Claim Missing Document
Check
Articles

Found 12 Documents
Search

A DEPTH PRE-PROCESSING DATA ANALYSIS FOR INTRUSION DETECTION SYSTEM USING OUTLIER DETECTION AND BOX-COX TRANSFORMATION TECHNIQUE Dahliyusmanto Dahliyusmanto; Abdul Hanan Abdullah; Syefrida Yulina
Jurnal Sains dan Teknologi Vol 13, No 1 (2014): Jurnal Sains dan Teknologi
Publisher : Fakultas Teknik Universitas Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (339.959 KB) | DOI: 10.31258/jst.v13.n1.p%p

Abstract

An Intrusion Detection System (IDS) seeks to identify unauthorized access to computer systems’ resources and datausing a statistical approach. The scale on which a dataset variable is measured may not the most appropriate forstatistical analysis or describing variation, and may even hide the basic characteristics of the data. This paper proposed apre-processing analysis for detecting unusual observations that do not seem to belong to the pattern of variabilityproduced by the other observations. The pre-processing analysis consists of outliers detection and Transformation.Outliers are best detected visually whenever this is possible. Usually, the original data sets are not normally distributed.If normality is not a viable assumption, one alternative is to make non-normal data look normal. This paper explains thesteps for detecting outliers’ data and describes the Box-Cox power transformation method that transforms them tonormality. The transformation obtained by maximizing lamda functions usually improves the approximation tonormality.Keywords : IDS, dataset, outliers, transformation, pre-processing
Manajemen Bandwidth Menggunakan Metoda Queue Tree Studi Kasus Dinas Perpustakaan Dan Kearsipan Riau Jason Prawira Azali; Dahliyusmanto Dahliyusmanto
Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains Vol 8 (2021): Edisi 2 Juli s/d Desember 2021
Publisher : Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Covid-19 is a global pandemic that has affected many jobs. Meetings that used to be held face-to-face are now being held online. The Riau Provincial Library and Archives Service (DIPERSIP) also implements online meetings, but this application is not supported by an adequate network configuration. This is evidenced by the results of the Quality of Services (QoS) measurement which get a poor score based on the TIPHON standard. To overcome this, a queue tree is applied to the DIPERSIP router to manage bandwidth usage. Configuration begins with creating static and dynamic address lists for conference meetings. Then create a mangle to mark connections and packets that are useful for the queue tree, and end with the creation of a queue tree to limit every activity related to upload-download. This configuration has proven to be effective in overcoming existing problems, as evidenced by the QoS re-measurement results that get very good scores.Keywords: Address List, Bandwidth, Mangle, Quality of Services (QOS) Queue Tree.
Analisis Serangan Keamanan Informasi Pribadi Pada Media Sosial Facebook Menggunakan Metode National Institute of Justice (NIJ) Khairani Rahmatul Ummah; Dahliyusmanto Dahliyusmanto
Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains Vol 8 (2021): Edisi 2 Juli s/d Desember 2021
Publisher : Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Social media is very important in everyday life. However, when used, a lot of personal data and information is shared. This risks being vulnerable to personal data leaks. Facebook is one of the social media that often experiences user data leaks. There are many ways to steal Facebook user data, one of which is by using Phishing techniques. Phishing means tricking a user into entering a username, password, or other personal data on a modified site. This research was conducted regarding Phishing attacks. The method used is the National Institute of Justice (NIJ). The stages flow starts from the preparation stage, the collection stage, the examination stage, the analysis stage, and the reporting stage. The Wireshark application was used to search for evidence, and the Hashcalc application was used to acquire the obtained evidence. Keywords: Facebook, phishing, cybercrime, Wireshark.
Optimalisasi Kualitas Jaringan Internet Menggunakan Web Proxy Berbasis WLAN Dengan Metode Penjadwalan (Studi Kasus Di SMK Negeri 1 Bandar Sei Kijang Kabupaten Pelalawan) Abu Hanifah; Dahliyusmanto Dahliyusmanto
Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains Vol 8 (2021): Edisi 2 Juli s/d Desember 2021
Publisher : Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study aims to determine the optimization of the quality of the internet network using a WLAN-based Web Proxy with the scheduling method at SMK Negeri 1 Bandar Sei Kijang, Pelalawan Regency. This study uses the Action Research method, which was carried out in 2021. The measurement of internet network quality refers to the TIPHON standard with QoS parameters consisting of Throughput, Delay, Jitter, Packet Loss using the Wireshark application. This study uses the Action Research method through diagnosing, action planning, action taking, evaluating, and learning. The subject of this study is all students of class XI, which consists of eight study groups with a total of 219 students. The measurement and calculation of the quality of the internet network were carried out in two groups. The first group consists of four classes before using a WLAN-based web proxy with scheduling method and the second group after using a WLAN-based web proxy with scheduling method. The results of measurements and calculations show that using a WLAN-based web proxy with a scheduling method can optimize the quality of the internet network at SMKN 1 Bandar Sei Kijang. Before using WLAN-based Web Proxy with scheduling method the average index is 1.75 in the Poor category, but after applying the average index increases to 3.75 with the Satisfactory category. Keywords: Optimization, network, internet, proxy, scheduling
Sistem Informasi Pengolahan Nilai Rapor Dan Prediksi Penjurusan Menggunakan Naive Bayes Berbasis Web Di SMAN 5 Bangko Pusako Ramadani Umri; Dahliyusmanto Dahliyusmanto
Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains Vol 7 (2020): Edisi 2 Juli s/d Desember 2020
Publisher : Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

SMAN 5 Bangko Pusako is one of the senior high school that has implemented 2013 Curriculum in its assessment standards. However, due to evaluation standard of 2013 curriculum is more complicated so it makes teachers feel difficulty in marking process. In addition, the marking process in SMA N 5 Bangko Pusako still uses Microsoft Excel where every subject teacher has their own grades file, then the homeroom teacher will unite all the grades of the subject teacher and reprocess it to be used as a report card. The lack of integration of marking process between subject teacher and homeroom teacher makes the marking process takes a long time, so we need a web-based marking process information system that can facilitate the work of teachers in marking process in 2013 curriculum is needed. This information system is created by using PHP Programming Language and MySQL as database. The results of this study are information systems that manage web-based values that apply 2013 curriculum assessment standards so teachers do not feel difficulty in calculating grades. In addition, this information system can integrate and calculate all grades from the subject teacher and homeroom teacher, then the final grades can be printed directly into report cards. In this system, Naive Bayes Method is also used for prediction of students’ field. Function to predict are made by using RapidMiner, which is provide an accuracy of 95,24% with an error rate of 4,76%. Keywords : Information System, 2013 Curriculum, Marking Process, PHP, MySQL
Penerapan Teknologi Augmented Reality Sebagai Media Pengenalan Noken Papua Berbasis Android Suci Pebriani Rusanti Sari; Dahliyusmanto Dahliyusmanto
Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains Vol 5 (2018): Edisi 2 Juli s/d Desember 2018
Publisher : Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Noken is the one of the variety handicraft in Indonesia from Papua. Noken is listed on UNESCO as an Indonesian culture heritage that must be preserved. Augmented Reality (AR) technology can beimplemented into an interactive application, so it can increase people attractiveness to know and to introduce Indonesian traditional handicrafts to the world. Commonly, AR application uses special marker so that application can be run (Marker Based Tracking). The use of these markers makes the application inflexible, because only certain marker which already uploaded by programmer on database system can be used. The research’s goal is to present noken in an application by showing3D object and video about noken on AR environment without using special marker. This application is created with Unity 3D and Vuforia by using Markerless User Defined Target (UDT). Moreover,some tools are also needed as supporting tools, like as Adobe Photoshop for interface designing, Adobe Premier for video editing, and Blender for creating noken 3D object. The final result of thisresearch is AR application for android with UDT technique which capable to show 3D object and video above real marker selected by user after detected by smartphone camera. The resultingapplication is alsoequipped with interactive features like scale and rotate. So this application can be used as alternative for conserving and spreading Papua handicraft in interesting and flexible way.Keywords :Augmented Reality (AR), User Defined Target (UDT), Android, Noken 3D object, video about noken
Pemanfaatan Layanan Google Drive Untuk Menjalankan Aplikasi Pengontrolan Peralatan Listrik Menggunakan Usb Comm Port Rommy Oktaviandi; Dahliyusmanto Dahliyusmanto; Anhar Anhar
Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains Vol 2, No 2 (2015): Wisuda Oktober Tahun 2015
Publisher : Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The need for a system for remote controlling is increasing in line with the era of globalization in which migration and movement of people more widely and quickly. So far, the public can control something remotely by using the remote control. However, such control is hampered by distance, if the distance between the tool is controlled by the controller passes the tolerance limit, then the equipment can not function as desired. From the above, the authors use of internet technology to make long-distance control system. The method is performed by utilizing the cloud computing facilities at google drive. Using Visual Basic 2010 to build an interface that allows the user in controlling electrical equipment integrated in a USB Comm Port. Results from this study are electrical appliances can be controlled from a distance with minimum delay 12s.Keywords; Internet, Visual Basic, Google Drive, Usb Comm Port, Cloud Computing
Perancangan Intrusion Detection System Untuk Mendeteksi Serangan Menggunakan Aplikasi Telegram Friska Yudhistira; Dahliyusmanto Dahliyusmanto; Linna Oktaviana Sari
Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains Vol 8 (2021): Edisi 2 Juli s/d Desember 2021
Publisher : Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Information technology is now much developed. With the ease of obtaining this information, it causes other obstacles, namely important information or data can be misused by other parties who are not responsible for their own benefit. So that a network security system becomes one of the important aspects to maintain the validity and integrity of data and ensure the availability of services for its users. The system should be equipped with security that allows it to be safe from all kinds of attacks and as well as intrusion attempts by irresponsible parties. With the IDS (Intrusion Detection System) administrator will detect the attack by an intruder so that notification of an attack can be identified quickly through a notification Telegram Sistem IDS (Intrusion Detection System)will provide notification or warning through application telegram if there are attacks on computer networks are detected in the system, so administrators networkable to find out the occurrence of the attack as soon as possible This system can detect attacks that occur on a computer network by scanning a number of sources and traffic that occurs within the network, so that all illegal events can be seen throughactivities monitoring using the application used to monitor the network, the IDS System. This will provide notifications or warnings via the Telegram application if an attack on the computer network is detected in the system, so that theadministrator networkcan find out the occurrence of the attack as quickly as possible.Of the 5 tests that have been carried out 80% successful 20% failed, it can be stated that the test was successfully carried out.Keywords: IDS (Intrusion Detection System), Snort, Telegram , Computer network.
Perancangan Wi-Fi Corner Hotspot Menggunakan Mikrotik Di Tempat Umum Risman Hidayat; Dahliyusmanto Dahliyusmanto
Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains Vol 8 (2021): Edisi 2 Juli s/d Desember 2021
Publisher : Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The development of internet technology is currently overgrowing, so the need for technological tools is increasing, one of which is the need for the internet. One easy way and much-loved by people is to use a wireless system/hotspot system. However, in using Wi-Fi network services in aplace with a limited bandwidth/speed, the user becomes wasteful both in terms of time and internet network usage. The purpose of this research is to design a Wi-Fi corner hotspot system using a proxy in a public place at the Otot IT store and make the voucher system key access to the internet network. This research was carried out in the Otot IT shop environment on JalanRaya Pekanbaru-Bangkinang KM43, Koto Tibun village. The stages carried out in this study began with problem identification, literature study, identification of system requirements, system design, and system testing. The RB 941-2nD (hAP Lite) router will be the primary device in creating a Wi-Fi corner hotspot. The voucher system is made using the Mikhmon application.Testing the internet connection quality can be seen using the PING, download, andupload parameters. In this study, the data analysis technique used is qualitative analysis with the Quality of Service (QoS) method. This study shows that users who want to use internet service access must have a voucher first, different from before where users only ask for a Wi-Fi password and can repeatedly enter with the same password. If you do not have a voucher, youcan directly come to the store admin to buy it. With the voucher system, the network quality in the store will be able to be controlled and managed, such as limiting the sale of vouchers if users are using the internet a lot and avoiding repeated logins by users as before doing the voucher systemKeyword: Wi-Fi Corner, Hotspot, Mikrotik, Otot IT, & Voucher
Pengelolaan Jaringan Single Ssid Menggunakan Controller Access Point System Manager (Capsman) Di SMK Labor Binaan FKIP UNRI Ade Ruslan; Dahliyusmanto Dahliyusmanto
Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains Vol 8 (2021): Edisi 2 Juli s/d Desember 2021
Publisher : Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

To improve the optimization of the internet network, the Vocational High School (SMK) of FKIP UNRI uses the internet network using a wireless network so that all teachers, admin staff, and students can get data from the internet in real-time. SMK Labor has access points with different access point identification names, better known as SSID (Service Set Identifier). Of all the access point devices installed with different SSID names on each device, so that if the user changes buildings, they must reconnect to the SSID in the building. Device configuration is still done manually; therefore, network management impacts the access point management system. The network manager is required to configure the access point devices individually because there is no centralized access point management. To help this success, we need a technology that can manage a network centrally, making it easier to control all wireless access point devices in the network. One example of a wireless device that is often used is a Mikrotik router. Mikrotik has a function to manage a device centrally using the CAPsMAN feature, making it easier for admins to monitor all wireless access point devices contained in the network. With these problems, the author aims to design the management of access points by utilizing the CAPsMAN feature to make it easier for admins to manage and maintain the network at school.Keyword: Single SSID, CAPsMAN, Acess Point, Mikrotik