Claim Missing Document
Check
Articles

Found 11 Documents
Search

The Efficiency of Requesting Process for Formal Business-Documents in Indonesia: An Implementation of Web Application Base on Secure and Encrypted Sharing Process Setyawan, Aris Budi; Tarigan, Avinanta; Sussanto, Herry
The Asian Journal of Technology Management (AJTM) Vol 7, No 2 (2014)
Publisher : School of Business and Management Institut Teknologi Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In recent business practices, the need of the formal document for business, such as the business license documents, business domicile letters, halal certificates, and other formal documents, is desperately needed and becomes its own problems for businesses, especially for small and medium enterprises. One stop service unit that was conceived and implemented by the government today, has not been fully integrated yet. Not all permits (related with formal document for business) can be completed and finished in one place, businesses are still have to move from one government department to another government department to get a formal document for their business. With these practices, not only a lot of the time and cost will be sacrificed, but also businesses must always fill out a form with the same field. This study aims to assess and identify the problem, especially on applying the formal document for business, and use it as inputs for the development of a web application based on secure and encrypted sharing process. The study starts with a survey of 200 businesses that have applied the formal document for their business, to map the initial conditions of applying the formal document for business in Indonesia . With these applications that are built based on these needs, it is expected that not only the time, cost, and physical effort from both parties are becoming more efficient, but also the negative practices of bureaucratic and economic obstacles in business activities can be minimized, so the competitiveness of business and their contribution for national economy will increase.Keywords : Formal documents, Efficiencies, Web application, Secure and encrypted sharing process, SMEs
PEMERINGKATAN RISIKO KEAMANAN SISTEM JARINGAN KOMPUTER POLITEKNIK KOTA MALANG MENGGUNAKAN CVSS DAN FMEA Retna Mulya, Betta Wahyu; Tarigan, Avinanta
ILKOM Jurnal Ilmiah Vol 10, No 2 (2018)
Publisher : Program Studi Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (652.184 KB)

Abstract

The vulnerability of a computer network system is a weakness, lack or hole in the system, which can be exploited by attackers to carry out an attack that may endanger the confidentiality, integrity or availability of a system. The filling process requires a security vulnerability analysis according to the severity to determine the priority scales of handling. The analysis used in determining priority scales of handling is the combination of CVSS and FMEA-based analysis method. The analysis result from both methods shows that the numbers of risk priority and vulnerability become a benchmark in risk prioritizing and mitigation the risk to Politeknik Kota Malang party, with the priority order: ‘Singa’, ‘Sierra’, ‘Dino’, and ‘Leopard’. The priority scales show that the vulnerability levels, that must be handled, have number range between 40% up to 60%. The combination of CVSS and FMEA methods can determine the handling level based on the potential impacts caused by the vulnerability in computer network system of Politeknik Kota Malang.
PROTOKOL AUTENTIKASI BERBASISONE TIME PASSWPORD UNTUK BANYAK ENTITAS Avinanta Tarigan 1 Avinanta Tarigan, Avinanta Tarigan
Prosiding KOMMIT 2012
Publisher : Prosiding KOMMIT

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

One-time-password (OTP) adalah salah satu metodeautentikasi yang aman untuk duaentitas, tetapimenjadi tidak efisien ketika diterapkan kepada banyak entitas. Beberapa penelitian telah menghasilkan protokol autentikasi berbasis OTP yang efisien, tetapi verifikasi formal tidak dilakukan sehinggatidak diketahui adanya kelemahan dalam protokol tersebut. Penelitian ini menghasilkan sebuah protokol autentikasi berbasis OTPyang lebih efisien dan dapat digunakan untuk proses autentikasi banyak entitas.Dengan menggunakan3 (tiga) langkah autentikasi dan tanpa menggunakan kriptografi yangmemerlukan daya komputasi tinggi, autentikasi antara entitas dapat tercapai. Protokolini diverifikasi secara formal untuk membuktikan keamanan dan tidak adanya kelemahan dalam protokol tersebut.
ANALISIS DAN VERIFIKASI FORMAL PROTOKOL NON-REPUDIASI ZHANG-SHI DENGAN LOGIKA SVO-CP Permatasari, Hanum Putri; Tarigan, Avinanta; Pardede, D. Lucia Crispina
Prosiding KOMMIT 2012
Publisher : Prosiding KOMMIT

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Protokol non-repudiasi adalah protokolkeamananyang memberikan layanan Non-Repudiation of Origin (NRO) dan Non-Repudiation of Receipt(NRR). Protokol non repudiasi yang memenuhi kedualayanan tersebut tanpa memberi keuntungan lebih kepada satu prinsipal daripadaprinsipal lainmerupakan protokolyangmemenuhiaspek fairness. Protokol [Zhang and  Shi, 1996]  adalah protokol yang seharusnya mengamankan transaksi elektronik dalam konteks non-repudiasi. Berdasarkan penelitian terdahulu mengenai verifikasi protokolnon-repudiasi ZS dengan metode formal logika [Coffey and Saidha, 1997]yang dilakukan oleh [Ventuneac, 2004]menunjukkan bahwa hasil verifikasi protokol tidakdapat digunakan untuk menguji ketercapaian tujuan akhir (goal) serta tidak mengujifairness. Tujuan utama dari penelitian ini adalah melakukan analisis dan verifikasi formal terhadap protokolnon-repudiasi Zhang-Shi dengan menggunakan logika SVO-CP untuk mengetahui kehandalan protokol tersebut dalammemenuhi sifat non-repudiasi, yaitu NRO, NRR, dan fairness. Prosedur penelitian dilakukan dalam empat tahap dan hasil menunjukan bahwa protokol non-repudiasi Zhang-Shi mencapai kebenaran semua tujuannya (NRO dan NRR) serta penerapan logika SVO-CP kepada verifikasi protokol non-repudiasi Zhang-Shi menunjukkan protokol tersebut mencapaifairness.
UGLEO: A WEB BASED INTELLIGENCE CHATBOT FOR STUDENT ADMISSION PORTAL USING MEGAHAL STYLE Siswadi, Anneke Annassia Putri; Tarigan, Avinanta
Jurnal Ilmiah Informatika Komputer Vol 23, No 3 (2018)
Publisher : Universitas Gunadarma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35760/ik.2018.v23i3.2373

Abstract

To fulfill the prospective student's information need about student admission, Gunadarma University has already many kinds of services which are time limited, such as website, book, registration place, Media Information Center, and Question Answering’s website (UG-Pedia). It needs a service that can serve them anytime and anywhere. Therefore, this research is developing the UGLeo as a web based QA intelligence chatbot application for Gunadarma University's student admission portal. UGLeo is developed by MegaHal style which implements the Markov Chain method. In this research, there are some modifications in MegaHal style, those modifications are the structure of natural language processing and the structure of database. The accuracy of UGLeo reply is 65%. However, to increase the accuracy there are some improvements to be applied in UGLeo system, both improvement in natural language processing and improvement in MegaHal style.
A SOCIALLY CONSTRUCTED TRADING INFRASTRUCTURE FOR DECENTRALIZED P2P NETWORKS Tarigan, Avinanta
Jurnal Ilmiah Informatika Komputer Vol 11, No 2 (2006)
Publisher : Universitas Gunadarma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This paper proposes a framework that enables P2P users to trade for mutual benefit. The transaction system is based on the concept of so-called institutional facts to socially present accounts of finances as well as to govern the transaction. Set of protocols are developed as implementation of the transaction concept which utilizes distributed cryptography to achieve mutual authentication. Finally, an architecture of trading network is proposed. It is built as overlay network which utilizes existing P2P network for searching and delivery infrastructure.Keywords : P2P, decentralized, community, trading, transactions, institutional facts, distributed cryptography, web service 
Modeling of HTTP Request with Regular Expression for Slow HTTP DoS Attack Detection nfn Ramlan; Avinanta Tarigan
Jurnal Pekommas Vol 4, No 1 (2019): April 2019
Publisher : BBPSDMP KOMINFO MAKASSAR

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1647.211 KB) | DOI: 10.30818/jpkm.2019.2040104

Abstract

The availability of Web Service is the most important thing to be guaranteed, but there are many threats to the Web Service particularly from the internet, one of the famous methods is Slow HTTP DoS Attack. There are many research projects about this topic before, but there is always the possibility to increase the accuracy rate and minimizing the False Positive Rate and should be considered to use it at the small and medium scale of network infrastructure. In this research, another IDS method was used to find a better result for Slow HTTP DoS Attack detection through modeling HTTP Request based on Regular Expression. Detection patterns made from HTTP Request Traffic of some popular Web Browsers then looked for the similarity of the HTTP Request Traffic using Needleman Wunsch algorithm. This pattern was negated at the important part of HTTP Request headers, then converted to Regular Expression. New Pattern in Regular Expression was inserted to the L7-Filter that part of Netfilter. This method has been proved to detect Slow HTTP DoS Attack with 100% accuracy and False Positive Rate 0%.
PEMERINGKATAN RISIKO KEAMANAN SISTEM JARINGAN KOMPUTER POLITEKNIK KOTA MALANG MENGGUNAKAN CVSS DAN FMEA Betta Wahyu Retna Mulya; Avinanta Tarigan
ILKOM Jurnal Ilmiah Vol 10, No 2 (2018)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v10i2.311.190-200

Abstract

The vulnerability of a computer network system is a weakness, lack or hole in the system, which can be exploited by attackers to carry out an attack that may endanger the confidentiality, integrity or availability of a system. The filling process requires a security vulnerability analysis according to the severity to determine the priority scales of handling. The analysis used in determining priority scales of handling is the combination of CVSS and FMEA-based analysis method. The analysis result from both methods shows that the numbers of risk priority and vulnerability become a benchmark in risk prioritizing and mitigation the risk to Politeknik Kota Malang party, with the priority order: ‘Singa’, ‘Sierra’, ‘Dino’, and ‘Leopard’. The priority scales show that the vulnerability levels, that must be handled, have number range between 40% up to 60%. The combination of CVSS and FMEA methods can determine the handling level based on the potential impacts caused by the vulnerability in computer network system of Politeknik Kota Malang.
Analisis dan Optimasi Serangan Padding Oracle Ravi Dharmawan; Avinanta Tarigan
Jurnal Ilmiah Komputasi Vol. 21 No. 2 (2022): Jurnal Ilmiah Komputasi Volume: 21 No. 2, Juni 2022
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32409/jikstik.21.2.3056

Abstract

Kriptografi sudah menjadi kebutuhan sehari-hari untuk mengamankan data dari pihak yang tidak bertanggung jawab. CBC (Cipher Block Chaining ) merupakan salah satu mode dalam kriptografi block cipher yang sering digunakan dalam pengembangan aplikasi. Padding Oracle Attack merupakan salah satu serangan yang dapat digunakan oleh attacker untuk melakukan proses enkripsi dan dekripsi tanpa mengetahui kuncinya sama sekali. Hal ini ter- jadi karena tidak ada proses validasi sebelum melakukan proses dekripsi apakah yang akan didekripsi ciphertext yang valid atau tidak. Padding Oracle Attack dapat dioptimasi dengan melakukan implementasi multiprocessing . Tujuan dari penelitian ini adalah menganalisis men- gapa Padding Oracle Attack bisa terjadi dan bagaimana cara melakukan optimasi Padding Oracle Attack . Hasil yang didapat menunjukan bahwa, dengan mengimplementasikan mul- tiprocessing maka durasi serangan Padding Oracle Attack bisa menjadi dua kali lebih cepat dibanding tidak menggunakan multiprocessing
RANCANG BANGUN SISTEM PENERBITAN SERTIFIKAT KOMPETENSI SEBAGAI ASET NON-FUNGIBLE-TOKEN (NFT) BERBASIS BLOCKCHAIN DAN WEB3 Avinanta Tarigan
Jurnal Ilmiah Informatika Komputer Vol 27, No 3 (2022)
Publisher : Universitas Gunadarma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35760/ik.2022.v27i3.7787

Abstract

Surat Keterangan Pendamping Ijazah (SKPI) sangat berharga bagi para lulusan perguruan tinggi yang sedang mencari pekerjaan, oleh karena itu rentan terhadap pemalsuan dan manipulasi. Blockchain merupakan teknologi basis data terdistribusi yang mendukung integritas data, keterbukaan, dan ketelurusuran. Teknologi ini tepat digunakan untuk mencatat dan menyimpan surat berharga sebagai suatu aset digital yang bersifat terbuka dan interoperable. Untuk itu standard ERC721 digunakan untuk merepresentasikan SKPI sebagai Non Fungible Token. Penelitian ini membangun sistem penerbitan SKPI sebagai aset digital dalam standar NFT yang membutuhan ekosistem pengembangan teknologi Web3. Sistem berhasil dibangun, diimplementasikan, dan diujicobakan pada sebuah jaringan blockchain (Test-Net).