Claim Missing Document
Check
Articles

Found 26 Documents
Search

Content Based Image Retrieval Using Lacunarity and Color Moments Of Skin Diseases Triwayuni, I Gusti Ayu; Darma Putra, I Ketut Gede; Eka Pratama, I Putu Agus
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i1.pp243-248

Abstract

The research conducted contributed in the form of CBIR application which was developed using texture and color feature extraction in searching the contents information of an object of skin disease image. The textured feature is extracted using Lacunarity, while for color feature extraction using Color Moments as well as a combination of both methods. The results of color characteristic extraction test using Color Moments Method yielded images corresponding to 100% similarity percentages and experimentation of texture characteristic extraction using Lacunarity Method yielded images corresponding to a percentage of suitability of 25%, followed by a combined test of both methods and the normalization process produces images corresponding to a percentage of conformity of 60%.
IMPLEMENTASI KATOOLIN SEBAGAI PENETRASI TOOLS KALI LINUX PADA LINUX UBUNTU 16.04 (STUDI KASUS: REVERSE ENGINEERING FILE .APK) Eka Pratama, I Putu Agus; Wiradarma, Anak Agung Bagus Arya
Jurnal RESISTOR (Rekayasa Sistem Komputer) Vol 1 No 2 (2018): Jurnal RESISTOR Edisi Oktober 2018
Publisher : LPPM STMIK STIKOM Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1149.508 KB) | DOI: 10.31598/jurnalresistor.v1i2.278

Abstract

The Linux Operating System is known for its open-source characteristic which means everyone is free to develop Linux with the use of available source code. The result of Linux development is called Linux distribution (Distro). There are various Linux distributions in accordance with their respective uses, one of them is Kali Linux. Kali Linux is a Linux distro that is developed to penetrate the security of computer systems. Kali Linux uses a variety of tools to perform its functions. However, for users who want to use the functionality of Kali Linux without having to change the Linux distro that has been used, the user can use Katoolin. Katoolin can provide the convenience and flexibility for users who want to use Kali Linux as a special Linux distro for the purpose of penetrating computer system security without having to replace the distro that has been used or do a full install of Kali Linux. One case study that can be solved using the Kali Kali Linux based tool on Katoolin is Reverse Engineering. The case study was solved using one of the tools in the Reverse Engineering category named apktool that available on Katoolin.
Pengujian Dan Analisa Anti Komputer Forensik Menggunakan Shred Tool Rahardjo, Budi; Pratama, I Putu Agus Eka
Lontar Komputer : Jurnal Ilmiah Teknologi Informasi Vol. 7, No. 2 Agustus 2016
Publisher : Institute for Research and Community Services, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (362.617 KB) | DOI: 10.24843/LKJITI.2016.v07.i02.p04

Abstract

Computer forensics and anti computer forensics are two opposing fields. Computer forensics is done by a computer forensics expert in order to obtain accurate data and evidence of cyber crime cases for investigation, while the anti-computer forensics conducted by the attacker to remove traces at once difficult computer forensics expert in performing its duties. For the attacker, the selection of anti-computer forensics tool that default on the target machine, more effective and faster than installing it first on the victim machine. For this reason the author chose shred as anti computer forensics applications on GNU / Linux machine. If anti forensic work, forensic experts would be difficult to perform computer forensics to data as evidence of cyber crime. This paper describes the anti-forensics performed by the attacker to remote machines GNU / Linux for cyber crime cases in a computer network. Anti forensic performed using shred the syslog file to remove traces of the crime at the same time make it difficult for the forensic process by computer forensics expert. Tests performed on three pieces of computer-based GNU / Linux on System Signals Lab intranet ITB. Each act as the target machine (server), firewall machine, and the machine attacker. Doing the anti computer forensics and computer forensics at the server machine. The test results are recorded and analyzed in order to then be deduced.
Implementasi dan Analisis Simulasi QOS dan Perfomance Device dengan Menggunakan ONOS dan Iperf3 Pratama, I Putu Agus Eka; Wikantyasa, I Made Adhiarta
Jurnal Informatika Universitas Pamulang Vol 4, No 2 (2019): JURNAL INFORMATIKA UNIVERSITAS PAMULANG
Publisher : Teknik Informatika Universitas Pamulang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (372.143 KB) | DOI: 10.32493/informatika.v4i2.2730

Abstract

Internet have evolved so rapidly in this day and age from where user only can access to internet service through cable UTP(LAN) and now user can access it from every where through nirkable (Wireless Network) and from this improvement it caused lots of device connected and heavy traffic coming in and out from a network. Because of this situation the network industry come with a new idea using a new network architecture that known as Software Defined Network (SDN). Software Defined Network (SDN) is a new way to manage, design and implementing network architecture where data flow from the control plane separated from the hardware. Network industry believe that SDN can change the network architecture that people using now that known as Traditonal Network because SDN can overcome the weakness of Tradional network that tend to be closed and distributed can be changed by SDN to be open source, can be programmed and can be controlled centrally. In this research will be implementing and analys simulation Quality Of Service (QOS) and Perfomance device openflow switch using ONOS as controller to monitor the device perfomance and iperf3 as a Quality Of Service testing.
IMPLEMENTASI TEKNIK DEEP PACKET INSPECTION DENGAN MENGGUNAKAN WIRESHARK PADA SISTEM OPERASI UBUNTU Pratama, I Putu Agus Eka; Dharmesta, Putu Adhika
Jurnal RESISTOR (Rekayasa Sistem Komputer) Vol 1 No 2 (2018): Jurnal RESISTOR Edisi Oktober 2018
Publisher : LPPM STMIK STIKOM Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (965.732 KB) | DOI: 10.31598/jurnalresistor.v1i2.274

Abstract

Deep Packet Inspection (DPI) is a technique commonly used by network administrator to be able to monitor in detail the flow of data in the form of data packets that occur at that moment. This data stream will produce an information that can be used for network management purposes. One example of a case study that can be done with this technique is the intranet that is available in Information Technology major Udayana University’s. Deep Packet Inspection Technique is done with purpose to identifying the initial slowing down of network speed on Information Technology major Udayana University’s.
TCP SYN Flood (DoS) Attack Prevention Using SPI Method on CSF: A PoC Pratama, I Putu Agus Eka
Bulletin of Computer Science and Electrical Engineering Vol. 1 No. 2 (2020): December 2020 - Bulletin of Computer Science and Electrical Engineering
Publisher : Indonesian Scientific Journal

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1439.085 KB) | DOI: 10.25008/bcsee.v1i2.7

Abstract

TCP SYN Flood as one kind of Denial of Service (DoS) attack, still popular to flood the server connection, by sending SYN packets to the target. Because of the risk caused by this attack, there is a need for a network security mechanism. In this paper, one of the security mechanisms proposed is using Stateful Packet Inspection (SPI) method on Configserver Security and Firewall (CSF). By using SPI method, CSF has capabilities to responsible for separating packets of data, that may be entered with data packets that should not be entered into the server. For example: port to be opened, port closed, and IP Address that may access the server for anywhere. This paper combines both of CSF and SPI method to prevent TCP SYN Flood (DoS) with Proof of Concept (PoC) at the Linux operating system. The security process is done in 3 ways: configuring a maximum connection from an IP Address to a server, securing an incoming SYN packet per second, and counting how many times an IP Address violates the minimum SYN packet rule per second before being blocked by a firewall.
Tourism Event Management System Using Gianyar Smart Tourism Based On Cloud Pratama, I Putu Agus Eka; Wirdiani, Kadek Ayu
Journal of Electrical, Electronics and Informatics Vol 2 No 2 (2018): JEEI (August 2018)
Publisher : Institute for Research and Community Services Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JEEI.2018.v02.i02.p03

Abstract

Tourism event data data in Gianyar regency must be managed well, so that it can giving knowledge to all event organizers about tourist interest of all tourism objects around Gianyar Regency. The knowledge also helping them for strategy determination and decision making. Each event organizer can manage their own tourism event data into the system and all of data can be processed to be information and report for the tourist, to make tourism service in Gianyar Regency better. This paper show the design, implementation, and testing of Tourism Event Management System using Gianyar Smart Tourism based on Cloud for all event organizers in Gianyar Regency, developed using Design Science Research Methodology (DSRM) and tested using User Accepted Testing (UAT). It also act as Knowledge Management about tourism event data and tourist demand. Conclusion, all tourism event can be managed well and all event organizers can manage their tourism event data easier.
PENERAPAN PROXY SERVER BERBASIS CLEAROS 7 UNTUK MANAJEMEN AKSES PADA INTERNET: PENERAPAN PROXY SERVER BERBASIS CLEAROS 7 UNTUK MANAJEMEN AKSES PADA INTERNET Pratama, I Putu Agus Eka; Arista, I Putu Gede Eka Yuda
Jurnal Mantik Vol. 3 No. 1 (2019): May: Manajemen dan Informatika
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (458.694 KB)

Abstract

The development of technology, especially information technology has developed very quickly. One of the technologies of this development is the internet. The use of the internet is very helpful in distributing information because it can be accessed anywhere and anytime. However, freedom in using internet access can also be misused and has a negative impact. An example is accessing websites that are dangerous or not suitable to be accessed. Therefore, it is necessary to guarantee the use of the internet that is equipped with a system that can filter negative sites so that they cannot be accessed freely. The solution that can be applied is the use of proxy server technology that can perform access management on the internet. The proxy server will be implemented using the ClearOS operating system ver.7 that has been installed on the server computer. The result of implementing a proxy server based on ClearOS is that it can manage access to sites that should not be accessed by the client computer.
IMPLEMENTASI WIRESHARK DALAM MELAKUKAN PEMANTAUAN PROTOCOL JARINGAN: Studi Kasus : Intranet Jurusan Teknologi Informasi Universitas Udayana Pratama, I Putu Agus Eka; Dharmesta, Putu Adhika
Jurnal Mantik Vol. 3 No. 1 (2019): May: Manajemen dan Informatika
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (392.431 KB)

Abstract

Wireshark is a leading open source tool that is widely used to analyze and troubleshoot network problems, allowing us to find out about network problems. The development of Wireshark evolved thanks to the contribution of volunteer network experts around the world and is a continuation of the project started by Gerald Combs in 1998. This monitoring covers the flow of protocol that is being used by networks and computers. This test will implement Wireshark as an application to monitor computer communication networks to see and process the results of network monitoring with case studies on the intranet of the Information Technology Department of the Faculty of Engineering, Udayana University
IMPLEMENTASI IDS MENGGUNAKAN SNORT PADA SISTEM OPERASI UBUNTU: Implementasi IDS Menggunakan Snort Pada Sistem Operasi Ubuntu Pratama, I Putu Agus Eka; Handayani, NI Kade Mega
Jurnal Mantik Vol. 3 No. 1 (2019): May: Manajemen dan Informatika
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (863.392 KB)

Abstract

Network security can be improved by implementing the Intrusion Detection System (IDS). Snort is an Intrusion Detection System program, which is a program that can detect an intrusion attempt on a computer network system. Implementation of an Open Source intrusion based Snort detection system is a cost advantage with reliable performance in detecting attacks. Snort can be implemented on various operating systems including Ubuntu Linux. An attack can be detected or not by Snort IDS, depending on the rules / rules in Snort. Snort testing is done with several attack patterns such as Ping, Port Scanning, Ping of Deatch with several tools such as NMAP, SQLMAP and others. Based on the results of testing Snort can detect and provide warnings about attacks that threaten a computer network of a server. The test results are expected to be used as a alternative in server network security.