Claim Missing Document
Check
Articles

Found 20 Documents
Search

Digital Forensics Study of a Cloud Storage Client: A Dropbox Artifact Analysis Satrya, Gandeva Bayu
CommIT (Communication and Information Technology) Journal Vol 13, No 2 (2019): CommIT Vol. 13 No. 2 Tahun 2019
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v13i2.5781

Abstract

The rapid development of cloud storage technology paired with the prevalence of smartphone usage presents wide-ranging challenges for digital forensics practitioners. Data are more easily uploaded and shared between multiple devices and across multiple platforms. So, the process has increased the opportunities for criminality. Criminality undertaken in cloud computing can be directly seen on logs stored on the cloud storage server, which records user activity. However, because of user privacy protection, these logs cannot be easily used as evidence in court. This issue emphasizes the need for a reliable means of identifying, acquiring, and preserving evidential data from the client-side. This study identifies the data artifacts of a user accessing Dropbox via smartphone (Android Lollipop and Android Nougat). The data are from performing several common activities such as installing, signing up, uploading, downloading, sharing, and others. About 14 artifacts are identified by documenting the Dropbox client database changing contents as these activities are carried out. This study increases knowledge of the artifacts that are leftover by Dropbox client on Android smartphones. The results propose this comparing and analyzing method can be used by digital forensics investigators in carrying out investigations and cyberlaw practitioners as guidance in criminal cases.
A Security Analysis on OpenSIPS Satrya, Gandeva Bayu; Nicovandia, Muhammad Caesara
IJAIT (International Journal of Applied Information Technology) Vol 3 No 02 (2019)
Publisher : School of Applied Science, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/ijait.v3i02.2503

Abstract

IP Telephony, Internet Telephony, Digital Phone or often also called VoIP (Voice Over Internet Protocol) is a technology that allows long-distance voice conversations with the Internet. The increasing number of VoIP users and other IP-based multimedia streaming services naturally raises security issues. Many users are likely to lose their privacy in communication. To overcome this security problem a security system must be implemented. Implementing a security system will use VPN Gateway using SSL and TLS encryption on the VoIP server. The VPN Gateway method is used to build a private network so that only certain users can use the private network. The TLS method is used to secure a user signaling session to the server. From the test results obtained that the VoIP server that uses VPN Gateway and TLS on the server can overcome the attacks e.g., eavesdropping, attacking authentication, teardown session, and denial of service.
Implementation of Centralized Networking System and Integrated Marketing Communication for MSMEs in Buah Batu Bandung Astri Wulandari; Bethani Suryawardani; Dandy Marcelino; Gandeva Bayu Satrya; Fat’hah Noor Prawita; Wahyu Lukito; Bijaksana Prabawa
Jurnal Penyuluhan Vol. 18 No. 01 (2022): Jurnal Penyuluhan
Publisher : Department of Communication and Community Development Sciences and PAPPI (Perhimpunan Ahli Penyuluhan Pembangunan Indonesia)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25015/18202235915

Abstract

Network security is very important, especially for community service units because a damaged system can affect other systems. Therefore, it is necessary to design and develop a computer network system and security that’s more centralized. Promotional activities are very important to be carried out by every business from the smallest scope to even large companies, because no matter how good the quality of the products the company has, it will not be successful for sale without proper promotion. Referring to the situation and problems faced by partners, our group took the initiative to contribute by providing several alternative solutions whose goals are expected to be useful for partners, by providing training on the implementation of integrated networks and MSME database management, then providing an integrated marketing communication training, workshop on communication marketing tools that can provide a competitive advantage for MSMEs so that MSME marketing tools in Buah Batu District have superior value. With some of the solutions that we offer, the expected final results from this community service activity are network problems and database management can be resolved properly. Furthermore, MSMEs in Buah Batu District have standardized and attractive printed and digital marketing tools.
A Security Analysis on OpenSIPS Gandeva Bayu Satrya; Muhammad Caesara Nicovandia
IJAIT (International Journal of Applied Information Technology) Vol 03 No 02 (November 2019)
Publisher : School of Applied Science, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/ijait.v3i02.2503

Abstract

IP Telephony, Internet Telephony, Digital Phone or often also called VoIP (Voice Over Internet Protocol) is a technology that allows long-distance voice conversations with the Internet. The increasing number of VoIP users and other IP-based multimedia streaming services naturally raises security issues. Many users are likely to lose their privacy in communication. To overcome this security problem a security system must be implemented. Implementing a security system will use VPN Gateway using SSL and TLS encryption on the VoIP server. The VPN Gateway method is used to build a private network so that only certain users can use the private network. The TLS method is used to secure a user signaling session to the server. From the test results obtained that the VoIP server that uses VPN Gateway and TLS on the server can overcome the attacks e.g., eavesdropping, attacking authentication, teardown session, and denial of service.
Analisis Forensik Android: Artefak pada Aplikasi Penyimpanan Awan Box Gandeva Bayu Satrya; A Ahmad Nasrullah
Jurnal Teknologi Informasi dan Ilmu Komputer Vol 7, No 3: Juni 2020
Publisher : Fakultas Ilmu Komputer, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25126/jtiik.2020732220

Abstract

Sistem penyimpanan melalui cloud memiliki banyak keunggulan, seperti kemampuan akses dari lokasi manapun serta kemudahan penyimpanan pencadangan file-file pada komputer dan smartphone. Terdapat banyak pilihan layanan penyimpanan melalui cloud, seperti Dropbox, Microsoft OneDrive, Google Drive, dan Box. Dari beberapa jenis layanan peyimpanan tersebut Box adalah satu-satunya layanan penyimpanan cloud yang mampu menjamin tingkat reliability uptime hingga 99.9%. Awalnnya, Box hanya ditujukan untuk kegiatan bisnis saja, namun sekarang Box dapat digunakan oleh pengguna secara umum. Selain memberikan pengaruh yang positif, pertumbuhan penggunaan teknologi layanan penyimpanan cloud juga telah memberikan peningkatan dalam peluang terjadinya kejahatan di dunia maya. Forensik digital merupakan solusi terbaru dalam mengamati keamanan sistem dan jaringan, sementara forensik bergerak adalah pengembangan forensic digital yang sepenuhnya difokuskan pada media smartphone. Forensik bergerak dapat dilakukan dalam dua sisi, yaitu server dan client. Studi kasus dalam penelitian ini berfokus pada penggunaan smartphone OS Android yang terinstal Box sebagai layanan penyimpanan cloud. Sedangkan tujuan utama dari penelitian ini adalah untuk menyediakan sebuah metode forensik bergerak untuk menemukan artefak pada smartphone Android yang telah terinstal dengan aplikasi Box.AbstractStoring files in a cloud has many advantages, such as the ability to access them from any location and to keep backups of those files on computers and smartphones. There are many choices for cloud storage services, such as Dropbox, Microsoft OneDrive, Google Drive, and Box. Of these, Box is the only cloud storage service that guarantees uptime reliability 99.99% of the time. At first, Box was intended for business use only, but now it is also freely available for public use. Growth in cloud storage technology use has also resulted in increased opportunities for cybercrime to take place. Digital forensics is the latest solution for system and network security observers, while mobile forensics is a development of digital forensics that is fully focused on smartphone media. Mobile forensics can be performed on both the server and client sides. In this research, mobile forensics was performed on the client side. The case study in this paper focused on an Android operating system (OS) smartphone using Box cloud storage. The purpose of this study was to provide a mobile forensics method for finding artifacts on smartphones that have a Box application installed.
Digital Forensics Study of a Cloud Storage Client: A Dropbox Artifact Analysis Gandeva Bayu Satrya
CommIT (Communication and Information Technology) Journal Vol. 13 No. 2 (2019): CommIT Journal
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v13i2.5781

Abstract

The rapid development of cloud storage technology paired with the prevalence of smartphone usage presents wide-ranging challenges for digital forensics practitioners. Data are more easily uploaded and shared between multiple devices and across multiple platforms. So, the process has increased the opportunities for criminality. Criminality undertaken in cloud computing can be directly seen on logs stored on the cloud storage server, which records user activity. However, because of user privacy protection, these logs cannot be easily used as evidence in court. This issue emphasizes the need for a reliable means of identifying, acquiring, and preserving evidential data from the client-side. This study identifies the data artifacts of a user accessing Dropbox via smartphone (Android Lollipop and Android Nougat). The data are from performing several common activities such as installing, signing up, uploading, downloading, sharing, and others. About 14 artifacts are identified by documenting the Dropbox client database changing contents as these activities are carried out. This study increases knowledge of the artifacts that are leftover by Dropbox client on Android smartphones. The results propose this comparing and analyzing method can be used by digital forensics investigators in carrying out investigations and cyberlaw practitioners as guidance in criminal cases.
Improving Network Security - A Comparison between nDPI and L7-Filter Gandeva Bayu Satrya; Faiizal Eko Nugroho; Tri Brotoharsono
International Journal on Information and Communication Technology (IJoICT) Vol. 2 No. 2 (2016): December 2016
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21108/IJOICT.2016.22.77

Abstract

The classification of data traffic in a firewall using parameters such as port number, IP address, and MAC address is not sufficient. For example, currently, many applications can be used without a port number meaning they can easily circumvent a firewall. Firewalls inspecting up to only layer four could allow malicious data to pass. Next-generation deep packet inspection (DPI) is a method that can be used for firewalls as a method of classification up to layer seven in data traffic control.This research recommends the use of nDPI and L7-filter by network administrators on existing open source firewalls. Eleven internet applications were used to test and analyze nDPI and L7-filter which are capable of detecting traffic based on the data signature. nDPI and L7-filter were tested for accuracy and speed. We conclude that the development of next-generation deep packet inspection is important for the future of system and network security.
Online Marketing Education and Application Development for MSMEs in Buah Batu District Bandung Astri Wulandari; Bethani Suryawardani; Dandy Marcelino; Gandeva Bayu Satrya; Fat’hah Noor Prawita; Mochamad Yudha Febrianta
Jurnal Penyuluhan Vol. 18 No. 02 (2022): Jurnal Penyuluhan
Publisher : Department of Communication and Community Development Sciences and PAPPI (Perhimpunan Ahli Penyuluhan Pembangunan Indonesia)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25015/18202238834

Abstract

In today's fast-paced world of information and technology, it's impossible to do anything without a connection to the internet. Due to the rising level of competition in the market, small and medium-sized businesses (SMEs) that are owned and operated by business people need to make use of digital media to raise their brands' visibility and hence their competitiveness. In order to help MSME actors in Buah Batu District continue to grow and develop, the mentorship program for selected partners aims to assist them in developing innovative goods. The MSME actors in Buah Batu District are likely to benefit from assistance related to the district's online web platform, which has been established. It has been determined that in order to help MSME actors (including those designing product labels and packaging) learn about online marketing, the team will offer online marketing education workshops. They will also develop a better product website, integrate the site with helpful applications, and create an updated database system that can be relied upon.
Digital Tools for Co-working Space Batununggal Using Digital-Ads, AR-Based Socmed Content, and Enterprise Resource Planning Bethani Suryawardani; Astri Wulandari; Gandeva Bayu Satrya; Dandy Marcelino; Fat’hah Noor Prawita; Mochamad Yudha Febrianta; Tarandhika Tantra
Jurnal Penyuluhan Vol. 19 No. 01 (2023): Jurnal Penyuluhan
Publisher : Department of Communication and Community Development Sciences and PAPPI (Perhimpunan Ahli Penyuluhan Pembangunan Indonesia)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25015/19202341777

Abstract

The rise of information and technology requires all businesses and nonprofits to digitize. The co-working facility in Bandung's Batununggal District does the same. Batununggal co-working facility intends to promote locals' creativity and host start-up actors. This community service targets MSME actors and inhabitants in Bandung's Batununggal subdistrict, those who have established a business and those who will establish a business. Workshops on digital technologies, digital ads, and AR-based social media content offer business actors insight and competence. Participants also received training on enterprise resource planning to help manage and integrate corporate operations in Batununggal, Bandung. This series of community service activities increased participants' insight into digital-based promotional strategies and the use of digital tools and digital ads for their products; increased participants' insight and competence in managing and integrating business using the ERP system; trained participants to use AR technology on social media, especially Instagram, to promote their products.
Analisis Performa Capacity Scheduling Algorithm Pada Sistem Job Scheduling Hadoop Alfian Dzulfikar Khabibi; Gandeva Bayu Satrya; Anton Herutomo
eProceedings of Engineering Vol 2, No 2 (2015): Agustus, 2015
Publisher : eProceedings of Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstrak Hadoop merupakan framework software berbasis java dan open-source yang berfungsi untuk mengolah data yang besar secara terdistibusi dan berjalan diatas cluster yag terdiri dari beberapa gabungan komputer. Arsitektur Hadoop terdiri dari 2 layer pokok, yaitu layer MapReduce dan layer Hadoop Distributed File System (HDFS). Map Reduce adalah komponen service kunci yang berfungsi untuk melakukan proses komputasi Big Data secara paralel dan terdistribusi dan (HDFS) berfungsi untuk menyediakan bandwidth sangat tinggi yang di agregasi ke semua cluster (node). Dalam MapReduce terdapat terdapat job scheduler yang berfungsi untuk memetakan antrian job yang masuk. Job scheduler default dari Hadoop adalah FIFO dan Hadoop mengizinkan penggantian job scheduler default dengan custom job scheduler. Capacity Scheduling merupakan job scheduler pada Hadoop yang berkarakteristik memberikan capacity guarantee kepada antrian yang masuk pada queue yang telah disediakan sehingga bisa ditekannya nilai Fail Rate. Tetapi karena resource harus dibagi menjadi beberapa bagian maka performansi Response Time dan Job Troughput menurun. Pada algoritma FIFO nilai maksimal Job Fail rate yaitu 10%, sedangkan pada Capacity Scheduling nilai Job Troughput maksimal adalah 4,3%. Kata kunci : Hadoop, data, multi-user, Capacity Scheduling, FIFO