Claim Missing Document
Check
Articles

Found 28 Documents
Search

Development of a Notification-Based Network Security Monitoring System Using Network Development Life Cycle (NDLC) Butarbutar, Ryan Timothy Benget Daulat; Sasmita, Gusti Made Arya; Pratama, I Putu Agus Eka
JITTER : Jurnal Ilmiah Teknologi dan Komputer Vol 4 No 3 (2023): JITTER, Vol.4, No.3 December 2023
Publisher : Program Studi Teknologi Informasi, Fakultas Teknik, Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JTRTI.2023.v04.i03.p01

Abstract

Developments in information and communication technology which are increasing rapidly, it is also required to improve the quality of security. The increase of internet usage has led to high number of intrusions or attacks that exploit weaknesses in internet protocols, operating systems and application software. Due to the high number of attacks, information technology security is an important thing to consider in an organization or individual. One solution that can be applied to overcome this problem is to monitor network security. One of the implementations of network security monitoring is the implementation of an Intrusion Detection System (IDS). The purpose of this research was to design a Snort-based network security monitoring system as a tool for implementing IDS to detect attacks by sending notifications via Telegram Bot which is integrated with the server owned by Unit Sumber Daya Informasi Universitas Udayana using the Network Development Life Cycle (NDLC) method. Based on the configuration results of research conducted on the Unit Sumber Daya Informasi Universitas Udayana server, there was the lowest data on May 16, 2023 with 64,418 data and the highest data on April 04, 2023 with 261,672 data and 2 Nmap Scan attack data as the lowest type of attack and 13,703 DDoS attack data as the highest type of attack.
PEMBERSIH FILTER MEKANIK AKUARIUM BERBASIS INTERNET OF THINGS (IOT) MENGGUNAKAN RASPBERRY PI Ul Awal Prasetyo, Rizky Robby; Piarsa, I Nyoman; Sasmita, Gusti Made Arya
JITTER : Jurnal Ilmiah Teknologi dan Komputer Vol 2 No 2 (2021): JITTER, Vol.2, No.2, Agustus 2021
Publisher : Program Studi Teknologi Informasi, Fakultas Teknik, Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstrak Penggemar ikan hias kini semakin banyak memelihara ikan di akuarium. Peminat ikan hias pada akuarium juga memiliki waktu tertentu untuk menjaga kebersihan air akuarium dan tanaman pada akuarium, menjaga kejernihan air dapat menyebabkan pertumbuhan dan perkembangan ikan menjadi lebih baik, dimana jenis ikan tertentu seperti ikan lohan dan arwana harus dijaga tingkat kebersihan airnya, agar tidak mempengaruhi pertumbuhan ikan dan perkembangan ikan. Perkembangan teknologi di era modern ini, dapat membantu pekerjaan manusia dalam menyelsaikan pekerjaan dengan baik dan efisian. Teknologi yang dapat membantu mengatasi masalah tersebut adalah sistem berbasis Internet of Things (IoT). Internet of Things (IoT) adalah perangkat fisik yang dapat berkomunikasi melalui Internet. Sistem ini menggunakan sensor ultrasonik, sensor kekeruhan, pompa air untuk alat pembersih, dan Raspberry Pi sebagai mikrokontroler yang berfungsi sebagai pengolah data. Sensor kekeruhan akan mengecek kekeruhan kondisi di aquarium jika relay air kotor akan mematikan pompa air aquarium dan proses pembersihan filter menggunakan pompa iar yang di semprotkan pada filter akuarium. Ornamental fish enthusiasts are now increasingly keeping fish on tourism. Ornamental fish enthusiasts also have a certain time to keep the water clean and its maintenance can lead to good fish maintenance and development, where certain types of fish must be kept clean. so as not to affect fish growth and fish development. Technological developments in this modern era, can help human work in completing work properly and efficiently. The technology that can help overcome this problem is an Internet of Things (IoT) based system. The Internet of Things (IoT) is a physical device that can communicate over the Internet. This system uses ultrasonic sensors, turbidity sensors, water pumps for cleaning tools, and Raspberry Pi as a microcontroller that functions as a data processor. The turbidity sensor will check the turbidity of the conditions in the aquarium if the dirty water relay will turn off the aquarium water pump and the filter maintenance process uses a water pump that is sprayed on the filter.
METODE ONE TIME PASSWORD MODIFIED SEBAGAI SISTEM KEAMANAN MONITORING IOT Adinatha, Dewa Gde Eka Krisna; Sasmita, Gusti Made Arya; Pratama, I Putu Agus Eka
JITTER : Jurnal Ilmiah Teknologi dan Komputer Vol 3 No 2 (2022): JITTER, Vol.3, No.2, August 2022
Publisher : Program Studi Teknologi Informasi, Fakultas Teknik, Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (834.092 KB) | DOI: 10.24843/JTRTI.2022.v03.i02.p14

Abstract

Monitoring is an activity carried out to find out the process of running a program or system that has been designed, whether it runs well as expected or not, find out the obstacles that occur and how to overcome these obstacles. The cryptographic scheme to secure communication protocols is one of the most effective defenses against a variety of attacks, including eavesdropping and simple routing attacks, at the communication layer. One of the techniques studied in cryptography is encryption-description. This study aims to apply a one time password (OTP) modified algorithm into an IoT based temperature and humidity monitoring system using a Raspberry PI microcontroller device and a DHT 11 sensor. . The encryption process begins with hashing using the SHA method on the plaintext, followed by producing a private key and public key for RSA Signature encryption, the hashing results will be encrypted using the RSA Signature algorithm, the RSA Signature encryption results will be combined with the RSA Signature public key and plaintext, followed by producing an OTP that will be used as an AES key. Next the AES encryption process is executed, the OTP key will be encrypted RSA, the results of the RSA ciphertext and the AES ciphertext are combined and encoded with the Base64 method. The implementation of this security system gets the test results of the average duration for data encryption process is 435,163ms, and the data transmission with encryption process is 123,705ms
Penetration Testing Berbasis OWASP Testing Guide Versi 4.2 (Studi Kasus: X Website) Dharmawangsa, I Dewa Gede Govindha; Sasmita, Gusti Made Arya; Pratama, I Putu Agus Eka
JITTER : Jurnal Ilmiah Teknologi dan Komputer Vol 4 No 1 (2023): JITTER, Vol.4, No.1, April 2023
Publisher : Program Studi Teknologi Informasi, Fakultas Teknik, Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (940.686 KB) | DOI: 10.24843/JTRTI.2023.v04.i01.p06

Abstract

Government website is one of the strategies in e-government development, x agency follows this strategy by having a website with address x, along with these developments, cyber attacks through websites also increase, therefore it is necessary to carry out periodic testing and evaluation of websites with penetration testing. Penetration testing is the security testing for network or website to find vulnerabilities that could be exploited by attackers. This research is supported by the OWASP Testing Guide Framework Version 4.2 with 12 modules covering all aspects of security testing on websites. The results of the penetration testing is found vulnerabilities then be assessed for with CVSS Calculator 3.1 and given recommendations afterward. This research finds 32 vulnerabilities, 12 of that vulnerabilities have an impact on the website with 4 vulnerabilities that have a medium risk, 5 vulnerabilities that have a high risk and 2 vulnerabilities that have a critical risk.
A Prototype of Monitoring and Early Warning System of Public Water Flow Interference based on Arduino, Firebase Realtime DB, and Android Dharmaadi, I Putu Arya; Arsa, Dewa Made Sri; Sasmita, Gusti Made Arya
Jurnal Pekommas Vol 6 No 2 (2021): October 2021
Publisher : Sekolah Tinggi Multi Media “MMTC” Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56873/jpkm.v6i2.3774

Abstract

The majority of the population uses clean water sourced from the PDAM (Indonesian Regional Water Supply Company) pipeline to meet their daily needs. However, clean water utilization is sometimes not smooth because the upstream's water supply is stalled or the PDAM pipeline disrupted. This disruption that often occurs slowly causes routine community activities, such as bathing or cooking, become stop because clean water is a basic need. Thus, a system is needed to provide early warning when the PDAM water supply starts to have problems so that the community can make initial anticipation. This study designed a prototype of an early warning system using an Arduino-based water flow sensor that records water flow discharge data on the PDAM pipeline and sent to the Firebase Realtime Database to be monitored in real-time through an Android application. The system testing is done by black-box testing, i.e. we check all functions of this system, mainly on sending a warning notification when the water flow debt is at a low rate. In the end, by using this system, the user can prepare themselves early, such as collecting residual water debit in the tub and save water when there is a disruption in PDAM water.
Audit Tata Kelola TI pada BMKG dengan Menggunakan Framework COBIT 2019 Studi Kasus: BMKG Wilayah III Denpasar Aprianingsih, Ade Irma; Githa, Dwi Putra; Sasmita, Gusti Made Arya
JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 11 No 4 (2024): JATISI (Jurnal Teknik Informatika dan Sistem Informasi)
Publisher : Lembaga Penelitian dan Pengabdian pada Masyarakat (LPPM) STMIK Global Informatika MDP

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35957/jatisi.v11i4.8541

Abstract

The development of science and technology is currently constant along with increasingly modern developments. Technology today has become something or could be said to be an important need in people's daily lives. COBIT is a framework developed by ISACA for IT-related management and control in an organization to maximize the use of IT. Several problems that often occur in organizations often cause a decline in the quality of governance in BMKG Region III Denpasar, so it is necessary to carry out an audit of information technology governance. This IT governance audit research uses COBIT 2019 as a framework that can help organizations maintain high quality information by supporting organizational decision making. In this research, process domains APO13, BAI01, and BAI10 were obtained. Therefore, the ability level value obtained in the APO13 process domain is located at level 2, BAI01 is located at level 2, and BAI10 is located at level 2. So, the GAP value obtained from each of these domains is 3.
Design and Implementation of Point to Point Wireless Network with VPN IPSec and GRE Security for Internet Network Distribution in Sulangai Village Wiranata, Agus Budiman; Sasmita, Gusti Made Arya; Raharja, I Made Sunia
Jurnal Ilmiah Merpati (Menara Penelitian Akademika Teknologi Informasi) Vol 12 No 3 (2024): Vol. 12, No. 3, December 2024
Publisher : Lembaga Penelitian dan Pengabdian kepada Masyarakat Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JIM.2024.v12.i03.p06

Abstract

Sulangai Village experiences limited internet access due to its geographical condition in a mountainous area, so cable infrastructure such as fiber optics is difficult to implement. The proposed solution is to use point-to-point wireless networks to provide reliable internet access. The research method used is the Network Development Life Cycle (NDLC), including the stages of analysis, design, simulation, implementation, monitoring and management. The test results show that the signal strength at the Base Station and Client Station is -69 dBm each, which is in the very good category. Security testing using IPsec VPN and GRE also showed adequate results, with the ability to encrypt data and protect the network from outsiders. Bandwidth speed testing before and after security implementation shows stable and satisfactory network performance, with consistent transmission and reception speeds. The results of the Quality of Service (QoS) analysis also show a significant increase after implementing security, with good throughput, packet loss, delay and jitter values.
OWASP Framework and OCTAVE Method for Penetration Testing Web Apps of College X Darmayuda, I Putu Gede Angga Mas; Sasmita, Gusti Made Arya; Putri, Gusti Agung Ayu
Jurnal Ilmiah Merpati (Menara Penelitian Akademika Teknologi Informasi) Vol 12 No 2 (2024): Vol. 12, No. 2, August 2024
Publisher : Lembaga Penelitian dan Pengabdian kepada Masyarakat Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JIM.2024.v12.i02.p03

Abstract

Information system security is a major focus for many organizations as increasingly sophisticated cyberattacks threaten the confidentiality, integrity and availability of online services. This research aims to identify and assess vulnerabilities in web applications at College X by using the OWASP framework and OCTAVE method. OWASP is used to identify common and critical web vulnerabilities, while OCTAVE provides a holistic understanding of an organization's security risks. Testing was conducted with the tools and techniques recommended by both frameworks. The results found a number of vulnerabilities, including two low-level and one high-level. The findings underscore the importance of systematic penetration testing and risk assessment to keep web applications secure in educational environments.