Claim Missing Document
Check
Articles

Found 3 Documents
Search

PERBANDINGAN ALGORITMA PADA VIRTUAL PRIVATE NETWORK IPSEC TERHADAP KECEPATAN DATA TRANSFER Alpan Hikmat Muharram Permana; Nur Widiyasono; Alam Rahmatulloh
Sistemasi: Jurnal Sistem Informasi Vol 9, No 2 (2020): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (698.757 KB) | DOI: 10.32520/stmsi.v9i2.713

Abstract

VPN dapat memperlambat koneksi internet karena data harus melakukan perjalanan melalui jaringan VPN serta mengenkripsi dan mendekripsi data yang memerlukan lebih banyak waktu. Manusia membutuhkan sebuah solusi untuk mempermudah dalam hal memperoleh kecepatan waktu, keamanan, meringankan biaya, serta mendapat kemudahan berkomunikasi tanpa memikirkan tempat yang jauh. Ada beberapa algoritma yang dapat diterapkan pada teknologi VPN diantaranya yaitu AES, DES, 3DES, RC4, Blowfish dan IDEA, namun belum diketahui dari algoritma tersebut kinerja yang paling optimal dari segi kecepatan transfer data. Penelitian ini akan melakukan perbandingan algoritma pada teknologi Virtual Private Network (VPN) IPSec terhadap kecepatan transfer data menggunakan tools cisco packet tracer dan hanya membandingkan algoritma DES, 3DES, AES 128, AES 192 dan AES 256. Kontribusi penelitian ini adalah menunjukan bahwa algoritma 3DES sebagai algoritma yang paling optimal dari segi kecepatan transfer data pada file berukuran 5571584 bytes dengan rasio 13,69% lebih lambat, file berukuran 33591768 bytes dengan rasio 14,97% lebih lambat dan pada file berukuran 16599160 bytes dengan rasio 8,36% lebih lambat pada proses download. Sedangkan pada proses upload, pada file berukuran 5571584 bytes dengan rasio 11,17% lebih lambat, file berukuran 33591768 bytes dengan rasio 11,66%lebih lambat dan pada file berukuran 16599160 bytes dengan rasio 9,05% lebih lambat.
Reliability Analysis of Communication Network Service Quality For Internet of Vehicles (IoV) Nizirwan Anwar; Dewanto Rosian Adhy; Budi Tjahjono; Rudi Hermawan; Nur Widiyasono; Muhammad Abdullah Hadi
International Journal of Science, Technology & Management Vol. 2 No. 5 (2021): September 2021
Publisher : Publisher Cv. Inara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46729/ijstm.v2i5.310

Abstract

The development of the Internet of Vehicle (IoV) is overgrowing toward driving comfort, safety, and efficiency. Autopilot or a car without a driver is one implementation of IoT. To run the full function of IoV, a reliable communication network is needed because the risk will be substantial due to the low quality of network infrastructure services. In this research, we will analyze the quality of network infrastructure services. The analysis can be done through two approaches: direct measurement in the field using a GPS Tracker-based system and modeling using the mathematical function of transmit power of mobile communication transmitting devices. The test is carried out in a specific area with a sample of high traffic and low-density areas. This method was chosen to find the right pattern in measuring the quality of communication network services. The tests carried out produce dynamic data on service quality in certain areas. For areas of low density, the service quality tends to be below as well, and many areas without signal are found, while for areas with high density, the quality of service is found to be good, but network overload conditions often occur.
ANALISIS INFEKSI MALWARE PADA PERANGKAT ANDROID DENGAN METODE HYBRID ANALYSIS Asep Solahudin Rusdi; Nur Widiyasono; Heni Sulastri
JURNAL ILMIAH INFORMATIKA Vol 7 No 02 (2019): Jurnal Ilmiah Informatika (JIF)
Publisher : Teknik Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1000.196 KB) | DOI: 10.33884/jif.v7i02.1355

Abstract

Android is the most widely used operating system in the world with a percentage of 76.82% in the Android operating system market share. This fact makes the developers of malicious software (malware) make mobile phone users with the Android operating system as the main target of malware attacks. Attackers can modify application code by entering malicious code, repacking the application and publishing the application in the Android application market. The malware samples used in this study were Judy adware and Marcher banking trojans. This study aims to determine the behavior or characteristics of the malware samples using static and dynamic analysis. The analysis shows that Judy committed ad-fraud by clicking on advertisements without the user's knowledge and Marcher had the ability to collect credential information from the victim's financial account.