Claim Missing Document
Check
Articles

Found 13 Documents
Search

Implementasi Zero Trust Security Model Untuk Perlindungan Dns Dari Serangan Dns Spoofing Menggunakan Dns-Over-Https (Doh) Dan Ids. Faisal, M Imam; Wijaya, Alek; Fatoni, Fatoni; Ariyadi, Tamsir
Jurnal Infomedia: Teknik Informatika, Multimedia, dan Jaringan Vol 10, No 2 (2025): Jurnal Infomedia
Publisher : Politeknik Negeri Lhokseumawe

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30811/jim.v10i2.7748

Abstract

Penelitian ini dilatarbelakangi oleh meningkatnya ancaman terhadap keamanan jaringan, khususnya serangan Domain Name System (DNS) Spoofing yang memanfaatkan kelemahan pada proses resolusi DNS untuk mengarahkan pengguna ke tujuan berbahaya. Sistem DNS konvensional masih memiliki celah karena pertukaran data dilakukan tanpa enkripsi, sehingga rentan dimanipulasi. Oleh sebab itu, dibutuhkan pendekatan yang lebih adaptif dan berlapis. Salah satu strategi yang digunakan adalah Zero Trust Security Model (ZTSM) dengan prinsip “never trust, always verify,” yang dalam penelitian ini diintegrasikan dengan DNS-over-HTTPS (DoH) dan Intrusion Detection System (IDS) Snort. Metode penelitian dilakukan melalui implementasi DoH menggunakan dnscrypt-proxy pada VPS berbasis Ubuntu, serta konfigurasi Snort sebagai IDS untuk memantau dan mendeteksi lalu lintas DNS mencurigakan. Simulasi serangan dilakukan menggunakan Kali Linux sebagai mesin penyerang dengan mengirimkan permintaan DNS ke domain uji secure.test. Hasil pengujian menunjukkan bahwa penggunaan DoH berhasil mengenkripsi komunikasi DNS, sehingga lalu lintas menjadi lebih aman. Di sisi lain, Snort mampu mendeteksi permintaan DNS yang tidak terenkripsi, meskipun efektivitasnya lebih terlihat pada protokol TCP dibandingkan UDP. Temuan ini mengindikasikan bahwa kombinasi Zero Trust Security Model, DoH, dan IDS dapat meningkatkan perlindungan DNS dari ancaman spoofing. Namun, optimalisasi lebih lanjut pada IDS masih diperlukan agar dapat memberikan deteksi yang konsisten pada semua jenis protokol komunikasi.
Development Of Netwatch Host Using Telegram As A Strengthening Model Of Institutional Performance Quality Governance Wijaya, Alek; Kemala Jaya, Ade; Ayu Ningsih, Dinda; Lyanda, Doli
Journal of Computer Networks, Architecture and High Performance Computing Vol. 5 No. 1 (2023): Article Research Volume 5 Issue 1, January 2023
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v5i1.2309

Abstract

Improving the quality of an institution's performance is very dependent on the facilities implemented in carrying out its work process. Currently, the facility being developed at the institution is by implementing IoT technology that utilizes various types of IoT devices. However, most institutions have not been able to monitor every IoT device used so that it also affects the quality of performance of the institution. Therefore, in the study, the Network Development Life Cycle (NDLC) method is used., researchers made efforts to strengthen the institutional performance quality governance model. The researchers developed Netwatch Host technology using Telegram, which is intended to monitor the condition of each IoT device in the institution and then send details of the condition via the Telegram Application. This is intended so that the IoT devices used by employees can be maintained so that they can respond quickly when there is an IoT device that is down or has a problem.
Analisis Sistem Informasi Pada Website Jamajamaproject.id Menggunakan Metode UTAUT (Unfield Theory of Acceptance and Use of Technology) Ferdinan, Robby Rahmat; Wijaya, Alek
Jurnal Ilmiah Informatika Global Vol. 14 No. 2
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36982/jiig.v14i2.3223

Abstract

Seeing the development of digital information technology which is the main support for obtaining information in an easy and fast way, especially with the internet or the world of networking. With the development of an internet access service, it is a global computer network that connects the world in various users who access the internet in one network to all parts of the world who use it.Jama-jama project is a business that is engaged in the production of clothing screen printing which was established in 2014 in the city of Palembang, Jama-jama project itself conducts its business in the type of screen printing such as short shirts, long shirts, jackets, hats and others. The development of digital information technology Jama-jama project now has a website for customers to use in the ordering process so that it can be accessed easily.This research method uses the UTAUT methodology, UTAUT is the Unified Theory of Acceptance and Use of Technology (UTAUT) model which is a new model developed by Venkatesh et al (2003) by examining theories about technology acceptance by system users.This is considered very effective and can increase customer satisfaction with the services provided by the Jama-jama project. Based on the results of the analysis above, the author makes a thesis proposal for this final project with the title "Analysis of Information Systems on the Jamajamaproject.id Website Using the UTAUT (Unified Theory of Acceptance and Use of Technology) Method".