p-Index From 2019 - 2024
15.885
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering ComEngApp : Computer Engineering and Applications Journal Lontar Komputer: Jurnal Ilmiah Teknologi Informasi JURNAL SISTEM INFORMASI BISNIS Techno.Com: Jurnal Teknologi Informasi Jurnal Buana Informatika Perfecting a Video Game with Game Metrics Jurnal Informatika Jurnal Sarjana Teknik Informatika Jurnal Ilmiah Teknik Elektro Komputer dan Informatika (JITEKI) Prosiding Seminar Nasional Sains Dan Teknologi Fakultas Teknik Jurnal Teknik Elektro CommIT (Communication & Information Technology) Jurnal Ilmiah Kursor Jurnal Teknologi Informasi dan Ilmu Komputer Telematika Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika Scientific Journal of Informatics Seminar Nasional Informatika (SEMNASIF) ELINVO (Electronics, Informatics, and Vocational Education) Annual Research Seminar Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika Register: Jurnal Ilmiah Teknologi Sistem Informasi Proceeding of the Electrical Engineering Computer Science and Informatics Edu Komputika Journal Format : Jurnal Imiah Teknik Informatika Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) RABIT: Jurnal Teknologi dan Sistem Informasi Univrab SISFOTENIKA Journal of Information Technology and Computer Science (JOINTECS) INTENSIF: Jurnal Ilmiah Penelitian dan Penerapan Teknologi Sistem Informasi JIKO (Jurnal Informatika dan Komputer) JIEET (Journal of Information Engineering and Educational Technology) Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control CogITo Smart Journal IT JOURNAL RESEARCH AND DEVELOPMENT JOURNAL OF APPLIED INFORMATICS AND COMPUTING JURNAL REKAYASA TEKNOLOGI INFORMASI JURNAL TEKNIK INFORMATIKA DAN SISTEM INFORMASI JURNAL INSTEK (Informatika Sains dan Teknologi) ILKOM Jurnal Ilmiah Jiko (Jurnal Informatika dan komputer) Matrik : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer CYBERNETICS Digital Zone: Jurnal Teknologi Informasi dan Komunikasi IJID (International Journal on Informatics for Development) J-SAKTI (Jurnal Sains Komputer dan Informatika) JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Abdimas Umtas : Jurnal Pengabdian kepada Masyarakat EDUMATIC: Jurnal Pendidikan Informatika jurnal teknik informatika dan sistem informasi Jurnal Mantik NUKHBATUL 'ULUM : Jurnal Bidang Kajian Islam Jutisi: Jurnal Ilmiah Teknik Informatika dan Sistem Informasi JISKa (Jurnal Informatika Sunan Kalijaga) Buletin Ilmiah Sarjana Teknik Elektro Mobile and Forensics Journal of Innovation Information Technology and Application (JINITA) Journal of Education Informatic Technology and Science Jurnal Bumigora Information Technology (BITe) Jurnal Teknologi Informatika dan Komputer Jurnal FASILKOM (teknologi inFormASi dan ILmu KOMputer) Jurnal Computer Science and Information Technology (CoSciTech) Phasti: Jurnal Teknik Informatika Politeknik Hasnur J-SAKTI (Jurnal Sains Komputer dan Informatika) Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen Techno Engineering Science Letter Journal of Novel Engineering Science and Technology Jurnal Informatika: Jurnal Pengembangan IT
Claim Missing Document
Check
Articles

Found 6 Documents
Search
Journal : ILKOM Jurnal Ilmiah

INVESTIGASI LIVE FORENSIK DARI SISI PENGGUNA UNTUK MENGANALISA SERANGAN MAN IN THE MIDDLE ATTACK BERBASIS EVIL TWIN Ahmad, Muhammad Sabri; Riadi, Imam; Prayudi, Yudi
ILKOM Jurnal Ilmiah Vol 9, No 1 (2017)
Publisher : Program Studi Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1139.929 KB)

Abstract

MITM based Evil twin menjadi suatu ancaman yang berbahaya bagi para pengguna jaringan Wifi. Pelaku penyerangan ini memanfaatkan AP (Access Point) palsu dengan konfigurasi gateway yang berbeda dengan legitimate AP, sehingga jenis serangan ini menjadi cukup sulit untuk dideteksi, disisi lain proses pengungkapan kasus serangan MITM based Evil Twin hanya sebatas mendeteksi aktivitas serangan dan belum ada pembahasan lebih lanjut terkait digital forensik. Penelitian ini dilakukan dengan menerapkan pendekatan metode Live forensik dan pendekatan dari sisi user, untuk mendeteksi aktivitas ilegal yang terjadi di dalam jaringan Wifi, Proses investigasi MITM Based Evil dibagi menjadi empat tahapan, dimulai dari proses collection, examination, analysis dan reporting dan analisa Forensik, selain itu penelitian ini difokuskan pada dua proses penelitian yaitu proses analisa Wifi scanning dan analisa network trafik untuk proses penemuan barang bukti digital berupa informasi traffik data dari serangan mitm based evil twin.
ANALISIS PERBANDINGAN DETECTION TRAFFIC ANOMALY DENGAN METODE NAIVE BAYES DAN SUPPORT VECTOR MACHINE (SVM) Riadi, Imam; Umar, Rusydi; Aini, Fadhilah Dhinur
ILKOM Jurnal Ilmiah Vol 11, No 1 (2019)
Publisher : Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (770.776 KB) | DOI: 10.33096/ilkom.v11i1.361.17-24

Abstract

Intrusion Detection System (IDS) is a software or hardware that can be used to detect any abnormal activity in the network. Situations often arise from various network access in the form of information or data that can cause problems. Detection is a system for detecting activities that are disturbing data access in information. IDS has two methods of doing detection, namely Rule Based (Signature Based) and Behavior-Based. Anomaly traffic can detect an increase in the number of user access and at any time there will be an attack from another party on the network. This study uses 2 algorithm methods are Naïve Bayes and Support Vector Machine (SVM). Naïve Bayes results through the Distributions and Radviz graph data samples have a probability value of 0.1 and the highest probability value is 0.8. Support Vector Machine (SVM) produces a graph that has greater accuracy.
ANALISIS STATISTIK LOG JARINGAN UNTUK DETEKSI SERANGAN DDOS BERBASIS NEURAL NETWORK Muhammad, Arif Wirawan; Riadi, Imam; Sunardi, Sunardi
ILKOM Jurnal Ilmiah Vol 8, No 3 (2016)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1103.013 KB) | DOI: 10.33096/ilkom.v8i3.76.220-225

Abstract

Distributed denial-of-service (DDoS) merupakan jenis serangan dengan volume, intensitas, dan biaya mitigasi yang terus meningkat seiring berkembangnya skala organisasi. Penelitian ini memiliki tujuan untuk mengembangkan sebuah pendekatan baru untuk mendeteksi serangan DDoS, berdasarkan log jaringan yang dianalisis secara statistik dengan fungsi neural network sebagai metode deteksi. Data pelatihan dan pengujian diambil dari CAIDA DDoS Attack 2007 dan simulasi mandiri. Pengujian terhadap metode analisis statistik terhadap log jaringan dengan fungsi neural network sebagai metode deteksi menghasilkan prosentase rata-rata pengenalan terhadap tiga kondisi jaringan (normal, slow DDoS, dan DDoS) sebesar 90,52%. Adanya pendekatan baru dalam mendeteksi serangan DDoS, diharapkan bisa menjadi sebuah komplemen terhadap sistem Intrusion Detection System (IDS) dalam meramalkan terjadinya serangan DDoS.
Header investigation for spam email forensics using framework of national institute of standards and technology Mustafa Mustafa; Imam Riadi; Rusydi Umar
ILKOM Jurnal Ilmiah Vol 13, No 2 (2021)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v13i2.849.163-167

Abstract

Today's technology makes communication very easy and can be used anywhere, even a distance of hundreds to thousands of kilometres is not a barrier in communicating. One of the tools or media that is widely used is via email. However, there are many disadvantages that may be obtained from the email, one of which is spamming or mail. The purpose of this research is to know the stages of spamming email analysis through header analysis. The method used in this study is the National Institute of Standards and Technology (NIST) and this method uses 4 stages, namely collection, examination, analysis, and reporting. The results of this study are expected to be able to find out the spam sender's email address, the spam email sender's IP address, and other information needed.
ANALISIS PERBANDINGAN DETECTION TRAFFIC ANOMALY DENGAN METODE NAIVE BAYES DAN SUPPORT VECTOR MACHINE (SVM) Imam Riadi; Rusydi Umar; Fadhilah Dhinur Aini
ILKOM Jurnal Ilmiah Vol 11, No 1 (2019)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v11i1.361.17-24

Abstract

Intrusion Detection System (IDS) is a software or hardware that can be used to detect any abnormal activity in the network. Situations often arise from various network access in the form of information or data that can cause problems. Detection is a system for detecting activities that are disturbing data access in information. IDS has two methods of doing detection, namely Rule Based (Signature Based) and Behavior-Based. Anomaly traffic can detect an increase in the number of user access and at any time there will be an attack from another party on the network. This study uses 2 algorithm methods are Naïve Bayes and Support Vector Machine (SVM). Naïve Bayes results through the Distributions and Radviz graph data samples have a probability value of 0.1 and the highest probability value is 0.8. Support Vector Machine (SVM) produces a graph that has greater accuracy.
Determining Eligible Villages for Mobile Services using K-NN Algorithm Anton Yudhana; Imam Riadi; M Rosyidi Djou
ILKOM Jurnal Ilmiah Vol 15, No 1 (2023)
Publisher : Prodi Teknik Informatika FIK Universitas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v15i1.1546.11-20

Abstract

To maximize and get population document services closer to the community, the Disdukcapil district of Alor provides mobile services by visiting people in remote villages which difficult-to-reach service centres in the city. Due to a large number of villages and limited time and costs, not all villages can be served, so the kNN algorithm is needed to determine which villages are eligible to be served. The criteria used in this determination are village distance, difficulty level, and document ownership (Birth Certificate, KIA, family card, and KTPel). The classes that will be determined are "Very eligible", "Eligible", and "Not eligible". By applying Z-Score normalization with the value of K=5, the classification gets 94.12% accuracy, while non-normalized only gets 88.24% accuracy. Thus, applying normalization to training data can improve the kNN algorithm's accuracy in determining eligible villages for "ball pick-up" or mobile services.
Co-Authors Abdul Fadlil Abdul Fadlil Abdullah Hanif Abdullah Hanif Achmad Nugrahantoro Achmad Syauqi Ade Elvina Adiniah Gustika Pratiwi Agung Wahyudi Agus Wijayanto Agus Wijayanto Ahmad Azhar Kadim Ahmad Luthfi Ahmad, Muhammad Sabri Aini, Fadhilah Dhinur Aji, Sukma Al Amany, Sarah Ulfah Anshori, Ikhwan Anton Yudahana Anton Yudhana Anton Yudhana ANWAR, FAHMI anwar, nuril Arif Wirawan Muhammad Arif Wirawan Muhammad Arif Wirawan Muhammad, Arif Wirawan Ariqah Adliana Siregar Arizona Firdonsyah Asno Azzawagama Firdaus Aulia, Aulia Aulyah Zakilah Ifani Bashor Fauzan Muthohirin Basir, Azhar Bernadisman, Dora Budin, Shiha Busthomi, Iqbal Deco Aprilliansyah Deco Aprilliansyah Dewi Astria Faroek Dewi Estri Jayanti Dikky Praseptian M Dwi Aryanto Eddy Irawan Aristianto Eko Brillianto Eko Handoyo Ervin Setyobudi Fadhilah Dhinur Aini Fadhilah Dhinur Aini Fahmi Anwar Fahmi Auliya Tsani Faiz Isnan Abdurrachman Fanani, Galih Fauzan Natsir Fauzan, Fauzan Firdonsyah, Arizona Fitriyani Tella Furizal Furizal Galih Fanani Galih Pramuja Inngam Fanani Guntur Maulana Zamroni Guntur Maulana Zamroni, Guntur Maulana Hafizh, Muhammad Nasir Hanif, Abdullah Helmiyah, Siti Herman Herman Herman Herman Yuliansyah Hidayati, Anisa Nur Himawan I Azmi Ikhsan Zuhriyanto Ikhwan Anshori Imam Mahfudl Nasrulloh Iqbal Busthomi Irhas Ainur Rafiq Irhash Ainur Rafiq Iwan Tri Riyadi Yanto, Iwan Tri Riyadi Izzan Julda D.E Purwadi Putra Jamalludin Jamalludin Jamalludin, Jamalludin Joko Triyanto Kusuma, Ridho Surya Luh Putu Ratna Sundari M Rosyidi Djou M. Rosyidi Djou M.A. Khairul Qalbi Miladiah Miladiah Miladiah, Miladiah Muflih, Ghufron Zaida Muh. Hajar Akbar Muhamad Caesar Febriansyah Putra, Muhamad Caesar Febriansyah Muhammad Abdul Aziz Muhammad Abdul Aziz Muhammad Abdul Aziz Muhammad Fauzan Gustafi Muhammad Ihya Aulia Elfatiha Muhammad Irwan Syahib Muhammad Yanuar Efendi Muhammad Zulfadhilah Murni Murni Mushab Al Barra Mustafa Mustafa Mustafa Mustafa NANNY NANNY Nasrulloh, Imam Mahfudl Nur Hamida Siregar Nur Widiyasono, Nur Nuril Anwar, Nuril Panggah Widiandana Prakoso, Danar Cahyo Purwanto Purwanto Purwono Purwono, Purwono Putri Annisa Raharja, Pradana Ananda Rahmat Ardila Dwi Yulianto Ramadhani, Erika Ramansyah Ramansyah Rauli, Muhamad Ermansyah Rauli, Muhamad Ermansyah Ridho Surya Kusuma Rio Widodo Riski Yudhi Prasongko Roni Anggara Putra Rusydi Umar Rusydi Umar Rusydi Umar Ruuhwan Ruuhwan Sahiruddin Sahiruddin Shiha Budin Sri Winiarti Sri Winiati Sugandi, Andi Sunardi - Sunardi Sunardi sunardi sunardi Sunardi, Sunardi Suprihatin Suprihatin Supriyanto Supriyanto Syahrani Lonang Syarifudin, Arma Takdir Ruslan Tawar Tri Lestari Tri Lestari Tri Sudinugraha Triyanto, Joko Tuska Abe Umar, Rusdy Verry Noval Kristanto W, Yunanri Wasito Sukarno Wicaksono Yuli Sulistyo Wicaksono Yuli Sulistyo WIDODO, RIO Winiati, Sri Wisnu Pranoto Yana Mulyana Yana Safitri Yudi Kurniawan Yudi prayudi Yuliansyah, Herman Yuliansyah, Herman