Jurnal Teknologi Informasi dan Ilmu Komputer, 2021
Serangan pada jaringan saat ini sangat sering terjadi, dengan semakin banyaknya cara untuk melaku... more Serangan pada jaringan saat ini sangat sering terjadi, dengan semakin banyaknya cara untuk melakukan pengaksesan terhadap data dan semakin berkembangnya teknologi yang digunakan tentunya akan menyebabkan meningkatnya ancaman keamanan suatu jaringan. Evaluasi manajemen keamanan informasi menggunakan indeks keamanan informasi (KAMI) yang dilakukan pada jaringan di UIN Sunan Kalijaga Yogyakarta didapatkan hasil indeks 407, yang dianggap masih belum optimal. Hal ini yang mendasari perlunya implementasi Open Source SIEM (OSSIM) ke dalam indeks KAMI. Penelitian ini dilakukan untuk mengoptimalkan proses keamanan informasi agar dapat bekerja sesuai dengan standar indeks KAMI. Metode penelitian yang digunakan meliputi studi literatur, melakukan Pre-Assesment Indeks KAMI, mengimplementasi infrastruktur OSSIM, monitoring indeks keamanan informasi menggunakan teknologi OSSIM, dan melakukan Post-Assesment Indeks KAMI, tahapan akhir ini menganalisis hasil monitoring untuk dibuat perbandingan baga...
In the Forensic Readiness approach, incident readiness is the goal of the company or organization... more In the Forensic Readiness approach, incident readiness is the goal of the company or organization in dealing with incidents that may occur. Forensic Readiness can consist of actions or steps, technical and non-technical, that supposedly maximize an organization's ability to use digital evidence. A well-built Cloud Forensic Readiness Framework can help speed up and simplify decision-making regarding an incident occurring in a cloud computing environment. This creates new opportunities for collaboration in the field of digital forensics and cloud computing or cloud computing, so that solutions can be studied and researched by analyzing various literature sources of cloud computing forensic readiness framework and building an integrated cloud forensic readiness framework on an institutional scale using the composite logic method. With the completeness of the readiness framework designed, it is a kind of research that is expected to ease decision making process for organizational st...
American Journal of Computing and Engineering, 2021
The study, titled "The Future of Fog Computing in Kenya," discusses fog computing, comp... more The study, titled "The Future of Fog Computing in Kenya," discusses fog computing, computing evolution, and the Internet of Things. It has layers ideal for fog networks. The architecture depicts the functions performed by each layer, the protocols, devices, and their functionality at various layers. Fog computing extends cloud computing and helps mitigate its difficulties. The study also goes forth to explain the various sectors where fog-computing technology is applied and the various merits associated with it. In order to improve present technology, this article will greatly help researchers in Kenya and beyond by giving ideas and suggestions as a way to focus on the COUNTRY’S VISION 2030.
Anonymous mail can be analyzed to understand the characteristics of each email sent by analyzing ... more Anonymous mail can be analyzed to understand the characteristics of each email sent by analyzing the raw files from any email containing information about the specifications of emails sent, ranging from authentication user, subject, IP Address server machine, the computer's IP senders, from, to, and section header details more. Any email is the indication as an anonymous have specific characteristics that distinguish the legitimate email. The special characteristics form the circuit patterns, which are further identified and analyzed by the algorithm Greedy. Greedy will analyze whether the mail is anonymous or not. Analysis anonymous mail using a greedy algorithm that performed on the first mail server (vulnerable mail server) provide data that the legal category of mail as much as 13 emails (0.04%) while the number of anonymous email mail as much as 28 678 (99% more). Domination anonymous mail with a characteristic pattern "cfhjmq" of 99.12% indicates that the first mail server system still very vulnerable, so it's easy to do the exploitation by irresponsible people. The results of the analysis are different than the second server that has better security than the first mail server so that 100% emails are a legal.
Email merupakan salah satu fasilitas internet yang banyak digunakan untuk komunikasi dan bertukar... more Email merupakan salah satu fasilitas internet yang banyak digunakan untuk komunikasi dan bertukar informasi. Hal ini memungkinkan pihak ketiga menyalahgunakan email untuk mendapatkan informasi secara ilegal dengan mengubah identitas pengirim email dan menjadikannya seperti email yang berasal dari email yang sah (legitimate email), aktivitas tersebut biasa dikenal dengan istilah email spoofing. Untuk dapat mendeteksi adanya email spoofing, maka perlu adanya investigasi forensik email terhadap email spoofing. Salah satu teknik investigasi forensik email adalah menggunakan analisis header email (header analysis method). Teknik ini bekerja dengan memeriksa dan membandingkan value yang terdapat pada beberapa header email yang ditetapkan sebagai parameter deteksi email spoofing. Parameter yang digunakan dalam penelitian ini adalah header ‘From’, ‘Message-ID’, ‘Date’ dan ‘Received’. Jika value yang terdapat pada header tersebut identik, maka email tersebut adalah email yang sah (legitimate email), jika tidak maka email tersebut dikategorikan sebagai email spoofing.
The wireless network indoors is strongly influenced by the presence of interference. To overcome ... more The wireless network indoors is strongly influenced by the presence of interference. To overcome such interference and to improve the performance of wireless networks, then the optimization is done. There are several kinds of propagation that can interfere with the performance of the wireless network, which includes the number of transmitters (access point), free space loss, Received Signal Stength (RSSI), coverage that can be served, measuring attenuation at the barrier (concrete wall, soft partition, door, and floor).This research is an analysis research where the purpose of this research is to determine the position of good access point at Faculty of Shari'ah and Law Building using bayesian probability method. The first stage of this research is to determine the distance of signal reception to know the strength of the weak signal with manual random sampling so that the data obtained vary. The second stage is to determine the position of the access point with a choice of sever...
In the era of globalization, technological development is very rapid, Information and Communicati... more In the era of globalization, technological development is very rapid, Information and Communication Technology (ICT) has become part of human life that can not be separated. where ICTs make our lives easier and more enjoyable. But ICTs can also be used for the crime. cybercrime is a criminal offense which is done by using computer technology as a major crime.From the information above there are many communities that use the gadget Ranging from Mobile, Smartphones, Tablets, Laptops and PCs are already connected to the Internet, there are still many people who experience crime Cybercrime ignorance of knowledge. Indonesian people themselves to report kepihak responsible for dealing with cases of cyber crimes and their reluctance to report for dikepolisian procedures are so complicated and for reporting model that still konvensional.Maka here the author makes a framework for reporting cybercrime police kepihak so that people easily and quickly in report, if there are victims of crime cy...
Hal penting yang harus diperhatikan oleh setiap petugas investigator forensika digital dalam menj... more Hal penting yang harus diperhatikan oleh setiap petugas investigator forensika digital dalam menjalankan aktivitas forensika digital adalah diikutinya setiap tahapan dan prosedur dalam forensika digital. Tahapan tersebut dikenal dengan istilah frameworks ataupun SOP investigasi. Tahapan dalam proses forensika digital harus sesuai dengan aturan hukum dan juga mekanisme yang tepat. Namun framework investigasi yang berkembang saat ini ternyata masih terdapat kekurangan dimana ada tahapan-tahapan yang diatur dalam standar yang berlaku seperti SNI 27037:2014, ternyata tidak diatur dalam framework tersebut. Sehingga ketika tahapan tersebut terlewatkan dalam proses investigasi, tentu akan menjadi sebuah masalah dan bisa digugat di pengadilan serta dibatalkannya hasil investigasi yang dilakukan terkait adanya prosedur yang tidak dilaksanakan. Oleh karena itu dilakukan penelitian dengan melakukan identifikasi terhadap ketentuan dan proses penting dalam dokumen SNI 27037:2014 untuk kemudian ...
TCP was developed to deal with problems that often occur in the network, such as congestion probl... more TCP was developed to deal with problems that often occur in the network, such as congestion problems. Congestion can occur when the number of packets transmitted in the network approaches the network capacity which can cause network problems. This can be overcome by implementing TCP and queue management. In this research, we will test the performance of TCP Newreno and TCP Vegas using NS-2 in the Drop Tail queue. The performance parameters used are throughput, packet drop, and congestion window with additional buffer capacity. The test results for the congestion window and packet drop parameters, TCP Vegas has better performance when the buffer gets bigger when congestion occurs with the congestion window smaller than TCP New Reno and the average packet drop is 18.33 packets compared to TCP New Reno with an average of 18.33 packets. average 41.67 packets. For throughput parameters, TCP New Reno has better performance with an average of 6.77253 Mbps than TCP Vegas with an average of ...
IJID (International Journal on Informatics for Development), 2015
To deal with broken cars on the road, a towing car booking system using android operating system ... more To deal with broken cars on the road, a towing car booking system using android operating system is made. By using GIS (Geographic Information System) for the development, ensuring the location of the customer become easier. Meanwhile, the towing car booking management application is developed using PHP programming language. Data management in this application uses the MySQL database engine. While GPRS (General Pocket Radio System) channel is used for sending customer data. This application is designed using the UML (Unified Modeling Language) which is suitable for modeling applications developed with object-oriented language (OOP). In this towing car booking application, the android application acts as a client while the web application as a server which is used by the operator of the towing car company in managing data orders from customers. This application has successfully designed and implemented, it is concluded that the system built has benefits for driver, the system interfa...
IJID (International Journal on Informatics for Development), 2015
The tourist sector contributes significantly to the country’s development and has a big potential... more The tourist sector contributes significantly to the country’s development and has a big potential capital. Therefore, it could as well contribute to innovations of communication and information technology. Development of the tourism sector should be based on technology development. The district of Bantul has a big variety of several important and tourism sights, which are spread all over the District with a wide range of different routes and locations. Therefore, it might be confusing for tourist to locate them. Based on this problem, the writer creates an information system which can be integrated in Google Maps as a visual media map including all sight-seeing spots completed with an application which efficiently recommends the shortest route using A* algorithm. From the result of the research conducted, the result of the browsing system is compared to manual calculation giving the same results.
Clustering email content is a way of categorization of email content based on specific criteria t... more Clustering email content is a way of categorization of email content based on specific criteria to obtain the category types of emails that can be used for content profiling email. There are several types and content of the email on a mail server that is not desired by the client so that if this occurs continuously will result in performance mail server will be disrupted. Email content profiling was conducted to determine patterns and behavior in the Postfix SMTP email delivery server using the K-means algorithm to know the type of email that can disrupt the performance of the mail server. The profiling process begins with taking the log file content stored on the Postfix Simple Mail Transfer Protocol (SMTP) email server and then analyze the log file using Clustering techniques with K-means algorithm for Profiling email content on Postfix-based mail server using three criteria, namely: message_id, access from and content. Email content analysis was conducted using K-Means Clustering...
Increasing number of information technology users allows possibility for crimes to take advantage... more Increasing number of information technology users allows possibility for crimes to take advantage of information technology to continue increasing either directly and indirectly. Criminals often use computer devices to commit crimes. This is a major concern so that the need for handling digital evidences becomes significantly urgent. Therefore, a forensic storage framework is required for managing digital evidences. This framework is designed by applying the composite logic method to determine role model of each variable or the initial pattern of the stages to be collaborated. Composite logic produces a role model that is to generate patterns in order to achieve the same goal. This method collaborates framework for handling the pre-existing hdd, ssd, and vmware to be in turn combined into a forensic storage framework. Based on the results of the test, this study proposes a new framework called forensic storage framework which comprises of four main stages, namely preparation, collec...
Penelitian ini bertujuan untuk mengetahui pengaruh terhadap waktu pendinginan dan temperatur di d... more Penelitian ini bertujuan untuk mengetahui pengaruh terhadap waktu pendinginan dan temperatur di dalam ruang instalasi uji dengan menggunakan AC split kapasitas ½ PK, dan untuk mengetahui proporsi beban manakah yang menghasilkan laju aliran massa refrigerant, efek refrigerasi, daya kompressor, dan Coefficient of performance yang paling tinggi dari variasi beban lampu. Variabel bebas dalam penelitian ini adalah lampu 100 watt, 200 watt, 300 watt, 400 watt, 500 watt. Sedangkan variabel terkaitnya adalah putaran tetap pada kompressor, jenis refrigerant 22, dinding ruang instalasi uji terbuat dari triplek. Data hasil pengujian dianalisis dengan teknik deskriptif dan hasil analisa ditampilkan dalam bentuk grafik. Penurunan temperatur didalam ruang instalasi uji menjadi lebih lambat, karena bertambahnya beban pendingin, disebabkan karena beban lampu yang lebih besar akan melepaskan panas yang lebih besar ke udara. Laju aliran massarefrigeranttertinggi pada beban lampu 500 watt yaitu 0,0605...
The development of information and communication technology could not be separated from the devel... more The development of information and communication technology could not be separated from the development of computer network and interconnected network (internet). On the other side, there are people who try to access the information illegally, even try to disturb and destroy the flow of information. These people are called hacker or cracker. Because of that reason, it is needed tools to prevent this information. Those tools are like firewall, IPS (Intrusion prevention system), IDS (intrusion detection system), anti-virus, and other tools. This research does literature review by analyzing one of IDS tools that is honeypot using a method of data analyzing using secondary data from Honey net Project Research at January 7 th until 29 th 2003. The result published by those researchers is a DDOS attack was happen at January 18 th and 19 th 2003 that caused one of the computer servers with IP (internet protocol) 10.1.1.101 went down at January 19 th 2003. A computer with IP 10.1.1.101 at J...
Social network provides outstanding in effect current human life. relationship between human with... more Social network provides outstanding in effect current human life. relationship between human with other people do the easy. information about a person shall be easily obtained from the media is social network. this is no apart from the internet and computer technology development is rapidly increasing. reading is a need for community. even reading this time as if being a new lifestyle in the community. this is visible from many visitors book stores and exhibition-book exhibition held in periodic. however, the amount of the enthusiastic with the ability to buy book, especially for student or students. borrowing books are some of technology adoption for existing problems. using the concept of social network using technology and internet. lendabook social network site that is built for the purpose of sharing with facilitate the public in lend to each loan books.
Management and management of data is one of the most important things for neighbor administrators... more Management and management of data is one of the most important things for neighbor administrators, so data and information related to the notulency, attendance, financial and assets must be accessed quickly and precisely. RT 07 Hamlet Manggung is the government line that is closest to the Community. Currently the recording of data for Notulency, attendance, family cards and assets is still Manual and has not used any technology that improves effectiveness in data management pillars Neighbors. This system is built using Unified Software Development development method process (USDP), with the Unified Modelling Language (UML) modelling. In the inception phase all RT management data related to system requirements, elaboration phase is done to expand management system concept that already formed in phase inception, phase contruction done making management system, and in the transition phase is done to expand the system. Management. This maturation needs to be done to analyse whether the ...
Kantor dinas yang tersebar diseluruh indonesia telah banyak yang menggunakan teknologi wifi. Perl... more Kantor dinas yang tersebar diseluruh indonesia telah banyak yang menggunakan teknologi wifi. Perlu dilakukan analisis keamanan untuk Maturity Model dengan skala 0-5 dan dilanjutkan dengan penetration test menggunakan metode ARP Spoofing dengan menggunakan tools yakni CommView for Wifi ver.6.3, Aircrack-ng 1.1 serta Cain and Abel ver.4.9.35. Dari hasil berhasil menangkap username dan password yang dikirim dari komputer client. Oleh karena itu jaringan wireless yang diterapkan di kantor dinas XYZ tergolong belum cukup aman dalam hal keamanan jaringan. Dan hasil dari analisis tersebut jaringan wireless termasuk golongan Repeatable but Intuitive, yakni masih menggunakan konsep basic pemasangan dan belum berfokus penuh dalam hal keamanan jaringan dimana nilai akhirnya adalah sebesar 1.678.
As the challenges and problems surround intrusion rises rapidly, the intrusion detection system h... more As the challenges and problems surround intrusion rises rapidly, the intrusion detection system has been gradually developed. Agent-based approach for intrusion detection system has developed from single to multi agent, and later developed mobile agents in order to increase system's capability to face with a more complex challenge and change. A number of studies had been identified that mobile agent can reduce network traffic, however the study related to intrusion detection using static and mobile agent for finding intruder has not been fully achieved. Keywords: Information, Intrusion, mobile, networks
Jurnal Teknologi Informasi dan Ilmu Komputer, 2021
Serangan pada jaringan saat ini sangat sering terjadi, dengan semakin banyaknya cara untuk melaku... more Serangan pada jaringan saat ini sangat sering terjadi, dengan semakin banyaknya cara untuk melakukan pengaksesan terhadap data dan semakin berkembangnya teknologi yang digunakan tentunya akan menyebabkan meningkatnya ancaman keamanan suatu jaringan. Evaluasi manajemen keamanan informasi menggunakan indeks keamanan informasi (KAMI) yang dilakukan pada jaringan di UIN Sunan Kalijaga Yogyakarta didapatkan hasil indeks 407, yang dianggap masih belum optimal. Hal ini yang mendasari perlunya implementasi Open Source SIEM (OSSIM) ke dalam indeks KAMI. Penelitian ini dilakukan untuk mengoptimalkan proses keamanan informasi agar dapat bekerja sesuai dengan standar indeks KAMI. Metode penelitian yang digunakan meliputi studi literatur, melakukan Pre-Assesment Indeks KAMI, mengimplementasi infrastruktur OSSIM, monitoring indeks keamanan informasi menggunakan teknologi OSSIM, dan melakukan Post-Assesment Indeks KAMI, tahapan akhir ini menganalisis hasil monitoring untuk dibuat perbandingan baga...
In the Forensic Readiness approach, incident readiness is the goal of the company or organization... more In the Forensic Readiness approach, incident readiness is the goal of the company or organization in dealing with incidents that may occur. Forensic Readiness can consist of actions or steps, technical and non-technical, that supposedly maximize an organization's ability to use digital evidence. A well-built Cloud Forensic Readiness Framework can help speed up and simplify decision-making regarding an incident occurring in a cloud computing environment. This creates new opportunities for collaboration in the field of digital forensics and cloud computing or cloud computing, so that solutions can be studied and researched by analyzing various literature sources of cloud computing forensic readiness framework and building an integrated cloud forensic readiness framework on an institutional scale using the composite logic method. With the completeness of the readiness framework designed, it is a kind of research that is expected to ease decision making process for organizational st...
American Journal of Computing and Engineering, 2021
The study, titled "The Future of Fog Computing in Kenya," discusses fog computing, comp... more The study, titled "The Future of Fog Computing in Kenya," discusses fog computing, computing evolution, and the Internet of Things. It has layers ideal for fog networks. The architecture depicts the functions performed by each layer, the protocols, devices, and their functionality at various layers. Fog computing extends cloud computing and helps mitigate its difficulties. The study also goes forth to explain the various sectors where fog-computing technology is applied and the various merits associated with it. In order to improve present technology, this article will greatly help researchers in Kenya and beyond by giving ideas and suggestions as a way to focus on the COUNTRY’S VISION 2030.
Anonymous mail can be analyzed to understand the characteristics of each email sent by analyzing ... more Anonymous mail can be analyzed to understand the characteristics of each email sent by analyzing the raw files from any email containing information about the specifications of emails sent, ranging from authentication user, subject, IP Address server machine, the computer's IP senders, from, to, and section header details more. Any email is the indication as an anonymous have specific characteristics that distinguish the legitimate email. The special characteristics form the circuit patterns, which are further identified and analyzed by the algorithm Greedy. Greedy will analyze whether the mail is anonymous or not. Analysis anonymous mail using a greedy algorithm that performed on the first mail server (vulnerable mail server) provide data that the legal category of mail as much as 13 emails (0.04%) while the number of anonymous email mail as much as 28 678 (99% more). Domination anonymous mail with a characteristic pattern "cfhjmq" of 99.12% indicates that the first mail server system still very vulnerable, so it's easy to do the exploitation by irresponsible people. The results of the analysis are different than the second server that has better security than the first mail server so that 100% emails are a legal.
Email merupakan salah satu fasilitas internet yang banyak digunakan untuk komunikasi dan bertukar... more Email merupakan salah satu fasilitas internet yang banyak digunakan untuk komunikasi dan bertukar informasi. Hal ini memungkinkan pihak ketiga menyalahgunakan email untuk mendapatkan informasi secara ilegal dengan mengubah identitas pengirim email dan menjadikannya seperti email yang berasal dari email yang sah (legitimate email), aktivitas tersebut biasa dikenal dengan istilah email spoofing. Untuk dapat mendeteksi adanya email spoofing, maka perlu adanya investigasi forensik email terhadap email spoofing. Salah satu teknik investigasi forensik email adalah menggunakan analisis header email (header analysis method). Teknik ini bekerja dengan memeriksa dan membandingkan value yang terdapat pada beberapa header email yang ditetapkan sebagai parameter deteksi email spoofing. Parameter yang digunakan dalam penelitian ini adalah header ‘From’, ‘Message-ID’, ‘Date’ dan ‘Received’. Jika value yang terdapat pada header tersebut identik, maka email tersebut adalah email yang sah (legitimate email), jika tidak maka email tersebut dikategorikan sebagai email spoofing.
The wireless network indoors is strongly influenced by the presence of interference. To overcome ... more The wireless network indoors is strongly influenced by the presence of interference. To overcome such interference and to improve the performance of wireless networks, then the optimization is done. There are several kinds of propagation that can interfere with the performance of the wireless network, which includes the number of transmitters (access point), free space loss, Received Signal Stength (RSSI), coverage that can be served, measuring attenuation at the barrier (concrete wall, soft partition, door, and floor).This research is an analysis research where the purpose of this research is to determine the position of good access point at Faculty of Shari'ah and Law Building using bayesian probability method. The first stage of this research is to determine the distance of signal reception to know the strength of the weak signal with manual random sampling so that the data obtained vary. The second stage is to determine the position of the access point with a choice of sever...
In the era of globalization, technological development is very rapid, Information and Communicati... more In the era of globalization, technological development is very rapid, Information and Communication Technology (ICT) has become part of human life that can not be separated. where ICTs make our lives easier and more enjoyable. But ICTs can also be used for the crime. cybercrime is a criminal offense which is done by using computer technology as a major crime.From the information above there are many communities that use the gadget Ranging from Mobile, Smartphones, Tablets, Laptops and PCs are already connected to the Internet, there are still many people who experience crime Cybercrime ignorance of knowledge. Indonesian people themselves to report kepihak responsible for dealing with cases of cyber crimes and their reluctance to report for dikepolisian procedures are so complicated and for reporting model that still konvensional.Maka here the author makes a framework for reporting cybercrime police kepihak so that people easily and quickly in report, if there are victims of crime cy...
Hal penting yang harus diperhatikan oleh setiap petugas investigator forensika digital dalam menj... more Hal penting yang harus diperhatikan oleh setiap petugas investigator forensika digital dalam menjalankan aktivitas forensika digital adalah diikutinya setiap tahapan dan prosedur dalam forensika digital. Tahapan tersebut dikenal dengan istilah frameworks ataupun SOP investigasi. Tahapan dalam proses forensika digital harus sesuai dengan aturan hukum dan juga mekanisme yang tepat. Namun framework investigasi yang berkembang saat ini ternyata masih terdapat kekurangan dimana ada tahapan-tahapan yang diatur dalam standar yang berlaku seperti SNI 27037:2014, ternyata tidak diatur dalam framework tersebut. Sehingga ketika tahapan tersebut terlewatkan dalam proses investigasi, tentu akan menjadi sebuah masalah dan bisa digugat di pengadilan serta dibatalkannya hasil investigasi yang dilakukan terkait adanya prosedur yang tidak dilaksanakan. Oleh karena itu dilakukan penelitian dengan melakukan identifikasi terhadap ketentuan dan proses penting dalam dokumen SNI 27037:2014 untuk kemudian ...
TCP was developed to deal with problems that often occur in the network, such as congestion probl... more TCP was developed to deal with problems that often occur in the network, such as congestion problems. Congestion can occur when the number of packets transmitted in the network approaches the network capacity which can cause network problems. This can be overcome by implementing TCP and queue management. In this research, we will test the performance of TCP Newreno and TCP Vegas using NS-2 in the Drop Tail queue. The performance parameters used are throughput, packet drop, and congestion window with additional buffer capacity. The test results for the congestion window and packet drop parameters, TCP Vegas has better performance when the buffer gets bigger when congestion occurs with the congestion window smaller than TCP New Reno and the average packet drop is 18.33 packets compared to TCP New Reno with an average of 18.33 packets. average 41.67 packets. For throughput parameters, TCP New Reno has better performance with an average of 6.77253 Mbps than TCP Vegas with an average of ...
IJID (International Journal on Informatics for Development), 2015
To deal with broken cars on the road, a towing car booking system using android operating system ... more To deal with broken cars on the road, a towing car booking system using android operating system is made. By using GIS (Geographic Information System) for the development, ensuring the location of the customer become easier. Meanwhile, the towing car booking management application is developed using PHP programming language. Data management in this application uses the MySQL database engine. While GPRS (General Pocket Radio System) channel is used for sending customer data. This application is designed using the UML (Unified Modeling Language) which is suitable for modeling applications developed with object-oriented language (OOP). In this towing car booking application, the android application acts as a client while the web application as a server which is used by the operator of the towing car company in managing data orders from customers. This application has successfully designed and implemented, it is concluded that the system built has benefits for driver, the system interfa...
IJID (International Journal on Informatics for Development), 2015
The tourist sector contributes significantly to the country’s development and has a big potential... more The tourist sector contributes significantly to the country’s development and has a big potential capital. Therefore, it could as well contribute to innovations of communication and information technology. Development of the tourism sector should be based on technology development. The district of Bantul has a big variety of several important and tourism sights, which are spread all over the District with a wide range of different routes and locations. Therefore, it might be confusing for tourist to locate them. Based on this problem, the writer creates an information system which can be integrated in Google Maps as a visual media map including all sight-seeing spots completed with an application which efficiently recommends the shortest route using A* algorithm. From the result of the research conducted, the result of the browsing system is compared to manual calculation giving the same results.
Clustering email content is a way of categorization of email content based on specific criteria t... more Clustering email content is a way of categorization of email content based on specific criteria to obtain the category types of emails that can be used for content profiling email. There are several types and content of the email on a mail server that is not desired by the client so that if this occurs continuously will result in performance mail server will be disrupted. Email content profiling was conducted to determine patterns and behavior in the Postfix SMTP email delivery server using the K-means algorithm to know the type of email that can disrupt the performance of the mail server. The profiling process begins with taking the log file content stored on the Postfix Simple Mail Transfer Protocol (SMTP) email server and then analyze the log file using Clustering techniques with K-means algorithm for Profiling email content on Postfix-based mail server using three criteria, namely: message_id, access from and content. Email content analysis was conducted using K-Means Clustering...
Increasing number of information technology users allows possibility for crimes to take advantage... more Increasing number of information technology users allows possibility for crimes to take advantage of information technology to continue increasing either directly and indirectly. Criminals often use computer devices to commit crimes. This is a major concern so that the need for handling digital evidences becomes significantly urgent. Therefore, a forensic storage framework is required for managing digital evidences. This framework is designed by applying the composite logic method to determine role model of each variable or the initial pattern of the stages to be collaborated. Composite logic produces a role model that is to generate patterns in order to achieve the same goal. This method collaborates framework for handling the pre-existing hdd, ssd, and vmware to be in turn combined into a forensic storage framework. Based on the results of the test, this study proposes a new framework called forensic storage framework which comprises of four main stages, namely preparation, collec...
Penelitian ini bertujuan untuk mengetahui pengaruh terhadap waktu pendinginan dan temperatur di d... more Penelitian ini bertujuan untuk mengetahui pengaruh terhadap waktu pendinginan dan temperatur di dalam ruang instalasi uji dengan menggunakan AC split kapasitas ½ PK, dan untuk mengetahui proporsi beban manakah yang menghasilkan laju aliran massa refrigerant, efek refrigerasi, daya kompressor, dan Coefficient of performance yang paling tinggi dari variasi beban lampu. Variabel bebas dalam penelitian ini adalah lampu 100 watt, 200 watt, 300 watt, 400 watt, 500 watt. Sedangkan variabel terkaitnya adalah putaran tetap pada kompressor, jenis refrigerant 22, dinding ruang instalasi uji terbuat dari triplek. Data hasil pengujian dianalisis dengan teknik deskriptif dan hasil analisa ditampilkan dalam bentuk grafik. Penurunan temperatur didalam ruang instalasi uji menjadi lebih lambat, karena bertambahnya beban pendingin, disebabkan karena beban lampu yang lebih besar akan melepaskan panas yang lebih besar ke udara. Laju aliran massarefrigeranttertinggi pada beban lampu 500 watt yaitu 0,0605...
The development of information and communication technology could not be separated from the devel... more The development of information and communication technology could not be separated from the development of computer network and interconnected network (internet). On the other side, there are people who try to access the information illegally, even try to disturb and destroy the flow of information. These people are called hacker or cracker. Because of that reason, it is needed tools to prevent this information. Those tools are like firewall, IPS (Intrusion prevention system), IDS (intrusion detection system), anti-virus, and other tools. This research does literature review by analyzing one of IDS tools that is honeypot using a method of data analyzing using secondary data from Honey net Project Research at January 7 th until 29 th 2003. The result published by those researchers is a DDOS attack was happen at January 18 th and 19 th 2003 that caused one of the computer servers with IP (internet protocol) 10.1.1.101 went down at January 19 th 2003. A computer with IP 10.1.1.101 at J...
Social network provides outstanding in effect current human life. relationship between human with... more Social network provides outstanding in effect current human life. relationship between human with other people do the easy. information about a person shall be easily obtained from the media is social network. this is no apart from the internet and computer technology development is rapidly increasing. reading is a need for community. even reading this time as if being a new lifestyle in the community. this is visible from many visitors book stores and exhibition-book exhibition held in periodic. however, the amount of the enthusiastic with the ability to buy book, especially for student or students. borrowing books are some of technology adoption for existing problems. using the concept of social network using technology and internet. lendabook social network site that is built for the purpose of sharing with facilitate the public in lend to each loan books.
Management and management of data is one of the most important things for neighbor administrators... more Management and management of data is one of the most important things for neighbor administrators, so data and information related to the notulency, attendance, financial and assets must be accessed quickly and precisely. RT 07 Hamlet Manggung is the government line that is closest to the Community. Currently the recording of data for Notulency, attendance, family cards and assets is still Manual and has not used any technology that improves effectiveness in data management pillars Neighbors. This system is built using Unified Software Development development method process (USDP), with the Unified Modelling Language (UML) modelling. In the inception phase all RT management data related to system requirements, elaboration phase is done to expand management system concept that already formed in phase inception, phase contruction done making management system, and in the transition phase is done to expand the system. Management. This maturation needs to be done to analyse whether the ...
Kantor dinas yang tersebar diseluruh indonesia telah banyak yang menggunakan teknologi wifi. Perl... more Kantor dinas yang tersebar diseluruh indonesia telah banyak yang menggunakan teknologi wifi. Perlu dilakukan analisis keamanan untuk Maturity Model dengan skala 0-5 dan dilanjutkan dengan penetration test menggunakan metode ARP Spoofing dengan menggunakan tools yakni CommView for Wifi ver.6.3, Aircrack-ng 1.1 serta Cain and Abel ver.4.9.35. Dari hasil berhasil menangkap username dan password yang dikirim dari komputer client. Oleh karena itu jaringan wireless yang diterapkan di kantor dinas XYZ tergolong belum cukup aman dalam hal keamanan jaringan. Dan hasil dari analisis tersebut jaringan wireless termasuk golongan Repeatable but Intuitive, yakni masih menggunakan konsep basic pemasangan dan belum berfokus penuh dalam hal keamanan jaringan dimana nilai akhirnya adalah sebesar 1.678.
As the challenges and problems surround intrusion rises rapidly, the intrusion detection system h... more As the challenges and problems surround intrusion rises rapidly, the intrusion detection system has been gradually developed. Agent-based approach for intrusion detection system has developed from single to multi agent, and later developed mobile agents in order to increase system's capability to face with a more complex challenge and change. A number of studies had been identified that mobile agent can reduce network traffic, however the study related to intrusion detection using static and mobile agent for finding intruder has not been fully achieved. Keywords: Information, Intrusion, mobile, networks
Uploads
Papers by Bambang Sugiantoro