Claim Missing Document
Check
Articles

Found 5 Documents
Search

ANALISIS FORENSIK METAROUTER PADA LALU LINTAS JARINGAN KLIEN Firmansyah, Firmansyah; Fadlil, Abdul; Umar, Rusydi
Edu Komputika Journal Vol 6 No 2 (2019): Edu Komputika Journal
Publisher : Jurusan Teknik Elektro Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/edukomputika.v6i2.35221

Abstract

Seorang pengusaha atau penyedia jasa di dunia jaringan internet, tentu akan menemukan klien dengan karakter yang berbeda. Klien yang tidak buta teknologi yang khususnya router, terkadang menginginkan akses penuh ke router, atau beberapa dari klien yang meminta untuk menambahkan router untuk dapat secara langsung mengakses router secara penuh. Sebagai pengusaha layanan internet bisa saja memberikan router tambahan, namun tentu akan menambah biaya sesuai harga router. Beberapa kasus lain, misalnya sesorang klien akan membuat sebuah laboratorium jaringan komputer, maka akan sangat membutuhkan router yang banyak. Router, saat ini semakin canggih, dengan adanya metarouter, akan dapat menghemat biaya yang keluar. Metarouter memungkin klien untuk mengolah jaringan sendiri, seolah-olah klien memiliki router.  Kasus yang terjadi mebuktikan bahwa router sangatlah penting untuk membagi atau mendistribusikan IP address, baik secara statik maupun dinamik. Forensik jaringan berfungsi untuk merekam kejadian atau aktifitas lalu lintas data pada jaringan komputer, dengan melakukan analisa dari hasil investigasi yang didapat, sehingga menemukan sebuah bukti aliran paket yang mencurigakan. Log aktifitas jaringan dapat menyimpan beberapa informasi yang sangat penting dalam mengungkap terjadinya ancaman atau serangan terhadap jaringan komputer. Lalu lintas jaringan dapat mengungkapkan tindakan kriminal dengan cara melihat kembali log. Aplikasi Wireshark dapat melihat paket data yang sedang berjalan secara langsung.
Identification of Forensic Evidence for Virtual Router Networks Using the National Institute of Standard and Technology (NIST) Method Firmansyah Yasin; Abdul Fadlil; Rusydi Umar
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 1 (2021): Februari 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1035.568 KB) | DOI: 10.29207/resti.v5i1.2784

Abstract

The evolution information technology has led to the growth of virtualization technology. Router OS is the operating system of the Mikrotik Router, which supports virtualization. Router Os virtualization technique which is easy to run is a metarouter. Metarouter provides benefits such as, building virtual servers, virtual machines, network topology and savings cost. As an object of research, Metarouter introduces challenges to digital forensic investigations, both practitioners and academics. Investigators need to use methodology and tools in order to prove the perpetrators of crimes. This study uses the Windump forensic tool as a means of recording network traffic activity. Network Miner and Wireshark as an analytical tool for identifying digital evidence. The use of the National Institute of Standard and Technology (NIST) method which collection, examination, analysis and reporting, can be repeated and maintained with the same data. Based on experiments with virtual router network traffic testing, the system built has succeeded in obtaining digital evidence, either by direct or indirectly. The system scenario that has been planned succeeded recording 220494 packages, but by the Windump, it is automatically divided into 9 (nine) parts of the package which are Buktidigital0 to Buktidigital8. The inspection stage produces evidence that has been verified by Wireshark and Network Miner. The analysis stage proves that there were attacks carried out by addresses 192.168.10.10 and 192.168.234.10. Based on the results of forensic testing, the use of the NIST method on a forensic system that has been built with a virtual router object can be used by investigators to identify evidence of cyber-attacks.
Analisis Simulasi Mitigasi Ancaman ARP Dan Round Trip Time Pada Lalu Lintas DHCP VTP Firmansyah Firmansyah; Yusuf Hendra Pratama
Progresif: Jurnal Ilmiah Komputer Vol 19, No 1: Februari 2023
Publisher : STMIK Banjarbaru

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35889/progresif.v19i1.1086

Abstract

Round-Trip Time (RTT) is the total amount of time it takes to send the signal plus the total amount of time the signal acknowledges to receive. Communication between computers using a Local Area Network (LAN) computer network is still used today, but VLAN (Virtual Local Area Network) computer network technology can provide better results compared to LAN computer networks, but each data transmission uses the Address Resolution protocol. Protocol (ARP) that functions to find devices from origin to destination addresses. Testing the implementation of Static VTP (VLAN Trunking Protocol) and DHCP VTP was pinged 5 (five) times on Internet Protocol (IP) with the same host. On the DHCP VTP network, the maximum average time for sending data is 5.3ms, while on Static VTP, the average maximum time for sending data is 6.1ms, which means that the time for sending data on the DHCP VTP network is 0.8ms faster. ARP (Address Resolution Protocol) threat mitigation analysis results, that the established DHCP VTP network ensures that only valid ARP requests and responses will be forwarded.Keyword: Round-Trip Time; Address Resolution Protocol; Virtual Local Area Network; Dinamyc Host Configuration Protocol; PingAbstrakRound-Trip Time (RTT) adalah jumlah total waktu untuk mengirim sinyal ditambah jumlah total waktu yang diakui sinyal yang diterima. Komunikasi antar komputer menggunakan jaringan komputer Local Area Network (LAN) masih digunakan hingga saat ini, namun teknologi jaringan komputer VLAN (Virtual Local Area Network) dapat memberikan hasil yang lebih baik di bandingkan dengan jaringan komputer LAN, namun setiap pengiriman data menggunakan protokol Address Resolution Protocol (ARP) yang berfungsi untuk menemukan perangkat dari alamat asal ke tujuan. Pengujian penerapan Static VTP (VLAN Trunking Protocol) dan DHCP VTP dilakukan pinging sebanyak 5 (lima) kali pada Internet Protocol (IP) dengan host yang sama. Pada jaringan DHCP (Dinamyc Host Configuration Protocol) VTP menghasilkan rata-rata waktu maksimal pengiriman data adalah 5.3ms sedangkan pada Static VTP menghasilkan rata-rata waktu maksimal pengiriman data mencapai 6.1ms, yang artinya waktu untuk pengiriman data pada jaringan DHCP VTP lebih cepat 0.8ms. Analisis mitigasi ancaman ARP (Address Resolution Protocol) menghasilkan, bahwa jaringan DHCP VTP yang dibangun memastikan bahwa hanya permintaan dan respons ARP yang valid yang akan diteruskan.Kata kunci: Round-Trip Time; Address Resolution Protocol; Virtual Local Area Network; Dinamyc Host Configuration Protocol; Ping.
Sistem Pakar Diagnosa dan Troubleshooting Kerusakan Website Menggunakan Metode Dempster-Shafer Yusuf Hendra Pratama; Firmansyah Firmansyah
Jurnal Bumigora Information Technology (BITe) Vol 5 No 1 (2023)
Publisher : Prodi Ilmu Komputer Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/bite.v5i1.2933

Abstract

Background: Website troubleshooting is the process of identifying, analyzing, and solving a website’s problems. The problem in this study is the lack of information and the length of time in knowing the website damage, so users have difficulty troubleshooting. Objective: The purpose of the research is to create an expert system that can be used to diagnose website damage and is easily accessible. Methods: The method used in this research was the Dempster-Shafer method, which is a method of proof based on the belief function and plausible reasoning in combining evidence to calculate the probability of damage to the website. Result: The results of this study were an expert system for diagnosing website crashes which had 15 symptoms and 5 crashes. The developed system showed an accuracy value of 84% with a trial run of 25 cases. Conclusion: The resulting expert system can be used to diagnose website damage based on symptoms with a good degree of accuracy.
PENDAMPINGAN KEBERLANJUTAN USAHA BERBASIS APLIKASI AKUNTANSI Halpiah Halpiah; Hery Astika Putra; Apriliya Yudistira; Baiq Qistinnisa; Firmansyah Firmansyah; Muhammad Ziad Iqbal
JMM (Jurnal Masyarakat Mandiri) Vol 7, No 6 (2023): Desember [Dalam Proses]
Publisher : Universitas Muhammadiyah Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31764/jmm.v7i6.19449

Abstract

Abstrak: PKM bertujuan untuk menungkatkan pengetahuan bisnis, kemampuan penyusuanan laporan keuangan sesuai SAK-EMKM berbasis aplikasi akuntansi VBA Macro, yang di mulai dari tahap perancangan kegiatan dengan metode observasi, wawancara, tahap pelaksaan dengan metode edukasi, pendampingan dan tahap eveluasi metode perbandingan persentase tingkat keberhasilan sebelum dan sesudah kegiatan PKM, dengan hasil pengetahuan bisnis mitra meningkat dari 45% menjadi 95% dan kemauan dan kemampuan membuat pencatatan akuntansi serta menyusun laporan keuangan sesuai SAK-EMKM menggunakan aplikasi akuntansi VBA Macro meningkat dari 40% menjadi 90%.Abstract: PKM aim to increase business knowledge and the ability to prepare financial reports according to SAK-EMKM based on the VBA Macro accounting application, starting from the activity design stage using the observation, interview method, the implementation stage using the education method, mentoring and the evaluation stage using the percentage comparison method. success rate before and after PKM activities, with the result that partners' business knowledge increased from 45% to 95% and the willingness and ability to make accounting records and prepare financial reports according to SAK-EMKM using the VBA Macro accounting application increased from 40% to 90%.