Claim Missing Document
Check
Articles

Found 24 Documents
Search
Journal : Jurnal Ilmiah Teknologi dan Komputer (JITTER)

Development of a Notification-Based Network Security Monitoring System Using Network Development Life Cycle (NDLC) Butarbutar, Ryan Timothy Benget Daulat; Sasmita, Gusti Made Arya; Pratama, I Putu Agus Eka
JITTER : Jurnal Ilmiah Teknologi dan Komputer Vol 4 No 3 (2023): JITTER, Vol.4, No.3 December 2023
Publisher : Program Studi Teknologi Informasi, Fakultas Teknik, Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JTRTI.2023.v04.i03.p01

Abstract

Developments in information and communication technology which are increasing rapidly, it is also required to improve the quality of security. The increase of internet usage has led to high number of intrusions or attacks that exploit weaknesses in internet protocols, operating systems and application software. Due to the high number of attacks, information technology security is an important thing to consider in an organization or individual. One solution that can be applied to overcome this problem is to monitor network security. One of the implementations of network security monitoring is the implementation of an Intrusion Detection System (IDS). The purpose of this research was to design a Snort-based network security monitoring system as a tool for implementing IDS to detect attacks by sending notifications via Telegram Bot which is integrated with the server owned by Unit Sumber Daya Informasi Universitas Udayana using the Network Development Life Cycle (NDLC) method. Based on the configuration results of research conducted on the Unit Sumber Daya Informasi Universitas Udayana server, there was the lowest data on May 16, 2023 with 64,418 data and the highest data on April 04, 2023 with 261,672 data and 2 Nmap Scan attack data as the lowest type of attack and 13,703 DDoS attack data as the highest type of attack.
PEMBERSIH FILTER MEKANIK AKUARIUM BERBASIS INTERNET OF THINGS (IOT) MENGGUNAKAN RASPBERRY PI Ul Awal Prasetyo, Rizky Robby; Piarsa, I Nyoman; Sasmita, Gusti Made Arya
JITTER : Jurnal Ilmiah Teknologi dan Komputer Vol 2 No 2 (2021): JITTER, Vol.2, No.2, Agustus 2021
Publisher : Program Studi Teknologi Informasi, Fakultas Teknik, Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstrak Penggemar ikan hias kini semakin banyak memelihara ikan di akuarium. Peminat ikan hias pada akuarium juga memiliki waktu tertentu untuk menjaga kebersihan air akuarium dan tanaman pada akuarium, menjaga kejernihan air dapat menyebabkan pertumbuhan dan perkembangan ikan menjadi lebih baik, dimana jenis ikan tertentu seperti ikan lohan dan arwana harus dijaga tingkat kebersihan airnya, agar tidak mempengaruhi pertumbuhan ikan dan perkembangan ikan. Perkembangan teknologi di era modern ini, dapat membantu pekerjaan manusia dalam menyelsaikan pekerjaan dengan baik dan efisian. Teknologi yang dapat membantu mengatasi masalah tersebut adalah sistem berbasis Internet of Things (IoT). Internet of Things (IoT) adalah perangkat fisik yang dapat berkomunikasi melalui Internet. Sistem ini menggunakan sensor ultrasonik, sensor kekeruhan, pompa air untuk alat pembersih, dan Raspberry Pi sebagai mikrokontroler yang berfungsi sebagai pengolah data. Sensor kekeruhan akan mengecek kekeruhan kondisi di aquarium jika relay air kotor akan mematikan pompa air aquarium dan proses pembersihan filter menggunakan pompa iar yang di semprotkan pada filter akuarium. Ornamental fish enthusiasts are now increasingly keeping fish on tourism. Ornamental fish enthusiasts also have a certain time to keep the water clean and its maintenance can lead to good fish maintenance and development, where certain types of fish must be kept clean. so as not to affect fish growth and fish development. Technological developments in this modern era, can help human work in completing work properly and efficiently. The technology that can help overcome this problem is an Internet of Things (IoT) based system. The Internet of Things (IoT) is a physical device that can communicate over the Internet. This system uses ultrasonic sensors, turbidity sensors, water pumps for cleaning tools, and Raspberry Pi as a microcontroller that functions as a data processor. The turbidity sensor will check the turbidity of the conditions in the aquarium if the dirty water relay will turn off the aquarium water pump and the filter maintenance process uses a water pump that is sprayed on the filter.
METODE ONE TIME PASSWORD MODIFIED SEBAGAI SISTEM KEAMANAN MONITORING IOT Adinatha, Dewa Gde Eka Krisna; Sasmita, Gusti Made Arya; Pratama, I Putu Agus Eka
JITTER : Jurnal Ilmiah Teknologi dan Komputer Vol 3 No 2 (2022): JITTER, Vol.3, No.2, August 2022
Publisher : Program Studi Teknologi Informasi, Fakultas Teknik, Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (834.092 KB) | DOI: 10.24843/JTRTI.2022.v03.i02.p14

Abstract

Monitoring is an activity carried out to find out the process of running a program or system that has been designed, whether it runs well as expected or not, find out the obstacles that occur and how to overcome these obstacles. The cryptographic scheme to secure communication protocols is one of the most effective defenses against a variety of attacks, including eavesdropping and simple routing attacks, at the communication layer. One of the techniques studied in cryptography is encryption-description. This study aims to apply a one time password (OTP) modified algorithm into an IoT based temperature and humidity monitoring system using a Raspberry PI microcontroller device and a DHT 11 sensor. . The encryption process begins with hashing using the SHA method on the plaintext, followed by producing a private key and public key for RSA Signature encryption, the hashing results will be encrypted using the RSA Signature algorithm, the RSA Signature encryption results will be combined with the RSA Signature public key and plaintext, followed by producing an OTP that will be used as an AES key. Next the AES encryption process is executed, the OTP key will be encrypted RSA, the results of the RSA ciphertext and the AES ciphertext are combined and encoded with the Base64 method. The implementation of this security system gets the test results of the average duration for data encryption process is 435,163ms, and the data transmission with encryption process is 123,705ms
Penetration Testing Berbasis OWASP Testing Guide Versi 4.2 (Studi Kasus: X Website) Dharmawangsa, I Dewa Gede Govindha; Sasmita, Gusti Made Arya; Pratama, I Putu Agus Eka
JITTER : Jurnal Ilmiah Teknologi dan Komputer Vol 4 No 1 (2023): JITTER, Vol.4, No.1, April 2023
Publisher : Program Studi Teknologi Informasi, Fakultas Teknik, Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (940.686 KB) | DOI: 10.24843/JTRTI.2023.v04.i01.p06

Abstract

Government website is one of the strategies in e-government development, x agency follows this strategy by having a website with address x, along with these developments, cyber attacks through websites also increase, therefore it is necessary to carry out periodic testing and evaluation of websites with penetration testing. Penetration testing is the security testing for network or website to find vulnerabilities that could be exploited by attackers. This research is supported by the OWASP Testing Guide Framework Version 4.2 with 12 modules covering all aspects of security testing on websites. The results of the penetration testing is found vulnerabilities then be assessed for with CVSS Calculator 3.1 and given recommendations afterward. This research finds 32 vulnerabilities, 12 of that vulnerabilities have an impact on the website with 4 vulnerabilities that have a medium risk, 5 vulnerabilities that have a high risk and 2 vulnerabilities that have a critical risk.