cover
Contact Name
Dewi Ratnaningsih
Contact Email
dewi.ratnaningsih@umko.ac.id
Phone
+6281997112904
Journal Mail Official
jurnal@umko.ac.id
Editorial Address
-
Location
Kab. lampung utara,
Lampung
INDONESIA
SIENNA
ISSN : 2745987X     EISSN : 27459861     DOI : https://doi.org/10.47637/sienna.v1i2
The Journal of Information Systems and Technology (SIENNA) has been published by the Faculty of Engineering and Computer Science (FTIK), University of Muhammadiyah Kotabumi (UMKO) since July 2020. SIENNA contains manuscripts of research results in the fields of Information Systems, Information Technology, and Computer Science. SIENNA is committed to publishing quality articles in Indonesian so that they can become the main reference for researchers in the fields of Information Systems, Information Technology and Computer Science.
Articles 36 Documents
XSS Attack Detection and Mitigation Using Multi-Layer Security Mechanism (MLSM) Hartono; Sriyanto
Sienna Vol 3 No 2 (2022): Sienna Volume 3 Nomor 2 Desember 2022
Publisher : LPPM Universitas Muhammadiyah Kotabumi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

BSSN stated that there were 12.9 million cyber threats in Indonesia during 2018. In January - April 2020, the number of cyber-attacks increased. In those four months, the number of cyberattacks reached 88 million. The methods, applications, and attack techniques used cannot be identified easily. However, according to data from the OWASP Top Ten in 2017 and 2021 (statistics-based proposal), there are 10 website security vulnerabilities that are most often exploited. XSS is one of the security holes included in the list. In addition to being a loophole that is often found, the impact of XSS is very fatal, because it allows attackers to do account takeovers, theft of personal data, and so on. There are several studies that have implemented mechanisms to detect and mitigate XSS attacks. However, the implementation has not yet obtained effective and holistic results. The mechanism tested by previous research still leaves a security problem that allows attackers to execute XSS attacks. One of the things that cause this problem is the use of a single-layer security mechanism. Therefore, the purpose of this study is to test the effectiveness of the multi-layer security (MLSM) mechanism in detecting and mitigating XSS attacks. MLSM consists of five layers, namely OWASP ModSecurity, Framework/CMS Security Feature, HTTP Middleware, Templating Engine, and Data Sanitizer. To test the security level of MLSM, the researchers conducted a simulation of attacks using the Arachni and ZAP applications on a sample website that had 170 XSS security vulnerabilities. Based on test attacks on non-MLSM websites, Arachni successfully executed 168 of 170 (98.82%), and ZAP executed 103 of 170 (60.58%) XSS attacks. However, after implementing the MLSM feature on the website, Arachni and ZAP attacks failed to perform XSS attacks, both stored, reflected, and DOM-based XSS. There is no single type of XSS attack that can be carried out on MLSM websites
Perancangan dan Implementasi Sistem Pendataan Kasus Tindak Pidana Ryan Aji Wijaya; Angga Dri Hananto; Adimas Rexsi Saputra
Sienna Vol 3 No 2 (2022): Sienna Volume 3 Nomor 2 Desember 2022
Publisher : LPPM Universitas Muhammadiyah Kotabumi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

North Lampung Police has a vision of realizing a professional, moral, modern, superior and trustworthy Police Police of North Lampung in order to support the creation of a sovereign, independent and personable Indonesia based on mutual cooperation. And to realize this vision, the North Lampung Police have several missions, one of which is to realize the sustainable use of technology and police data systems that are integrated in the North Lampung Police Station area, which is supported by scientific studies and studies, in order to further optimize the performance of the Police. Based on the results of the competition above, the researcher won 3rd place with the title "Collecting Criminal Cases". The prototype that was produced from the competition, the researchers implemented it in the form of research with the title "Design and implementation of a data collection system for criminal cases". To solve this problem, the researcher used the prototype method. With steps 1. Listening to user needs, 2. Designing samples or Mock-ups, 3. Testing samples or Mock-ups. From the results of testing applications by users in the form of admin login pages, admin menu pages, user list pages on admins, investigator data pages on admins, user login pages, user menu pages, and case addition pages by users, it can be concluded that the data collection application for criminal cases runs smoothly. good.
Deteksi dan Mitigasi Serangan Backdoor Menggunakan Python Watchdog Susilo Hartono; Hartono Hartono; Khusnul Khotimah
Sienna Vol 3 No 1 (2022): Sienna Volume 3 Nomor 1 Juli 2022
Publisher : LPPM Universitas Muhammadiyah Kotabumi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The number of cyber attacks is increasing. This happens thoroughly, both at the international and national levels. Technology, techniques, and methods of carrying out cyber attacks are also increasingly sophisticated and up-to-date. Responding to this phenomenon, this research was conducted to implement an application for detecting and mitigating backdoor-based attacks using Python Watchdog. The method used in this study is the experimental method. This research is a case study of backdoor attacks that have been experienced by Universitas Muhammadiyah Kotabumi. In August – December 2021, one of the servers owned by Universitas Muhammadiyah Kotabumi received a significant backdoor-based attack. This research implements Python Watchdog to detect foreign files that are indicated as a backdoor, then sends notifications. Referring to the notification, the administrator can take further action. Based on the research that has been done, Python Watchdog is proven to overcome backdoor attacks. Once Python Watchdog is enabled, backdoor attacks are no longer possible.
PENENTUAN PENERIMA BANTUAN BEDAH RUMAH MENGGUNAKAN METODE SIMPLE ADDITIVE WEIGHTING (SAW) DAN TECHNIQUE FOR OTHERS REFERENCES BY SIMILARITY TO IDEAL SOLUTION (TOPSIS) M. Abu Jihad Plaza R
Sienna Vol 3 No 1 (2022): Sienna Volume 3 Nomor 1 Juli 2022
Publisher : LPPM Universitas Muhammadiyah Kotabumi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Bantuan bedah rumah pada Kelurahan Kampung Kaliawi Waykanan di mulai dari tiap-tiap RT, Selama ini lurah yang menentukan berhak dan tidaknya keluarga untuk mendapatkan bantuan bedah rumah sehingga proses penyeleksian ini berjalan sangat lambat dan dinilai kurang efektif. Metode yang digunakan dalam pengambilan keputusan adalah metode kombinasi Simple Additive Weighting (SAW) digunakan untuk mencari nilai matrik ternormalisasi R untuk setiap atribut, kemudian dilanjutkan dengan metode Technique For Others Refrences By Simillarity To Ideal Solution (TOPSIS) Hasil dari sistem pendukung keputusan penerimaan siswa baru pada Kelurahan Kampung Kaliawi Technique For Others Refrences By Simillarity To Ideal Solution digunakan untuk mencari nilai perankingan dengan 30 sampel calon warga kuputusan dengan hasil keputusan >60 layak dan <60 tidak layak
PENERAPAN METODE TECHNIQUE FOR OTHERSREFRENCES BY SIMILLARITY TO IDEAL SOLUTION (TOPSIS) UNTUK PENENTUAN PEMBIAYAAN ULANG PADA PT.FIF GROUP CABANG KOTABUMI M. Abu Jihad Plaza R; Adi Wibowo; Ryan Aji Wijaya
Sienna Vol 3 No 2 (2022): Sienna Volume 3 Nomor 2 Desember 2022
Publisher : LPPM Universitas Muhammadiyah Kotabumi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Persaingan dunia usaha yang ketat maka perusahaan harus pintar-pintar melihat peluang dan kebutuhan masyarakat, sehingga perusahaan mengeluarkan program Pembiayaan Ulang untuk para konsumen yang ingin menjaminkan kendaraannya dan pembayaran kendaraan tersebut dilakukan secara cicilan. Dalam penentuan pemberian Pembiayaan Ulang masih mengutamakan analisis karyawan yang diberi tugas dalam mensurvei kondisi konsumen yang akan mengajukan Pembiayaan Ulang pada FIF Group Kotabumi, sehingga dalam penentuan penerima kredit terkadang tidak objektif sehingga sering terjadi kredit macet yang menghambat perputaran uang pada FIF Group Kotabumi. Sistem Pendukung Keputusan (SPK) merupakan salah satu solusi perusahaan yang membantu melakukan pengambilan keputusan terhadap konsumen layak atau tidak layak menerima pembiayaan pembiayaan ulang. Dibutuhkan suatu metode perhitungan yang digunakan untuk menyelesaikan permasalahan dengan banyak kriteria. Salah satu metode perhitungan yang digunakan adalah Metode Technique for Others Refrences by Simillarity to Ideal Solution (TOPSIS). Konsep dasar dari metode TOPSIS yang didasarkan pada konsep bahwa alternatif terbaik tidak hanya memiliki jarak terpendek dari solusi ideal positif tetapi juga memiliki jarak terjauh dari solusi ideal negatif. Hasil dari sistem pendukung keputusanyang dibangun ini dapat menghasilkan keputusan yang lebih objektif. Menghasilkan 6 nasabah diterima dan 4 nasabah ditolak yang dapat digunakan sebagai rekomendasi penentuan kepada PT. FIF Group Cabang Kotabumi.
MONITORING TEMPERATUR DAN KELEMBABAN BERBASIS IOT PADA SERVER Iin Marlina; Adi Wibowo
Sienna Vol 3 No 2 (2022): Sienna Volume 3 Nomor 2 Desember 2022
Publisher : LPPM Universitas Muhammadiyah Kotabumi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Server is a place to store data and information that is owned so that it can be accessed by anyone and connected workstations from anywhere. If the server room gets too hot or too humid, it can cause your server to not work properly.air with too high humidity can damage the hardware on the server, for example, equipment can cause a short circuit caused by rust. The ideal humidity level for a server room is between 40 and 50%. As the humidity level increases, the amount of water vapor in the air increases. This can cause changes in vapor to liquid, electronic devices cannot be exposed to water. Many mistakes that are often made by server owners are by placing temperature and humidity detection sensors in the room, the temperature detection sensor should be placed in the rack of each server at each rack level, which is positioned at the front and back of the rack. The device that is commonly used in making Internet of Things applications is Arduino, Arduino is used as a link between the internet and sensors so that data from these sensors can be accessed. via the internet to set the behavior of specific equipment. In this study, Arduino was used because Arduino is an opensource device, the programming language used is C language and the Python programming language can also be used. From the availability of the library, there are many libraries that are ready and easy to use. Temperature and humidity detection in this study uses a DHT 11 temperature and humidity sensor connected to an Arduino device that is connected to the internet via a local network.
IMPLEMENTASI MANAJEMEN BANDWIDTH MENGGUNAKAN QUEUE TREE ROUTER MIKROTIK Iin Marlina; Andreas Perdana
Sienna Vol 3 No 1 (2022): Sienna Volume 3 Nomor 1 Juli 2022
Publisher : LPPM Universitas Muhammadiyah Kotabumi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The development of information technology is currently developing very quickly, both software and hardware, in line with the needs of modern humans. The internet is one of the information technologies that has had a tremendous impact on many aspects of human life. with equipment and software for bandwidth management, computer networks can function properly. The world of education, government and private agencies, and all jobs in general require bandwidth management with Mikrotik routers to help overcome traffic congestion that can disrupt computer network connections. because computer networks can go down or have problems because there is no equal distribution of bandwidth for each user, therefore it is necessary to make large bandwidth distribution arrangements, with the aim of achieving optimal bandwidth capacity for each user. Other factors can also affect network throughput, such as packet loss, certain network protocols, and device networks. Queue trees can provide limits for specific IP addresses, subnets, protocols, ports, and other parameters. Queue trees limit peer-to-pee traffic. Prioritize some flow packets over others. Queue tree can be configured for download and upload traffic so web browsing can be faster. Apply different limits based on time. And share available traffic among users equally or depending on channel load. Function per queue connection. PCQ is one of the functions used for bandwidth management to improve system performance.
PENERAPAN FUZZY INFERENCE SYSTEM DENGAN METODE FUZZY TSUKAMOTO PADA SISTEM PENDUKUNG KEPUTUSAN PENERIMAAN KARYAWAN Tri Akhyari Romadhon; Fandi Kurniawan; Ruliansyah Ruliansyah; Evi Fadilah
Sienna Vol 3 No 1 (2022): Sienna Volume 3 Nomor 1 Juli 2022
Publisher : LPPM Universitas Muhammadiyah Kotabumi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Companies must pay attention to the criteria or standards that have been set to improve the quality of employee recruitment. however, atl PT. Sinarl Sosro KPBl Palembang, hiring is stilll subjective and can only be seen from the test results. lTherefore, itl is necessaryl to create al decision supportl system usingl the Tsukamotol fuzzy methodl which canl assist decisionl makers inl obtaining informationl for selecting prospectivel employees. The system development methodl used means Prototype. Thel programming languagel used isl Hypertext Preprocessorl (lPHP), andl the databasel uses lMySQL, and thel testing methodl uses Blackboxl testing.
IMPLEMENTASI LOAD BALANCING DAN LINK REDUNDANCY NETWORK DENGAN 2 ISP MENGGUNAKAN ROUTING DI MIKROTIK ROUTER Andreas Perdana; Adi Wibowo
Sienna Vol 3 No 2 (2022): Sienna Volume 3 Nomor 2 Desember 2022
Publisher : LPPM Universitas Muhammadiyah Kotabumi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The Internet, and in particular the World Wide Web, is widely used by businesses, government agencies, corporations and individuals. Based on that fact internet service providers offer a lot of choices, and it can be confusing so we end up choosing the expensive one just to make sure we get the speed we need. All internet service providers must have interference, be it caused by the weather or broken cables and so on. The load balancing method can be used to send and receive internet access on a network through several gateways. When we subscribe to an internet connection with 2 ISPs load balancing can be used as a bandwidth balancer. The principles of load balancing remain the same in any environment, although circumstances and applications will differ. Internet service providers use a balancing strategy to handle fluctuating amounts of incoming internet traffic. Load balancing effectively minimizes server response time and maximizes throughput. The role of load balancing is sometimes likened to that of a traffic police, as it is meant to systematically direct requests to the right location at a given moment, thereby preventing costly congestion and unforeseen incidents. The load balancer must ultimately provide the performance and security needed to sustain complex IT environments, and the complex workflows that occur within them.
PERANCANGAN PROTOTYPE APLIKASI PENGOLAHAN DAFTAR BARANG INVENTARIS (RUANGAN) PADA FAKULTAS TEKNIK DAN ILMU KOMPUTER (FTIK) UNIVERSITAS MUHAMMADIYAH KOTABUMI Khusnul Khotimah
Sienna Vol 2 No 2 (2021): SIENNA Volume 2 Nomor 2 Desember 2021
Publisher : LPPM Universitas Muhammadiyah Kotabumi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Inventory management is the process of controlling and managing the assets and goods owned by an organization. At FTIK (Faculty of Information Technology and Computer Science), Muhammadiyah University Kotabumi, there are various types of equipment and items that need to be inventoried, such as computer devices, laboratory equipment, and other tools. The prototype design of the room inventory list processing application is a response to the issues identified during the problem identification phase. The modeling of this application is done using a Use Case Diagram as its visual representation. The application designed in this research is intended for processing the room inventory list, using electronic devices as the processing tool for all transactions related to room inventory list management. The design aims to improve efficiency in inventory management by reducing delays and errors in the inventorying, recording, monitoring, and reporting of room inventory items

Page 3 of 4 | Total Record : 36