Claim Missing Document
Check
Articles

Found 16 Documents
Search

REVERSE ENGINEERING ANALYSIS FORENSIC MALWARE WEBC2-DIV Waliulu, Raditya Faisal; Iskandar Alam, Teguh Hidayat
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 2, No 1 (2018): Peranan Teknologi dan Informasi Terhadap Peningkatan Sumber Daya Manusia di Era
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (23.348 KB) | DOI: 10.30865/komik.v2i1.902

Abstract

At this paper focus on Malicous Software also known as Malware APT1 (Advance Persistent Threat) codename WEBC2-DIV the most variants malware has criteria consists of Virus, Worm, Trojan, Adware, Spyware, Backdoor either Rootkit. Although, malware could avoidance scanning antivirus but reverse engineering could be know how dangerous malware infect computer client. Lately, malware attack as a form espionage (cyberwar) one of the most topic on security internet, because of has massive impact. Forensic malware becomes indicator successfull user to realized about malware infect. This research about reverse engineering. A few steps there are scanning, suspected packet in network and analysis of malware behavior and dissambler body malware.Keyword : forensic malware, Analysis, Advance Presistent Threat, Cyberwar, dissambler
Reverse Engineering Analysis Statis Forensic Malware Webc2-Div Waliulu, Raditya Faisal; Alam, Teguh Hidayat Iskandar
Insect (Informatics and Security): Jurnal Teknik Informatika Vol 4, No 1 (2018): Oktober 2018
Publisher : Universitas Muhammadiyah Sorong

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (958.6 KB) | DOI: 10.33506/insect.v4i1.223

Abstract

At this paper focus on Malicious Software also known as Malware APT1 (Advance Persistent Threat) codename WEBC2-DIV the most variants malware has criteria consists of Virus, Worm, Trojan, Adware, Spyware, Backdoor either Rootkit. Although, malware could avoidance scanning antivirus but reverse engineering could be know how dangerous malware infect computer client. Lately, malware attack as a form espionage (cyberwar) one of the most topic on security internet, because of has massive impact. Forensic malware becomes indicator successful user to realized about malware infect. This research about reverse engineering. A few steps there are scanning, suspected  packet in network and analysis of malware behavior and disassembler body malware.
Deteksi dan Penggolongan Kendaraan dengan Kalman Filter dan Model Gaussian di Jalan Tol Waliulu, Raditya Faisal
JSINBIS (Jurnal Sistem Informasi Bisnis) Vol 8, No 1 (2018): Volume 8 Nomor 1 Tahun 2018
Publisher : Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (724.907 KB) | DOI: 10.21456/vol8iss1pp1-8

Abstract

Monitoring systems are widely implemented in various sectors aimed at improving the security and productivity aspects. The research aims to detect moving objects in the form of video file tipefile (* .avi) 640x480 resolution and image class according to pixel area. Moving objects are given in the Region of Interest path for easy detection. Detection on moving objects using methods of Kalman filter and gaussian mixture model. There are two types of distribution, the distribution of Background and Foreground. The form of the Foreground distribution is filtered using Bit Large Object segmentation to obtain the dimensions of the vehicle and morphological operations. The feature extraction results from the vehicle are used for vehicle classification based on pixel dimension. Segmentation results are used by Kalman Filter to calculate the tracking of moving object positions. If the Bit Large Object segmentation is not found moving object, then it is continued on the next frame. The final results of system detection are calculated using Positive True validation, True Negative, False Positive, and False Negative by looking for the sensitivity and specificity of each morning, day and night conditions
Reverse Engineering Analysis Forensic Malware WEBC2-DIV Waliulu, Raditya Faisal; Iskandar Alam, Teguh Hidayat
Sinkron : Jurnal dan Penelitian Teknik Informatika Vol 3 No 1 (2018): SinkrOn Volume 3 Nomor 1, Periode Oktober 2018
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1101.03 KB)

Abstract

At this paper focus on Malicous Software also known as Malware APT1 (Advance Presistent Threat) codename WEBC2-DIV the most variants malware has criteria consists of Virus, Worm, Trojan, Adware, Spyware, Backdoor either Rootkit. Although, malware could avoidance scanning antivirus but reverse engineering could be know how dangerous malware infect computer client. Lately, malware attack as a form espionage (cyberwar) one of the most topic on security internet, because of has massive impact. Forensic malware becomes indicator sucessfull user to relized about malware infect. This research about reverse engineering. A few steps there are scanning, suspected packet in network and analysis of malware behavior and dissambler body malware.
Decision Support System Development Based On Android Using Analytical Hierarchy Process (AHP) Method For Determining The Middle Small Business Development Priority In Sorong City Luluk Suryani; Raditya Faisal Waliulu; Ery Murniyasih
Electro Luceat Vol 5 No 2 (2019): Electro Luceat (JEC) - November 2019
Publisher : LPPM Poltek ST Paul

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (431.205 KB) | DOI: 10.32531/jelekn.v5i2.152

Abstract

Usaha Kecil Menengah (UKM) is one of the economic drivers of a region, including the City of Sorong. UKM in Sorong City have not yet developed optimally. There are several causes including those concerning financial, location, raw materials and others. To solve these problems, researchers are encouraged to develop applications that can help determine the priorities of UKM in accordance with the conditions of business people. In this study, the Analytical Hierarchy Process (AHP) method will be used for decision making. AHP method was chosen because it is able to select and determine the best alternative from a number of available alternatives. In this case the intended alternative is the best UKM that can be chosen by businesses in accordance with predetermined criteria. The study was conducted by finding the weight value for each attribute, then ranking process will determine the optimal alternative, namely UKM. Decision Support System application developed based on Android, where users will easily use it at any time if there is a change in weights on the criteria or intensity. The final results show that the AHP method was successfully applied to the UKM Development Priority Determination Application.
PERANCANGAN DAN IMPLEMENTASI SISTEM INFORMASI JASA PENITIPAN PAKET BERBASIS WEBSITE MENGGUNAKAN FRAMEWORK BOOTSTRAP (Studi Kasus Anbiya Jastip) Luluk Suryani; Raditya Faisal Waliulu
Electro Luceat Vol 7 No 2 (2021): Electro Luceat (JEC) - November 2021
Publisher : LPPM Poltek ST Paul

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32531/jelekn.v7i2.415

Abstract

Anbiya Jastip is an individual business engaged in the service sector. This service provides storage and delivery of packages between islands using ships. The delivery process at Anbiya's custody service, where the customer sends the package directly or through the market place to the storage address in Surabaya, Jakarta or Makassar then all packages will be sent to Sorong City via ship expedition. In one delivery, Anbiya Jastip can get hundreds of packages. This ship storage service business is in great demand by customers because the shipping costs can be cheaper and there is no minimum weight of goods applied. Such a great opportunity to continue to develop in Anbiya Jastip is not supported by the system because the recording and tracking of goods is still done manually where some are handwritten and some are recorded using Microsoft Word. The system to find out shipping costs is also ineffective because customers have to download several images to find the name and service fees that must be paid. The emergence of new care services is also a challenge for Anbiya Jastip to continue to innovate. These problems encourage researchers to design and establish information systems as a medium for recording, tracking and calculating every transaction made as well as a media for promotion. The system will be made website-based with the Bootstrap framework so that it is dynamic when accessed via a desktop or smartphone. The prototype will be designed using the Rapid Applications Development (RAD) method and testing will be carried out using BlackBox Testing.
Membangun Swadaya Free Open Source Editing Film Kdenlive Bagi Siswa Sekolah Menengah Kejuruan 1 Kabupaten Sorong Raditya Faisal Waliulu; Muhammad Syahrul Kahar
Aksiologiya: Jurnal Pengabdian Kepada Masyarakat Vol 2, No 1 (2018): Februari
Publisher : Universitas Muhammadiyah Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (721.549 KB) | DOI: 10.30651/aks.v2i1.1187

Abstract

  Acronym FOSS is a free open source software. The FOSS program is a license that allows users to run the program freely for any purpose, modify the program as desired and also distribute copies of the original version or modified version freely, which is why select open source from closed source. Closed-source software is sometimes pressed to build in the background or other unwanted and secret features into the software. Instead of having to trust users of FOSS software vendors can check and verify the source code itself and can put trust in the community of volunteers and users. FOSS is not equivalent to priceless software, it's more like a command for open-source software with freedom granted at various levels (depending on license). For this, the license does not need to be included in the list, If the software follows the Open Source command and the license is compatible then at least one of the Open Source licenses. Student involvement in SMK Negeri 1 Kabupaten Sorong is the best place to give advice about FOSS because it is one of the favorite schools in Sorong regency.  
PROTOTYPE DETEKSI OBJEK MENGGUNAKAN RASPBERRY PI MELALUI MODUL SENSOR ULTRASONIK HC-SR04 Raditya Faisal Waliulu; Arizal Hendriawan; Agus Pramono; Supardi Supardi
JPB : Jurnal Patria Bahari Vol. 1 No. 2 (2021): JPB: NOVEMBER 2021
Publisher : PPPM POLTEKPEL SORONG

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (817.207 KB) | DOI: 10.54017/jpb.v1i2.22

Abstract

Pendekatan deteksi objek yang dilakukan oleh radar pada perkapalan sangat intuitif dan sensitif terhadap benda yang berada dalam wilayah terjangkau sensor aktif. Menjadi suatu hal yang sangat bermanfaat, crew kapal memantau 24 Jam / 7 hari perjalanan menuju destinasi dermaga berikutnya. Sensor deteksi sangat peka terhadap wilayah yang terjangkau akan memberikan peringatan berupa sirene jika didepan terdapat halang rintang. Untuk segera menghindari atau memperlambat perjalanan kapal. Penulis membuat peneliti sebagai simulasi implementasi deteksi kapal dibuat menggunakan raspberry sebagai single board computer atau papan tunggal komputer sebagai otak sistem bekerja. Prototype ini menggunakan sensor ultrasonik HC-SR04 yang digerakan dengan 1 motor servo, dipilih sensor ultrasonic HC-SR04 tersebut karena memiliki spesifikasi yang memadai. Hasil dari pengukuran objek ditampilkan dengan aplikasi pemograman python. Dari hasil pengujian alat yaitu mampu mendeteksi objek antara 5 cm dari depan radar dan jarak maksimum 30 cm dan diperoleh tingkat kesalahan pengukuran jarak dan ketinggian sebesar 1 – 3 cm sedangkan untuk sudut 2o s/d 5o.
Reverse Engineering Reverse Engineering Analysis Forensic Malware WEBC2-Div Raditya Faisal Waliulu
Journal of INISTA Vol 1 No 1 (2018): September 2018
Publisher : LPPM INSTITUT TEKNOLOGI TELKOM PURWOKERTO

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20895/inista.v1i1.10

Abstract

At this paper focus on Malicious Software also known as Malware APT1 (Advance Persistent Threat) codename WEBC2-DIV the most variants malware has criteria consists of Virus, Worm, Trojan, Adware, Spyware, Backdoor either Rootkit. Although, malware could avoidance scanning antivirus but reverse engineering could be know how dangerous malware infect computer client. Lately, malware attack as a form espionage (cyberwar) one of the most topic on security internet, because of has massive impact. Forensic malware becomes indicator successful user to realized about malware infect. This research about reverse engineering. A few steps there are scanning, suspected packet in network and analysis of malware behavior and disassembler body malware.
Reverse Engineering Analysis Statis Forensic Malware Webc2-Div Raditya Faisal Waliulu; Teguh Hidayat Iskandar Alam
Insect (Informatics and Security): Jurnal Teknik Informatika Vol. 4 No. 1 (2018): Oktober 2018
Publisher : Universitas Muhammadiyah Sorong

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33506/insect.v4i1.223

Abstract

At this paper focus on Malicious Software also known as Malware APT1 (Advance Persistent Threat) codename WEBC2-DIV the most variants malware has criteria consists of Virus, Worm, Trojan, Adware, Spyware, Backdoor either Rootkit. Although, malware could avoidance scanning antivirus but reverse engineering could be know how dangerous malware infect computer client. Lately, malware attack as a form espionage (cyberwar) one of the most topic on security internet, because of has massive impact. Forensic malware becomes indicator successful user to realized about malware infect. This research about reverse engineering. A few steps there are scanning, suspected  packet in network and analysis of malware behavior and disassembler body malware.