Claim Missing Document
Check
Articles

Found 13 Documents
Search

Application of Domain Keys Identified Mail, Sender Policy Framework, Anti-Spam, and Anti-Virus: The Analysis on Mail Servers Marzuki, Khairan; Hanif, Naufal; Hariyadi, I Putu
International Journal of Electronics and Communications Systems Vol. 2 No. 2 (2022): International Journal of Electronics and Communications System
Publisher : Universitas Islam Negeri Raden Intan Lampung, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24042/ijecs.v2i2.13543

Abstract

Viruses spread through email are often sent by irresponsible parties that aim to infect email users' servers. This background encouraged the author to analyze the application of DKIM, SPF, anti-spam, and anti-virus to avoid spam, viruses, and spoofing activities. The goal is for the server to prevent spam, spoofing, and viruses to ensure the security and convenience of email users and prevent the impact of losses caused by them. The design and analysis of DKIM, SPF, anti-spam, and anti-virus applications use the NDLC methodology. The process includes designing spam, spoofing, and virus filtering systems and performing installation and configuration simulations. The next stage is implementation, during which the previously developed system is tested on the spam filtering system, spoofing, and viruses. The last stage is the monitoring stage, where supervision is conducted on the approach to determine its success level. This study concludes that applying the DKIM protocol can prevent spoofing through private and public key-matching methods for authentication. Meanwhile, the application of the SPF protocol can prevent spoofing by authorizing the IP address of the sending server. Additionally, SpamAssassin, ClamAV and Amavisd-New can prevent spam and viruses from entering by checking email headers, bodies, and attachments.
Automation of Open VSwitch-Based Virtual Network Configuration Using Ansible on Proxmox Virtual Environment Marzuki, Khairan; Kholid, Muhammad Idham; Hariyadi, I Putu; Mardedi, Lalu Zazuli Azhar
International Journal of Electronics and Communications Systems Vol. 3 No. 1 (2023): International Journal of Electronics and Communications System
Publisher : Universitas Islam Negeri Raden Intan Lampung, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24042/ijecs.v3i1.16524

Abstract

Proxmox has a feature that can build a private network in it. Each host on a private network on Proxmox generally shares physical resources, including network connections using a virtual network, one of which is a VLAN. The Proxmox server supports Open VSwitch as a virtual switch. Open virtual switch, an alternative virtual switch quite popular among cloud developers, can be a solution for managing traffic between Virtual Machins and external communications. The method used in this study is the Network Development Life Cycle (NDLC). After applying the automation engine using Ansible, it overcame the problem, namely speeding up configuration and reducing human error or errors in configuring virtual networks. The automation system can speed up the virtual network management process compared to the manual method based on 5 (five) experiments, namely when the manufacturing operation has an average time of 08 minutes and 42 seconds faster. Whereas when the addition operation has an average faster time of 08 minutes 17 seconds. On the other hand, when the deletion operation has an average time of 42 seconds faster.
IMPLEMENTASI SECURITY INFORMATION AND EVENT MANAGEMENT UNTUK MENCEGAH SERANGAN DEFACE PADA SERVER TERINTEGRASI TELEGRAM Djamalyanto, Meidi; Widyawati, Lilik; Husain, Husain; Hariyadi, I Putu
Melek IT : Information Technology Journal Vol. 11 No. 1 (2025): Melek IT: Information Technology Journal
Publisher : Informatics Department-Universitas Wijaya Kusuma Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30742/melekitjournal.v11i1.398

Abstract

Serangan deface merupakan ancaman kritis yang mengganggu integritas server dan merusak reputasi organisasi. Penelitian ini bertujuan merancang sistem Security Information and Event Management (SIEM) berbasis Wazuh yang terintegrasi dengan Telegram Bot untuk mendeteksi, mencegah, dan memberikan notifikasi real-time terhadap serangan deface. Metode yang digunakan adalah Network Development Life Cycle (NDLC) dengan tiga tahap utama: analisis kebutuhan, desain sistem, dan simulasi prototipe. Implementasi dilakukan pada lingkungan virtual menggunakan Ubuntu Server 22.04 sebagai Wazuh Manager dan Parrot Security OS sebagai simulator serangan. Hasil penelitian menunjukkan bahwa Wazuh berhasil mendeteksi tiga jenis serangan utama: File Upload Vulnerability, Remote Code Execution (RCE), dan Webshell melalui analisis log dan aturan kustom. Integrasi dengan Telegram Bot memungkinkan pengiriman notifikasi instan saat ancaman terdeteksi, disertai respons otomatis seperti pemulihan direktori (restore), pemblokiran alamat IP penyerang, dan mitigasi proaktif. Uji coba sebelum penerapan Wazuh membuktikan kerentanan server terhadap modifikasi file, sementara setelah implementasi, sistem mampu mencegah perubahan ilegal dengan efektivitas 100%.  Kesimpulan penelitian ini menegaskan bahwa kombinasi SIEM Wazuh dan Telegram Bot meningkatkan keamanan server melalui deteksi dini, respons cepat, dan pemantauan terpusat. Solusi ini tidak hanya mengurangi risiko deface tetapi juga menyediakan mekanisme notifikasi yang efisien bagi administrator. Rekomendasi untuk pengembangan meliputi penambahan variasi serangan, peningkatan active-response, dan optimasi integrasi dengan platform lain.
Otomatisasi Konfigurasi Wazuh Terintegrasi VirusTotal Menggunakan Ansible Untuk Mendeteksi dan Memproteksi Serangan Malware Putra, Muhamad Alvan Ekawan; Hariyadi, I Putu; Marzuki, Khairan
Melek IT : Information Technology Journal Vol. 11 No. 1 (2025): Melek IT: Information Technology Journal
Publisher : Informatics Department-Universitas Wijaya Kusuma Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30742/melekitjournal.v11i1.403

Abstract

Pesatnya perkembangan teknologi digital turut meningkatkan risiko Malware yang dapat mengganggu sistem, mencuri data, dan menghambat operasional. Wazuh hadir sebagai solusi open-source untuk mendeteksi aktivitas mencurigakan melalui analisis log, namun akurasinya dapat ditingkatkan dengan integrasi VirusTotal sebagai layanan verifikasi file mencurigakan. Tujuan utama dari penelitian ini adalah membangun playbook Ansible untuk mengotomatisasi proses instalasi, konfigurasi Wazuh, integrasi dengan VirusTotal, dan pengiriman notifikasi ke Telegram secara real-time. Metode yang digunakan adalah pendekatan Network Development Life Cycle (NDLC) dengan tiga tahapan, yaitu: analisis, desain, dan simulation prototyping. Analisis dilakukan dengan studi literatur dan perbandingan penelitian terdahulu. Tahap desain mencakup perancangan jaringan, sistem, dan konfigurasi IP. Tahap simulasi dilakukan dalam lingkungan virtual menggunakan lima VM yang terdiri dari server Wazuh, server Ansible, dua agen (Windows dan Linux), serta satu VM tambahan untuk pengujian. Hasil penelitian menunjukkan bahwa sistem yang dikembangkan mampu secara efektif mendeteksi tiga jenis Malware utama (Trojan, Ransomware, dan Worm), melakukan active response, dan mengirimkan peringatan secara otomatis melalui Telegram. Proses instalasi dan konfigurasi dapat dilakukan dengan lebih cepat dan konsisten berkat playbook Ansible. Sistem ini juga terbukti handal dan efisien dalam menangani serangan Malware secara otomatis. Kesimpulan dari penelitian ini adalah bahwa integrasi Wazuh dan VirusTotal yang diotomatisasi konfigurasinya menggunakan Ansible dapat meningkatkan efisiensi, akurasi, dan skalabilitas dalam deteksi serta proteksi terhadap Malware. Otomatisasi ini tidak hanya mempercepat proses pengamanan, tetapi juga mengurangi kesalahan konfigurasi manual, sehingga memberikan solusi keamanan yang lebih tangguh dan dapat dikembangkan lebih lanjut.
Otomasi Manajemen dan Pengawasan Linux Container (LCX) Pada Proxmox VE Menggunakan Ansible Pratama, Muh Akromi Arya; Hariyadi, I Putu
Jurnal Bumigora Information Technology (BITe) Vol. 3 No. 1 (2021)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/bite.v3i1.807

Abstract

In the development of internet service technology, it has become a major requirement as a means of communication and exchanging information. Especially in the field of education such as elementary schols, internet facilities are very much needed where the users are administrative staff, teachers, students via the internet can access various knowledge needed quickly, so that it can simplify the learning process. Therefore, the bandwidth sharing system or it can be called bandwidth management must be in accordance with the conditions of the network service to be applied and bandwidth management is indispensable for multi-service networks, because the more and more varied applications that can be served by a network have an effect on link usage. In the network. The method in this research uses library research and the implementation uses the Hierarchical Token Bucket method, which is an application that function to regulate the distribution of bandwidth. The purpose of this analysis is to provide a bandwidth management system to make a fair distribution for users connected to the network. The results showed that the Hierarchicak Token Bucket method can regulate bandwidth usage for each client when downloading, uploading, streaming and browsing
Internet Machine Prototype with a Coin Payment Using a Rock Pi Microcontroller Azhar, Raisul; Santoso, Heroe; Hariyadi, I Putu; Husain, Husain; Afriandi, Mahsus
Jurnal Bumigora Information Technology (BITe) Vol. 6 No. 1 (2024)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/bite.v6i1.3543

Abstract

Background: Coins are widely used in game machines to play game applications. Internet use is usually done by purchasing an internet package. This method is often used, but coins are rarely used.Objective: The aim of this research is how to make a machine that is capable of using coins as internet payment, especially hotspots.Methods: The research method was carried out using an experimental method with stages of analysis, prototype design, and testing using a descriptive approach.Result: This research produced 1 one-unit prototype machine equipped with an application for internet hotspots by inserting IDR 500 and IDR 1000 coins with connection limits according to the value of the coins entered.Conclusion: This research produces prototypes and coin internet application software.
Pelatihan Proxmox Infrastructure as Code dengan Ansible untuk Guru SMK TKJ Hariyadi, I Putu; Azwar, Muhamad; Azhar, Raisul; Dharma, I Made Yadi; Zulkipli, Zulkipli
Bakti Sekawan : Jurnal Pengabdian Masyarakat Vol. 5 No. 1 (2025): Juni
Publisher : Puslitbang Sekawan Institute Nusa Tenggara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35746/bakwan.v5i1.770

Abstract

Virtualization technology has been applied in the world of education including in Vocational High Schools (SMK) of Computer and Network Engineering (TKJ) to support the teaching and learning process in the laboratory. Teachers face challenges when preparing the virtual laboratory infrastructure, especially when used by many students. It is necessary to create containers, user accounts and set access permissions so that each student can use the virtual laboratory built using Proxmox. This process is generally done manually so it takes time and effort and is prone to errors. Infrastructure as Code (IaC) is an approach to managing and providing Information Technology (IT) infrastructure by writing and running code automatically to overcome manual configuration problems. Community service activities with this training method aim to provide insight and knowledge about IaC using Ansible on Proxmox so as to help teachers manage virtual laboratories more effectively and efficiently. The training was conducted online via Cisco Webex and each teacher who participated in the practice directly using a Virtual Private Server (VPS) with a Proxmox installation and received very positive feedback from the participants. Based on the results of the post-training questionnaire filled out by 17 participants, the information obtained was that participants were able to receive and apply the material related to IaC using Ansible on VPS Proxmox very well by 82% and well by 18%. This achievement is an indicator of the success of the objectives of the implementation of the community service activities that have been carried out.
Plume Detection System Based Internet of Things Utama, I Nyoman Susila Astraning; Hadi, Sirojul; Hariyadi, I Putu
International Journal of Engineering and Computer Science Applications (IJECSA) Vol. 1 No. 1 (2022): March 2022
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v1i1.1698

Abstract

Security is one of the important aspects in a system or environment. Residential, office, tourist and industrial areas are places that are prone to fires because they contain flammable objects. Slow handling when a gas leak occurs can trigger a fire. The solution that can be used to minimize the occurrence of fires is to build tools that work to monitor the condition of the room or environment that is prone to leakage of gas or other flammable liquids. The design and manufacture of a system to detect LPG and alcohol gas leaks can be useful for providing information in the event of a gas or alcohol leak so that it can be handled quickly and minimize fire damage. This system combines an plume detection system with an internet of things system so that it can provide information when a gas or flammable liquid leak occurs. The gas leak information is sent as a notification to the telegram from the operator. The design and manufacture of this system uses the Waterfall methodology with the following stages: analyzing (covering the need for system creation), system design (including designing electronic circuits and web monitoring interfaces), implementing system design and testing the system as a whole. The result of this research is that an electronic detection system has been successfully built that can distinguish gases and can provide information via telegram and web if gas is detected in the sensor environment. In the LPG gas leak test, the results show that the characteristics of LPG gas, namely the sensor output voltage, have an average of 4.17 volts with an average Part Per Million (PPM) of 8340 and the characteristics of alcohol gas, namely the sensor output voltage, have an average of 0, 13 volts with an average Part Per Million (PPM) of 254.
Penetration Testing untuk Menguji Sistem Keamanan Website Menggunakan OWASP ZAP Maulana, Hifzul Wathoni; Sujaka, Tomi Tri; Azwar, Muhamad; Husain, Husain; Hariyadi, I Putu
CORISINDO 2025 Vol. 1 (2025): Prosiding Seminar Nasional CORISINDO 2025
Publisher : CORISINDO 2025

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/corisindo.v1.5227

Abstract

Di era digital yang semakin berkembang  maka keamanan website merupakan aspek krusial dalam melindungi data dan menjaga integritas sistem. Penelitian ini bertujuan untuk menguji keamanan website terhadap serangan parameter injection menggunakan metode penetration testing. Pengujian dilakukan dengan mengacu pada standar OWASP Top 10 denan menggunakan alat OWASP Zed Attack Proxy. Proses pengujian dilakukan dalam empat tahap, yaitu perencanaan, pemindaian, eksploitasi, dan pelaporan. Eksploitasi dilakukan terhadap dua jenis serangan utama, yaitu SQL Injection dan Cross Site Scripting, menggunakan alat SQLMap dan Burp Suite. Hasil pengujian menunjukkan bahwa terdapat dua jenis kerentanan pada sistem, masing-masing memiliki tingkat risiko tingg dan medium. Langkah mitigasi dilakukan dengan mengimplementasikan teknik prepared statement, validasi dan sanitasi input, serta enkripsi data menggunakan algoritma Advanced Encryption Standard serta melakukan konfigurasi tambahan untuk mencegah akses yang tidak sah. Penelitian ini menghasilkan rekomendasi teknis yang dapat digunakan oleh pengembang untuk meningkatkan keamanan website dari ancaman cracker.
Implementasi Disaster Recovery melalui Backup Otomatis pada XenServer berbasis FreeNAS Ikrom, Paizul; Husain, Husain; Marzuki, Khairan; Azhar, Raisul; Hariyadi, I Putu
CORISINDO 2025 Vol. 1 (2025): Prosiding Seminar Nasional CORISINDO 2025
Publisher : CORISINDO 2025

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/corisindo.v1.5420

Abstract

Penelitian ini bertujuan untuk mengembangkan sistem disaster recovery dan backup data otomatis yang terintegrasi dengan XenServer, menggunakan FreeNAS sebagai media penyimpanan. Sistem dirancang untuk melakukan backup virtual machine (VM) secara otomatis dari XenServer ke FreeNAS Primary, dan dilanjutkan dengan replikasi ke FreeNAS Secondary sebagai cadangan tambahan. Proses backup dilakukan secara terjadwal menggunakan skrip otomatis berbasis cron dan rsync, serta ditambahkan fitur notifikasi untuk memantau keberhasilan proses backup. Implementasi dilakukan dalam beberapa tahap, mulai dari konfigurasi jaringan NFS antara XenServer dan FreeNAS, pengujian proses backup harian, replikasi data antar storage, hingga simulasi proses restore VM dari backup. Hasil pengujian menunjukkan bahwa sistem mampu melakukan backup dan replikasi secara konsisten, serta dapat melakukan pemulihan data dengan cepat ketika terjadi kerusakan atau kehilangan data di XenServer. Proses backup otomatis menggunakan cron telah terbukti berjalan secara terjadwal dan konsisten. Setiap file hasil backup disimpan dalam direktori yang sama dengan penamaan unik berdasarkan tanggal dan waktu (timestamp), sehingga tidak terjadi penimpaan antar file.