p-Index From 2019 - 2024
15.885
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering ComEngApp : Computer Engineering and Applications Journal Lontar Komputer: Jurnal Ilmiah Teknologi Informasi JURNAL SISTEM INFORMASI BISNIS Techno.Com: Jurnal Teknologi Informasi Jurnal Buana Informatika Perfecting a Video Game with Game Metrics Jurnal Informatika Jurnal Sarjana Teknik Informatika Jurnal Ilmiah Teknik Elektro Komputer dan Informatika (JITEKI) Prosiding Seminar Nasional Sains Dan Teknologi Fakultas Teknik Jurnal Teknik Elektro CommIT (Communication & Information Technology) Jurnal Ilmiah Kursor Jurnal Teknologi Informasi dan Ilmu Komputer Telematika Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika Scientific Journal of Informatics Seminar Nasional Informatika (SEMNASIF) ELINVO (Electronics, Informatics, and Vocational Education) Annual Research Seminar Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika Register: Jurnal Ilmiah Teknologi Sistem Informasi Proceeding of the Electrical Engineering Computer Science and Informatics Edu Komputika Journal Format : Jurnal Imiah Teknik Informatika Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) RABIT: Jurnal Teknologi dan Sistem Informasi Univrab SISFOTENIKA Journal of Information Technology and Computer Science (JOINTECS) INTENSIF: Jurnal Ilmiah Penelitian dan Penerapan Teknologi Sistem Informasi JIKO (Jurnal Informatika dan Komputer) JIEET (Journal of Information Engineering and Educational Technology) Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control CogITo Smart Journal IT JOURNAL RESEARCH AND DEVELOPMENT JOURNAL OF APPLIED INFORMATICS AND COMPUTING JURNAL REKAYASA TEKNOLOGI INFORMASI JURNAL TEKNIK INFORMATIKA DAN SISTEM INFORMASI JURNAL INSTEK (Informatika Sains dan Teknologi) ILKOM Jurnal Ilmiah Jiko (Jurnal Informatika dan komputer) Matrik : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer CYBERNETICS Digital Zone: Jurnal Teknologi Informasi dan Komunikasi IJID (International Journal on Informatics for Development) J-SAKTI (Jurnal Sains Komputer dan Informatika) JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Abdimas Umtas : Jurnal Pengabdian kepada Masyarakat EDUMATIC: Jurnal Pendidikan Informatika jurnal teknik informatika dan sistem informasi Jurnal Mantik NUKHBATUL 'ULUM : Jurnal Bidang Kajian Islam Jutisi: Jurnal Ilmiah Teknik Informatika dan Sistem Informasi JISKa (Jurnal Informatika Sunan Kalijaga) Buletin Ilmiah Sarjana Teknik Elektro Mobile and Forensics Journal of Innovation Information Technology and Application (JINITA) Journal of Education Informatic Technology and Science Jurnal Bumigora Information Technology (BITe) Jurnal Teknologi Informatika dan Komputer Jurnal FASILKOM (teknologi inFormASi dan ILmu KOMputer) Jurnal Computer Science and Information Technology (CoSciTech) Phasti: Jurnal Teknik Informatika Politeknik Hasnur J-SAKTI (Jurnal Sains Komputer dan Informatika) Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen Techno Engineering Science Letter Journal of Novel Engineering Science and Technology Jurnal Informatika: Jurnal Pengembangan IT
Claim Missing Document
Check
Articles

Found 6 Documents
Search
Journal : Buletin Ilmiah Sarjana Teknik Elektro

Analysis of Digital Evidence on Denial of Service (DoS) Attack Log Based Fanani, Galih; Riadi, Imam
Buletin Ilmiah Sarjana Teknik Elektro Vol 2, No 2 (2020): Agustus
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/biste.v2i2.1065

Abstract

This research is carried out an analysis and investigation of digital log file data retrieval from DoS (Denial of Service) attacks, on internet networks that have been detected by IDS (Intrusion Detection System) and using Wireshark as Tools Analysis Network. The research phase begins with the design of an experimental scenario which is often carried out daily where users access the internet network. The next stage is an attack in the form of ping flood on the target computer connected to the internet network, the final stage of data retrieval which will be analyzed later. Testing research using UAT (User Acceptance Test), to prove that the analysis has been received by the user. The results of research conducted to obtain data in the form of an attacker's IP (Internet Protocol), target IP, protocol type, the port used and the time of the attack. In the UAT test results, the obtained value of 18% of students disagrees, 58% of students agree, and 24% of students strongly agree. This research has conducted an analysis of random data attacks using Wireshark applications received by users.
Traffic Shaping Menggunakan Metode HTB (Hierarchical Token Bucket) pada Jaringan Nirkabel Budin, Shiha; Riadi, Imam
Buletin Ilmiah Sarjana Teknik Elektro Vol 1, No 3 (2019): Desember
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/biste.v1i3.1100

Abstract

Perkembangan zaman yang semakin pesat menuntut adanya layanan informasi yang lebih cepat, tepat, dan akurat menjadikan jaringan komputer sebagai kebutuhan utama. Traffic Shaping dengan Quality of Service (QoS) dapat digunakan dalam mengoptimalkan bandwidth suatu jaringan untuk menentukan jenis-jenis lalu lintas jaringan. Metode Hierarchical Token Bucket (HTB) dapat mengimplementasi pembagian trafik yang lebih akurat, dengan bandwidth yang tidak digunakan dapat dioptimalkan oleh pengguna lain. Hasil traffic shaping menggunakan metode HTB menghasilkan rata-rata indeks QoS yaitu 3,75 dan dapat dikategorikan Baik, dibandingkan sebelum menerapkan traffic shaping yaitu rata-rata 2,25 yang dikategorikan Kurang Baik. Berdasarkan hasil pengujian dapat disimpulkan bahwa kinerja jaringan hotspot dengan Traffic Shaping dan Quality of Service (QoS)  dapat meningkatkan kualitas jaringan daripada sebelumnya.The development of an increasingly rapid era requires the existence of information services that are faster, more precise, and accurate, making computer networks a primary need. Traffic Shaping with Quality of Service (QoS) can be used in optimizing the bandwidth of a network to determine the types of network traffic. The Hierarchical Token Bucket (HTB) method can implement more accurate traffic sharing, with unused bandwidth being optimized by other users. The results of traffic shaping using the HTB method produces an average QoS index of 3.75 and can be categorized Good, compared to before applying traffic shaping which is an average of 2.25 which is categorized as Poor. Based on the test results it can be concluded that the performance of hotspot networks with Traffic Shaping and Quality of Service (QoS) can improve network quality than before.
Intruder Detection Systems on Computer Networks Using Host Based Intrusion Detection System Techniques Widodo, Rio; Riadi, Imam
Buletin Ilmiah Sarjana Teknik Elektro Vol 3, No 1 (2021): April
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/biste.v3i1.1752

Abstract

The openness of access to information raises various problems, including maintaining the validity and integrity of data, so a network security system is needed that can deal with potential threats that can occur quickly and accurately by utilizing an IDS (intrusion detection system). One of the IDS tools that are often used is Snort which works in real-time to monitor and detect the ongoing network by providing warnings and information on potential threats in the form of DoS attacks. DoS attacks run to exhaust the packet path by requesting packets to a target in large and continuous ways which results in increased usage of CPU (central processing unit), memory, and ethernet or WiFi networks. The snort IDS implementation can help provide accurate information on network security that you want to monitor because every communication that takes place in a network, every event that occurs and potential attacks that can paralyze the internet network are monitored by snort.
Analysis of Digital Evidence on Denial of Service (DoS) Attack Log Based Galih Fanani; Imam Riadi
Buletin Ilmiah Sarjana Teknik Elektro Vol. 2 No. 2 (2020): Agustus
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/biste.v2i2.1065

Abstract

This research is carried out an analysis and investigation of digital log file data retrieval from DoS (Denial of Service) attacks, on internet networks that have been detected by IDS (Intrusion Detection System) and using Wireshark as Tools Analysis Network. The research phase begins with the design of an experimental scenario which is often carried out daily where users access the internet network. The next stage is an attack in the form of a ping flood on the target computer connected to the internet network, the final stage of data retrieval which will be analyzed later. Testing research using UAT (User Acceptance Test), to prove that the analysis has been received by the user. The results of research conducted to obtain data in the form of an attacker's IP (Internet Protocol), target IP, protocol type, the port used, and the time of the attack. In the UAT test results, the obtained value of 18% of students disagrees, 58% of students agree, and 24% of students strongly agree. This research has conducted an analysis of random data attacks using Wireshark applications received by users.
Traffic Shaping Menggunakan Metode HTB (Hierarchical Token Bucket) pada Jaringan Nirkabel Shiha Budin; Imam Riadi
Buletin Ilmiah Sarjana Teknik Elektro Vol. 1 No. 3 (2019): Desember
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/biste.v1i3.1100

Abstract

Perkembangan zaman yang semakin pesat menuntut adanya layanan informasi yang lebih cepat, tepat, dan akurat menjadikan jaringan komputer sebagai kebutuhan utama. Traffic Shaping dengan Quality of Service (QoS) dapat digunakan dalam mengoptimalkan bandwidth suatu jaringan untuk menentukan jenis-jenis lalu lintas jaringan. Metode Hierarchical Token Bucket (HTB) dapat mengimplementasi pembagian trafik yang lebih akurat, dengan bandwidth yang tidak digunakan dapat dioptimalkan oleh pengguna lain. Hasil traffic shaping menggunakan metode HTB menghasilkan rata-rata indeks QoS yaitu 3,75 dan dapat dikategorikan Baik, dibandingkan sebelum menerapkan traffic shaping yaitu rata-rata 2,25 yang dikategorikan Kurang Baik. Berdasarkan hasil pengujian dapat disimpulkan bahwa kinerja jaringan hotspot dengan Traffic Shaping dan Quality of Service (QoS)  dapat meningkatkan kualitas jaringan daripada sebelumnya.The development of an increasingly rapid era requires the existence of information services that are faster, more precise, and accurate, making computer networks a primary need. Traffic Shaping with Quality of Service (QoS) can be used in optimizing the bandwidth of a network to determine the types of network traffic. The Hierarchical Token Bucket (HTB) method can implement more accurate traffic sharing, with unused bandwidth being optimized by other users. The results of traffic shaping using the HTB method produces an average QoS index of 3.75 and can be categorized Good, compared to before applying traffic shaping which is an average of 2.25 which is categorized as Poor. Based on the test results it can be concluded that the performance of hotspot networks with Traffic Shaping and Quality of Service (QoS) can improve network quality than before.
Intruder Detection Systems on Computer Networks Using Host Based Intrusion Detection System Techniques Rio Widodo; Imam Riadi
Buletin Ilmiah Sarjana Teknik Elektro Vol. 3 No. 1 (2021): April
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/biste.v3i1.1752

Abstract

The openness of access to information raises various problems, including maintaining the validity and integrity of data, so a network security system is needed that can deal with potential threats that can occur quickly and accurately by utilizing an IDS (intrusion detection system). One of the IDS tools that are often used is Snort which works in real-time to monitor and detect the ongoing network by providing warnings and information on potential threats in the form of DoS attacks. DoS attacks run to exhaust the packet path by requesting packets to a target in large and continuous ways which results in increased usage of CPU (central processing unit), memory, and ethernet or WiFi networks. The snort IDS implementation can help provide accurate information on network security that you want to monitor because every communication that takes place in a network, every event that occurs and potential attacks that can paralyze the internet network are monitored by snort.
Co-Authors Abdul Fadlil Abdul Fadlil Abdullah Hanif Abdullah Hanif Achmad Nugrahantoro Achmad Syauqi Ade Elvina Adiniah Gustika Pratiwi Agung Wahyudi Agus Wijayanto Agus Wijayanto Ahmad Azhar Kadim Ahmad Luthfi Ahmad, Muhammad Sabri Aini, Fadhilah Dhinur Aji, Sukma Al Amany, Sarah Ulfah Anshori, Ikhwan Anton Yudahana Anton Yudhana Anton Yudhana ANWAR, FAHMI anwar, nuril Arif Wirawan Muhammad Arif Wirawan Muhammad Arif Wirawan Muhammad, Arif Wirawan Ariqah Adliana Siregar Arizona Firdonsyah Asno Azzawagama Firdaus Aulia, Aulia Aulyah Zakilah Ifani Bashor Fauzan Muthohirin Basir, Azhar Bernadisman, Dora Budin, Shiha Busthomi, Iqbal Deco Aprilliansyah Deco Aprilliansyah Dewi Astria Faroek Dewi Estri Jayanti Dikky Praseptian M Dwi Aryanto Eddy Irawan Aristianto Eko Brillianto Eko Handoyo Ervin Setyobudi Fadhilah Dhinur Aini Fadhilah Dhinur Aini Fahmi Anwar Fahmi Auliya Tsani Faiz Isnan Abdurrachman Fanani, Galih Fauzan Natsir Fauzan, Fauzan Firdonsyah, Arizona Fitriyani Tella Furizal Furizal Galih Fanani Galih Pramuja Inngam Fanani Guntur Maulana Zamroni Guntur Maulana Zamroni, Guntur Maulana Hafizh, Muhammad Nasir Hanif, Abdullah Helmiyah, Siti Herman Herman Herman Herman Yuliansyah Hidayati, Anisa Nur Himawan I Azmi Ikhsan Zuhriyanto Ikhwan Anshori Imam Mahfudl Nasrulloh Iqbal Busthomi Irhas Ainur Rafiq Irhash Ainur Rafiq Iwan Tri Riyadi Yanto, Iwan Tri Riyadi Izzan Julda D.E Purwadi Putra Jamalludin Jamalludin Jamalludin, Jamalludin Joko Triyanto Kusuma, Ridho Surya Luh Putu Ratna Sundari M Rosyidi Djou M. Rosyidi Djou M.A. Khairul Qalbi Miladiah Miladiah Miladiah, Miladiah Muflih, Ghufron Zaida Muh. Hajar Akbar Muhamad Caesar Febriansyah Putra, Muhamad Caesar Febriansyah Muhammad Abdul Aziz Muhammad Abdul Aziz Muhammad Abdul Aziz Muhammad Fauzan Gustafi Muhammad Ihya Aulia Elfatiha Muhammad Irwan Syahib Muhammad Yanuar Efendi Muhammad Zulfadhilah Murni Murni Mushab Al Barra Mustafa Mustafa Mustafa Mustafa NANNY NANNY Nasrulloh, Imam Mahfudl Nur Hamida Siregar Nur Widiyasono, Nur Nuril Anwar, Nuril Panggah Widiandana Prakoso, Danar Cahyo Purwanto Purwanto Purwono Purwono, Purwono Putri Annisa Raharja, Pradana Ananda Rahmat Ardila Dwi Yulianto Ramadhani, Erika Ramansyah Ramansyah Rauli, Muhamad Ermansyah Rauli, Muhamad Ermansyah Ridho Surya Kusuma Rio Widodo Riski Yudhi Prasongko Roni Anggara Putra Rusydi Umar Rusydi Umar Rusydi Umar Ruuhwan Ruuhwan Sahiruddin Sahiruddin Shiha Budin Sri Winiarti Sri Winiati Sugandi, Andi Sunardi - Sunardi Sunardi sunardi sunardi Sunardi, Sunardi Suprihatin Suprihatin Supriyanto Supriyanto Syahrani Lonang Syarifudin, Arma Takdir Ruslan Tawar Tri Lestari Tri Lestari Tri Sudinugraha Triyanto, Joko Tuska Abe Umar, Rusdy Verry Noval Kristanto W, Yunanri Wasito Sukarno Wicaksono Yuli Sulistyo Wicaksono Yuli Sulistyo WIDODO, RIO Winiati, Sri Wisnu Pranoto Yana Mulyana Yana Safitri Yudi Kurniawan Yudi prayudi Yuliansyah, Herman Yuliansyah, Herman