Claim Missing Document
Check
Articles

Found 23 Documents
Search

Best Practice Layer 2 Security for remote Vocational Education Priambodo, Dimas Febriyan; Syamsiah, Nurul; Setiawan, Hermawan; Yulandi
Nusantara Science and Technology Proceedings The 3rd International Conference on Vocational Innovation and Applied Sciences (ICVIAS) 2021
Publisher : Future Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Open standards especially OSI are built to separate each layer and work without knowledge of each other. This concept also means if one layer is hacked, communication is compromised without another layer alert. In best practice, layer 2 security is underrated as it is considered that security has been built through the application layer. In vocational education who are prepared to work directly in the real world, should not be forgotten to be taught. This method proposed online education for teaching layer 2 security with HyperV virtual machine to build attack and defend scenarios. Hyper V is used because windows have been installed in almost all students. In Defcon was also used HyperV was found to be able to operate to respond to attack scenarios in the second layer of security. This system was implemented in 20 students (all population in class) of security engineering in the polytechnic XYZ and shows a significant increase with normal data in statistical approach with t-test. This approach causes an increase in student scores by 12.307% by implementing a new system.
TIA-942 Approach dengan Computational Fluid Dynamic untuk Data Center Sidabutar, Jeckson; Priambodo, Dimas Febriyan
Jurnal Informatika Universitas Pamulang Vol 6, No 4 (2021): JURNAL INFORMATIKA UNIVERSITAS PAMULANG
Publisher : Teknik Informatika Universitas Pamulang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32493/informatika.v6i4.12874

Abstract

Data Center (DC) is currently one of the most popular Information and Communication Technologies (ICT) along with the increasing digitization of business processes. The concept of centralization provides convenience for the improvement, development and efficiency of energy resources. DC networks support cloud-inspired environments that require stability and agility, thereby extending the functionality of DC networks into a public cloud provider infrastructure to better manage hybrid cloud networks. The TIA-942 standard allows DC designs to be considered early in the building development process and contributes to architectural considerations, by providing multidisciplinary design and construction information. It is used for a comprehensive understanding of DC design including facility planning, cabling systems, and network design. Good planning during building construction or renovation is significantly less expensive and less intrusive than after the facility is operational. The DC design using the TIA-942 standard was tested through Computational Fluid Dynamic simulation to produce a better analysis. All of these analyzes are to avoid misplacing or positioning cooling devices or racks in the DC, as well as assisting in the selection of efficient cooling system technology. So that the DC design can function as an operation center and service provider, as well as increase efficiency and energy resources for all SKPD in XYZ Province.
Resource Modification On Multicore Server With Kernel Bypass Dimas Febriyan Priambodo; Ahmad Ashari
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 14, No 4 (2020): October
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.54170

Abstract

Technology develops very fast marked by many innovations both from hardware and software. Multicore servers with a growing number of cores require efficient software. Kernel and Hardware used to handle various operational needs have some limitations. This limitation is due to the high level of complexity especially in handling as a server such as single socket discriptor, single IRQ and lack of pooling so that it requires some modifications. The Kernel Bypass is one of the methods to overcome the deficiencies of the kernel. Modifications on this server are a combination increase throughput and decrease server latency. Modifications at the driver level with hashing rx signal and multiple receives modification with multiple ip receivers, multiple thread receivers and multiple port listener used to increase throughput. Modifications using pooling principles at either the kernel level or the program level are used to decrease the latency. This combination of modifications makes the server more reliable with an average throughput increase of 250.44% and a decrease in latency 65.83%.
Metode Prototype pada Sistem Informasi Manajemen Tugas Akhir Mahasiswa Berbasis Website Arizal Arizal; Annisa Nurul Puteri; Furqan Zakiyabarsi; Dimas Febriyan Priambodo
Jurnal Teknologi Informasi dan Komunikasi (TIKomSiN) Vol 10, No 1 (2022): Jurnal TiKomSiN, Vol. 10, No. 1, April 2022
Publisher : STMIK Sinar Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30646/tikomsin.v10i1.606

Abstract

Final Project as a Research is one of the main requirements for the graduation of undergraduate students from universities. Supervisory guidance is one way to find solution for student research problems. The final project guidance process involves multiple parts: campus administration, supervisors, and students. However, this process is often difficult to carry out properly because of the busyness of each individual, both lecturers and students. As a result, the process for carrying out the final project was hindered. Another thing that makes the completion of the thesis slow is the administrative service procedure to complete the final project which is too time consuming. This research aims to simplify and speed up the process of completing the student's final project. The prototype method is used to develop the final project management information system. This information system is designed using use case diagrams, rich picture diagrams, and entity relation diagrams. Tests were carried out using the black box method. The result of the research is a final project management information system which makes the student's final project completion process more efficient and effective. This information system facilitates administrative services and monitoring of the final project because it is performed systematically and can be controlled in real time. 
High Througput Multicore Server Dengan Kernel Bypass dimas febriyan priambodo
Jurnal Ilmiah SINUS Vol 18, No 2 (2020): Vol. 18, No. 2, Juli 2020
Publisher : STMIK Sinar Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (843.684 KB) | DOI: 10.30646/sinus.v18i2.472

Abstract

Kernel performs one part of the overall operating system utility as a bridge between the user and the hardware. In multi core hardware, the kernel was also created with a general approach so it needs to be adjusted for specific purposes. Kernels for servers using common Kernels have many limitations, such as single socket descriptor, single IRQ, and lack of pooling so that they require some modification to run optimally. Kernel bypass is a method by eliminating the automation of a server used to realize a server, namely high throughput. Kernel bypass is a combination of techniques, modification at the driver level with hashing rx signal and modification of multiple receivers with multiple ip receivers, multiple thread receivers, and multiple port listeners. This combined modification makes the server more reliable with an average throughput increase of 250.44%.
SOSIALISASI KESADARAN KEAMANAN DI KOMUNITAS LANGSUNGENAK dimas febriyan priambodo; I Komang Setia Buana; Agus Reza Setiadi Nurwa
Jurnal WIDYA LAKSMI (Jurnal Pengabdian Kepada Masyarakat) Vol. 2 No. 1 (2022): Jurnal WIDYA LAKSMI (Jurnal Pengabdian Kepada Masyarakat)
Publisher : Yayasan Lavandaia Dharma Bali

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (551.753 KB)

Abstract

Masifnya perkembangan teknologi membuat semua kalangan mengenal teknologi. Tua muda tanpa memandang jenis kelamin telah mengenal teknologi khususnya berupa teknologi yang terkoneksi dengan internet. Perkembangan ini tidak seiring sejalan dengan pemahaman akan kemanan dalam berperilaku digital baik secara sadar maupun dengan ketidaksengajaan. Kebocoran informasi, penyalahgunaan akun bahkan peretasan menjadi sering terjadi belakangan ini. Sebuah sosialisasi untuk meningkatkan pemahaman akan keamanan dalam menggunakan berbagai macam teknologi diperlukan untuk mengimbangi masifnya pertumbuhan teknologi.
Instrumentation system for data acquisition and monitoring of hydroponic farming using ESP32 via Google Firebase Prisma Megantoro; Rizki Putra Prastio; Hafidz Faqih Aldi Kusuma; Abdul Abror; Pandi Vigneshwaran; Dimas Febriyan Priambodo; Diaz Samsun Alif
Indonesian Journal of Electrical Engineering and Computer Science Vol 27, No 1: July 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v27.i1.pp52-61

Abstract

This article discusses the design of a hydroponic planting process monitoring system based on the internet of things. This device uses an ESP32 microcontroller board as the main controller. The parameters that were monitored and acquired were the conditions of the hydroponic growing media. Those parameters are; water pH, water temperature, water turbidity level, and ambient air temperature and humidity. The five parameters are measured by analog sensors integrated with the ESP32. These parameters affect the growth process and the quality of crop yields. This article also describes the calibration method for each sensor used for parameter measurement. Then the monitoring of these parameters is carried out by utilizing a real-time database, namely Google Firebase. This platform is very suitable for all IoT-based monitoring and control applications. Measurement result data is uploaded and saved to the real-time database. Then paired by Android-based applications. This application was created to be used by hydroponic farmers who use this device. Thus the results of monitoring can be used to optimize the process of growing hydroponic plants.
Implementasi Deteksi Judul Berita Clickbait Berbahasa Indonesia dengan pre-trained model Multilingual BERT Pada Aplikasi Berbasis Chrome Extension Girinoto Girinoto; Dhana Arvina Alwan; Gusti Agung Ngurah Gde K.T. D; Olga Geby Nabila; Arizal arizal; Dimas Febriyan Priambodo
Jurnal Ilmiah SINUS Vol 20, No 2 (2022): Vol. 20 No. 2 Juli 2022
Publisher : STMIK Sinar Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30646/sinus.v20i2.624

Abstract

Clickbait news title is often used by online news portal. The purpose of clickbait is to attract reader to open and read the news. Furthermore, news containing clickbait title can give negative impact by reducing the essence of important news. Therefore, clickbait detection tool is needed to avoid the clickbait news title. Chrome extension was chosen in this study because it supports all Chrome based browsers, such as Google Chrome, Chromium, Microsoft Edge, and Opera so that many users apply this program. In this study, Chrome extension-based application was designed and integrated by using artificial intelligence model. This application also utilized the availability of pre-trained multilingual BERT model as Natural Language Processing (NLP) which will be used to predict a clickbait news title. This study used Multilingual BERT model as NLP because this model has been trained into 104 languages, including Bahasa Indonesia and it has significant performance. The result of this study can detect clickbait news along with 92% of AUC-ROC value.   
Implementasi KRACK dan KRACK Detector terhadap Wpa_Supplicant pada Perangkat Android dan Linux Ubuntu Dozy Arti Insani; Nanang Trianto; Dimas Febriyan Priambodo
Jurnal Teknologi Informasi dan Komunikasi (TIKomSiN) Vol 10, No 2 (2022): Jurnal TIKomSiN, Vol. 10, N0. 2, Oktober 2022
Publisher : STMIK Sinar Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30646/tikomsin.v10i2.639

Abstract

Nowadays WiFi services is available in many public places to accesses the information. Most of WiFi services use the Wifi Protected Access 2 (WPA2) security. This protocol uses a 4-way handshake mechanism for authentication process, but there is a weakness by using the 4-way handshake mechanism that possible to re-install the key (KRACK). This weakness can be used by attackers to hold up communications so that attackers can enter the network. This study, KRACK analysis was carried out on wpa_supplicant Android and Linux Ubuntu which connected to WiFi and the WPA2 security protocol to know the weaknesses. The analysis is doing on the user's device by connecting to the Rogue AP generated by the Vanhoef script. This dangerous line is compared to normal line. Analyzing attacks on 4-way handshakes, this research create implementation of KRACK Detector and the result of detection will be used to get the KRACK characteristics. The information getting from the result can prevent the disadvantages which coming by attacks. The validation of the research was carried out by using Wireshark to make sure that the third massage sends which show threat of attack.
Peningkatan Kesadaran Keamanan Informasi Melalui Kegiatan Online Workshop Menggunakan Platform Quizizz Amiruddin Amiruddin; Ira Rosianal Hikmah; Tiyas Yulita; Dimas Febriyan Priambodo; Jeckson Sidabutar
GERVASI: Jurnal Pengabdian kepada Masyarakat Vol 6, No 3 (2022): GERVASI: Jurnal Pengabdian Kepada Masyarakat
Publisher : LPPM IKIP PGRI Pontianak

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31571/gervasi.v6i3.3672

Abstract

Kesadaran keamanan informasi merupakan salah satu faktor penting dalam pengukuran Global Cybersecurity Index (GCI). Peningkatan jenis dan jumlah ancaman serangan siber mengakibatkan pengguna sulit mengetahui dan memahaminya. Pencurian data pelanggan marketplace adalah contoh nyata dari ancaman tersebut, yang apabila tidak segera ditangani, dapat menimbulkan kerugian yang lebih besar. Kegiatan pengabdian kepada masyarakat dalam bentuk online workshop merupakan salah satu upaya yang dilakukan di masa pandemi Covid-19 untuk meningkatkan pemahaman dan kesadaran mengenai keamanan informasi. Kegiatan ini dilakukan di STMIK Sinar Nusantara Surakarta dengan jumlah peserta 105 orang, meliputi penyampaian materi dan evaluasi pemahaman peserta. Materi yang diberikan terkait keamanan informasi, teknologi pengambil informasi, rekayasa sosial, dan live demo serangan siber. Adapun evaluasi terhadap peserta workshop dilakukan dengan mengerjakan soal-soal terkait materi yang dibahas sebelumnya melalui platform Quizizz. Jawaban dari peserta dianalisis dengan metode statistik yaitu pengujian beda rataan dan diperoleh kesimpulan bahwa kegiatan ini dapat meningkatkan pemahaman keamanan informasi peserta workshop secara signifikan dengan rata-rata peningkatan sebesar 13%.