain area during the time of taking the two images. We compared the proposed model with U-Net and Siamese U-Net without spatial attention modules to see how they differ in performance. Then, We also compared the F1 Score with the baseline model of the LEVIR-CD dataset. After hyperparameter tuning with epochs of 100 is performed, the result is that the F1 Scores tested can balance the baseline model with a faster training time.","PeriodicalId":348371,"journal":{"name":"2022 7th International Workshop on Big Data and Information Security (IWBIS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130407073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IWBIS 2022 Cover Page","authors":"","doi":"10.1109/iwbis56557.2022.9924914","DOIUrl":"https://doi.org/10.1109/iwbis56557.2022.9924914","url":null,"abstract":"","PeriodicalId":348371,"journal":{"name":"2022 7th International Workshop on Big Data and Information Security (IWBIS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128606890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Baris Berk Zorba, A. Z. Alkar, Murat Aydos, A. Tarhan
{"title":"Software Implementation Performances of Block Ciphers: A Systematic Literature Review","authors":"Baris Berk Zorba, A. Z. Alkar, Murat Aydos, A. Tarhan","doi":"10.1109/IWBIS56557.2022.9924700","DOIUrl":"https://doi.org/10.1109/IWBIS56557.2022.9924700","url":null,"abstract":"One of the important milestones of information security, block ciphers, are symmetric-key encryption algorithms that encrypt fixed-length inputs. The main purpose of this research is to analyze software implementations of block ciphers using the research method of the systematic literature review (SLR) proposed in software engineering and analyze them based on their implementation performances. During this process, a total of 39 block ciphers were extracted from 36 papers. The primary studies were reviewed considering the block cipher structures, while the implementation performances were classified according to the encryption throughput and memory utilization. The review results showed that the performance may depend on the clock frequency where low clock frequency might cause a bottleneck in some implementations even though the algorithm was designed using fast mathematical operations. Moreover, it is observed that Feistel structures mostly resulted in average and consistent implementation performances, whereas the block ciphers having Substitution and Permutation Layer (SPN) structure had a wide range of implementation performance results. As another result of this study, memory efficiency is shown as inversely proportional to the throughput in many software implementations. Additionally, some block ciphers having a high-performance software implementation might be able to replace the hardware implementations due to the convenience of the software platforms in many applications.","PeriodicalId":348371,"journal":{"name":"2022 7th International Workshop on Big Data and Information Security (IWBIS)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127392555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Indonesian Digital Bank Adoption Defence Determination Post-Privacy Data Leakage Issues","authors":"Muhammad Alfarizi, R. K. Sari","doi":"10.1109/IWBIS56557.2022.9924813","DOIUrl":"https://doi.org/10.1109/IWBIS56557.2022.9924813","url":null,"abstract":"Banking service transformation from traditional services to bank digitalization has several advantages for both banks and customers. This study aims to examine several theories, including UTAUT, Meta UTAUT and TAM plus the development of variables from security and marketing theory in testing the behavior of digital bank customers in chronological perception by considering 19 hypotheses. The quantitative survey research was carried out by involving 206 respondents using the SEM PLS analysis technique. The results of hypothesis testing summarize the meaning of trust pre-use and post-satisfaction achieved by customers can encourage customer loyalty and intention to recommend digital banks to the public. The negative issue of a technology is a poison that can damage the sustainability of digital banks. So it is necessary to evaluate the improvement and development of digital banks both in terms of systems and services in order to continue to exist in the community.","PeriodicalId":348371,"journal":{"name":"2022 7th International Workshop on Big Data and Information Security (IWBIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133857590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital Forensic Analysis on Caller ID Spoofing Attack","authors":"Adam Waluyo, M. T. S. Cahyono, Ahmad Mahfud","doi":"10.1109/IWBIS56557.2022.9924733","DOIUrl":"https://doi.org/10.1109/IWBIS56557.2022.9924733","url":null,"abstract":"Misuse of caller ID spoofing combined with social engineering has the potential as a means to commit other crimes, such as fraud, theft, leaking sensitive information, spreading hoaxes, etc. The appropriate forensic technique must be carried out to support the verification and collection of evidence related to these crimes. In this research, a digital forensic analysis was carried out on the BlueStacks emulator, Redmi 5A smartphone, and SIM card which is a device belonging to the victim and attacker to carry out caller ID spoofing attacks. The forensic analysis uses the NIST SP 800-101 R1 guide and forensic tools FTK imager, Oxygen Forensic Detective, and Paraben’s E3. This research aims to determine the artifacts resulting from caller ID spoofing attacks to assist in mapping and finding digital evidence. The result of this research is a list of digital evidence findings in the form of a history of outgoing calls, incoming calls, caller ID from the source of the call, caller ID from the destination of the call, the time the call started, the time the call ended, the duration of the call, IMSI, ICCID, ADN, and TMSI.","PeriodicalId":348371,"journal":{"name":"2022 7th International Workshop on Big Data and Information Security (IWBIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133939102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Oktivasari, Maria Agustin, Rahmat Esa Mohammad Akbar, A. Kurniawan, Ayu Rosyida Zain, Fachroni Arbi Murad
{"title":"Analysis of ECG Image File Encryption using ECDH and AES-GCM Algorithm","authors":"P. Oktivasari, Maria Agustin, Rahmat Esa Mohammad Akbar, A. Kurniawan, Ayu Rosyida Zain, Fachroni Arbi Murad","doi":"10.1109/IWBIS56557.2022.9924954","DOIUrl":"https://doi.org/10.1109/IWBIS56557.2022.9924954","url":null,"abstract":"Image data is used in various fields, including the health sector. One of the image data in the health sector is an electrocardiogram (ECG). The ECG contains the identifying information of a person which must be guarded and secured. ECG image data security can be done by encrypting image data using encryption algorithms. The encryption algorithms used in this thesis are ECDH and AES-GCM. ECDH is used to generate key pairs which are then used as keys for AES-GCM encryption and decryption. The encryption and decryption process are carried out in the python programming language. The results of the encryption time and decryption time increase because of the dimensions and size of the ECG image file. The nonce value and authentication tag are checked to be able to perform the decryption process. The histogram test results prove the uniformity of pixels in the encrypted ECG image file. PSNR and SSIM test results prove the difference between the initial and encrypted ECG image files. The results of the NIST Statistical Test Suite test prove that the algorithm used produces random output so that it can be used to secure ECG image files.","PeriodicalId":348371,"journal":{"name":"2022 7th International Workshop on Big Data and Information Security (IWBIS)","volume":"361 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124547634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secure Lightweight Authentication Scheme in IoT Environment with Perfect Forward and Backward Secrecy","authors":"E. H. Nurkifli, T. Hwang","doi":"10.1109/IWBIS56557.2022.9924876","DOIUrl":"https://doi.org/10.1109/IWBIS56557.2022.9924876","url":null,"abstract":"Emerging cutting-edge technology can change the daily life of human beings, for instance, smart transportation, intelligent healthcare systems, Smart cities, etc. Human can use their device to access other devices remotely to collect and utilize the information for their work. Internet of Things is the backbone of the autonomous environment aforesaid. However, IoT uses the public channel to transmit information, and it opens the opportunity for attackers to intercept, delete, and modify data. Therefore, security is an imperative aspect of IoT technology. One of the critical security features is perfect forward and backward secrecy. This article proposes new protocol authentication using biometrics and Physically Unclonable Function (PUF) with the primary security feature of achieving Perfect Forward and Backward Secrecy (PFBS). Our protocol also achieves other security features such as anonymity, unclonable device, and mutual authentication. In addition, we conduct informal and formal analyses to prove that the protocol achieves security features.","PeriodicalId":348371,"journal":{"name":"2022 7th International Workshop on Big Data and Information Security (IWBIS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123017635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anti-Phishing Game Framework Based on Extended Design Play Experience (DPE) Framework as an Educational Media","authors":"Dikka Aditya Satria Wibawa, Hermawan Setiawan, Girinoto","doi":"10.1109/IWBIS56557.2022.9924935","DOIUrl":"https://doi.org/10.1109/IWBIS56557.2022.9924935","url":null,"abstract":"The main objective of this research is to increase security awareness against phishing attacks in the education sector by teaching users about phishing URLs. The educational media was made based on references from several previous studies that were used as basic references. Development of antiphishing game framework educational media using the extended DPE framework. Participants in this study were vocational and college students in the technology field. The respondents included vocational and college students, each with as many as 30 respondents. To assess the level of awareness and understanding of phishing, especially phishing URLs, participants will be given a pre-test before playing the game, and after completing the game, the application will be given a posttest. A paired t-test was used to answer the research hypothesis. The results of data analysis show differences in the results of increasing identification of URL phishing by respondents before and after using educational media of the anti-phishing game framework in increasing security awareness against URL phishing attacks. More serious game development can be carried out in the future to increase user awareness, particularly in phishing or other security issues, and can be implemented for general users who do not have a background in technology.","PeriodicalId":348371,"journal":{"name":"2022 7th International Workshop on Big Data and Information Security (IWBIS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128920920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lhuqita Fazry, Asep Haryono, Nuzulul Khairu Nissa, Sunarno, Naufal Muhammad Hirzi, M. F. Rachmadi, W. Jatmiko
{"title":"Hierarchical Vision Transformers for Cardiac Ejection Fraction Estimation","authors":"Lhuqita Fazry, Asep Haryono, Nuzulul Khairu Nissa, Sunarno, Naufal Muhammad Hirzi, M. F. Rachmadi, W. Jatmiko","doi":"10.1109/IWBIS56557.2022.9924664","DOIUrl":"https://doi.org/10.1109/IWBIS56557.2022.9924664","url":null,"abstract":"The left ventricular of ejection fraction is one of the most important metric of cardiac function. It is used by cardiologist to identify patients who are eligible for life-prolonging therapies. However, the assessment of ejection fraction suffers from inter-observer variability. To overcome this challenge, we propose a deep learning approach, based on hierarchical vision Transformers, to estimate the ejection fraction from echocardiogram videos. The proposed method can estimate ejection fraction without the need for left ventrice segmentation first, make it more efficient than other methods. We evaluated our method on EchoNet-Dynamic dataset resulting 5.59, 7.59 and 0.59 for MAE, RMSE and R2 respectivelly. This results are better compared to the state-of-the-art method, Ultrasound Video Transformer (UVT). The source code is available on https://github.com/lhfazry/UltraSwin.","PeriodicalId":348371,"journal":{"name":"2022 7th International Workshop on Big Data and Information Security (IWBIS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132370789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}