Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : IJCCS (Indonesian Journal of Computing and Cybernetics Systems)

Implementasi Sistem Pelacakan Kendaraan Bermotor Menggunakan Gps Dan Gprs Dengan Integrasi Googlemap Yazid Dul Muchlisin; Jazi Eko Istiyanto
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 5, No 2 (2011): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.2021

Abstract

Abstract— Vehicle tracking system using GPS and GPRS integration googlemap provide information that is maximized with the technology of GPS (Global Positioning System) receiver which can indicate the position of the vehicle with the map and the ability of the appointment of direction and position coordinates (x, y or latitude, longitude) textually and visual at any location. Vehicle tracking system is built using equipment GIS (Geographic Information System) and dedicated to smartphones which support Global Positioning System (GPS), as well as portable computers, using General Packet Radio Service (GPRS) as a connection to the internet. The hardware used is a smartphone that supports GPS with supporting tools used are GoogleMaps, Notepad + +, NetBeans IDE 6.5.1, Mysql, Java (J2ME), PHP, JavaScript. The results of this system in the form of tracking system capable of monitoring the movement of vehicles on an ongoing position by utilizing GPS and GPRS as the sender of the wireless data and Internet connections.  Keywords— GIS, GPS, GPRS, googlemaps, J2ME,
Analisis Forensik Jaringan Studi Kasus Serangan SQL Injection pada Server Universitas Gadjah Mada Resi Utami Putri; Jazi Eko Istiyanto
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 6, No 2 (2012): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.2157

Abstract

AbstrakForensik jaringan merupakan ilmu keamanan komputer berkaitan dengan investigasi untuk menemukan sumber serangan pada jaringan berdasarkan bukti log, mengidentifikasi, menganalisis serta merekonstruksi ulang kejadian tersebut. Penelitian forensik jaringan dilakukan di Pusat Pelayanan Teknologi Informasi dan Komunikasi (PPTIK) Universitas Gadjah Mada.Metode yang digunakan adalah model proses forensik (The Forensic Process Model) sebuah model proses investigasi forensik digital, yang terdiri dari tahap pengkoleksian, pemeriksaan, analisis dan pelaporan. Penelitian dilakukan selama lima bulan dengan mengambil data dari Intrusion Detection System (IDS) Snort. Beberapa file log digabungkan menjadi satu file log, lalu data dibersihkan agar sesuai untuk penelitian.Berdasarkan hasil penelitian yang telah dilakukan, terdapat 68 IP address  yang melakukan tindakan illegal SQL Injection pada server www.ugm.ac.id. Kebanyakan penyerang menggunakan tools SQL Injection yaitu Havij dan SQLMap sebagai tool otomatis untuk memanfaatkan celah keamanan pada suatu website. Selain itu, ada yang menggunakan skrip Python yaitu berasal dari benua Eropa yaitu di Romania. Kata kunci—forensik jaringan, model proses forensik, SQL injection AbstractNetwork forensic is a computer security investigation to find the sources of the attacks on the network by examining log evidences, identifying, analyzing and reconstructing the incidents. This research has been conducted at The Center of Information System and Communication Service, Gadjah Mada University.The method that used was The Forensic Process Model, a model of the digital investigation process, consisted of collection, examination, analysis, and reporting. This research has been conducted over five months by retrieving data that was collected from Snort Intrusion Detection System (IDS). Some log files were retrieved and merged into a single log file, and then the data cleaned to fit for research.Based on the research, there are 68 IP address was that did illegal action, SQL injection, on server www.ugm.ac.id. Most of attackers using Havij and SQLmap (automated tools to exploit vulnerabilities on a website). Beside that, there was also Python script that was derived from the continent of Europe in Romania. Keywords— Network Forensics, The Forensic Process Models, SQL Injection