Claim Missing Document
Check
Articles

Found 21 Documents
Search

Pendeteksian PHP Vulnerabilities Menggunakan Metode Forward Taint Data Analisis Shyffa Ilmallia Noer Fhadillah; Parman Sukarno; Aulia Arif Wardana
JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 7 No 1 (2020): JATISI (Jurnal Teknik Informatika dan Sistem Informasi)
Publisher : Lembaga Penelitian dan Pengabdian pada Masyarakat (LPPM) STMIK Global Informatika MDP

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (192.381 KB) | DOI: 10.35957/jatisi.v7i1.237

Abstract

This research builds the detection of php scripts using the Forward Taint data analysis method. Research has been carried out to test this attack. However, the accuracy that has been inferred is still very low. This is getting higher because of the false positive generated. So in solving this problem, the forward taint data analysis method performs double checks that will reduce the positive false value generated. Accuracy resulting from this research reached 90%. These results outperform other existing methods.
Penerapan Metode Anomaly Based Detection Untuk Mendeteksi Serangan Black Hole Pada Topologi Mesh Di Lora Anjar Apriyanti; Vera Suryani; Aulia Arif Wardana
eProceedings of Engineering Vol 7, No 2 (2020): Agustus 2020
Publisher : eProceedings of Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstrak LoRa adalah sistem telekomunikasi nirkabel jarak jauh, dan berdaya rendah. LoRa masih rentan terhadap bentuk serangan yang dapat merusak rute pengiriman data, serta dapat menghapus data beserta informasi pada LoRa. Salah satu serangan yang terdapat pada LoRa adalah Black Hole. Penilitian ini fokus pada pendeteksian dan pencegahan node yang berperan sebagai node black hole yang mendrop paket dengan menggunakan metode Anomaly Based Detection dan menggunakan parameter packet loss pada topologi mesh di LoRa. Pengujian ini dilakukan dengan jumlah node sebanyak 6 node, 1 node berperan sebagai gateway, node 6 berperan sebagai node black hole, dengan kondisi pada node normal dan node yang terdapat black hole node. Dari penilitian ini dapat disimpulkan bahwa node black hole dapat terdeteksi dengan menggunakan anomaly based detection. Serta dapat melakukan pencegahan terhadap node black hole dengan menggunakan metode Baited Based. Kata kunci : LoRa, Black Hole, Node, Mesh. Abstract LoRa is a low-power wireless telecommunications system. LoRa is still vulnerable to forms of attack that can damage data delivery routes, and can delete data and information on LoRa. One of the attacks found on LoRa is the Black Hole attack. This research focuses on detecting and prevention nodes that act as black hole nodes dropping packets using the Anomaly Based Detection method and using packet loss parameters on the mesh topology in LoRa. This test is carried out with 6 nodes, 1 node acts as a gateway, node 6 acts as a black hole node, with conditions on normal nodes and nodes that have black hole nodes. From this research it can be concluded that black hole nodes can be detected using anomaly based detection. And can prevent black hole nodes using by Baited Based method. Keywords: LoRa, Black Hole, Node, Mesh.
Penerapan Keamanan Komunikasi Pada Jaringan Lora(long Range) Menggunakan Algoritma Advanced Encryption Standard(aes) Dan Message Authentication Code(mac) Putri Apriyanti Windya; Vera Suryani; Aulia Arif Wardana
eProceedings of Engineering Vol 8, No 2 (2021): April 2021
Publisher : eProceedings of Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstrak Internet of Things (IoT) merupakan suatu hal yang populer saat ini. Penggunaan IoT semakin meningkat setiap tahun khususnya penggunaan LoRa, begitu juga dengan pengembangan perangkat IoT. Salah satu karakteristik perangkat IoT yaitu resource yang terbatas. Perangkat ini sering disebut sebagai constrained device IoT. Seiring dengan meningkatnya penggunaan LoRa, aspek keamanan komunikasi pada jaringan LoRa juga harus diperhatikan. Akan tetapi, keterbatasan resource yang dimiliki oleh perangkat IoT menjadi tantangan dalam memilih metode security yang sesuai. Oleh karena itu, untuk mengatasi masalah tersebut dibutuhkan sebuah metode security yang sesuai yaitu pemanfaatan algoritma AES dan MAC. Jenis AES yang digunakan pada penelitian ini yaitu AES128 dan AES256. Sedangkan Algoritma MAC yang digunakan adalah Hash-based Message Authentication Code (HMAC). Berdasarkan hasil analisis keamanan yang telah dilakukan, metode ini mampu menjamin aspek confidentiality, integrity dan authentication. Selain itu, penelitian ini juga melakukan analisis overhead pada constrained devices IoT kelas 0 dan kelas 2. Hasil analisis overhead menunjukkan bahwa metode ini cocok untuk diterapkan pada kelas 0 dan kelas 2. Kata kunci : Long Range, constrained devices, CIA, AES, HMAC Abstract Internet of Things (IoT) is a popular thing nowadays. The use of IoT is increasing every year especially the use of LoRa, as well as the development of IoT devices. One of the characteristics of IoT devices is limited resources. This device is often referred to as IoT-constrained devices. Along with the increasing use of LoRa, the communication security aspect of the LoRa network must also be considered. However, the limited resources possessed by IoT devices are a challenge in choosing the appropriate security method. Therefore, to overcome this problem an appropriate security method is needed namely the use of AES algorithms and MAC. Variants of AES algorithm used in this research are AES128 and AES256. Meanwhile, the MAC algorithm used is Hash-based Message Authentication Code (HMAC). Based on the results of the security analysis that has been done, this methode is able to guarantee aspects of confidentiality, integrity and authentication. In addition, this study also performs overhead analysis on IoT constrained devices class 0 and class 2. The results of the overhead analysis show that this method is suitable to be implemented on IoT constrained devices class 0 and class 2. Keywords: Long Range, constrained devices, CIA, AES, HMAC
Analisis Dan Implementasi Sistem Pendeteksi Ijazah Dan Transkrip Palsu Dengan Menggunakan Ipfs Dan Smart Contract Blockchain Muhammad Danil Muis; Parman Sukarno; Aulia Arif Wardana
eProceedings of Engineering Vol 8, No 5 (2021): Oktober 2021
Publisher : eProceedings of Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Pemalsuan ijazah/transkrip merupakan salah satu masalah dalam dunia pendidikan. Dalam menyikapi hal ini, Lembaga Layanan Pendidikan Tinggi membuat Sistem Verifikasi Ijazah Secara Online (SIVIL) dan kebijakan Penomoran Ijazah Nasional (PIN). Sistem yang dibangun masih menggunakan penyimpanan secara terpusat sehingga rentan terhadap peretasan seperti SQLInjection yang membahayakan data. Oleh karena itu, sistem yang dikembangkan pada penelitian ini menggunakan penyimpanan terdistribusi untuk mencegah terjadinya serangan tersebut. Sistem ini menggunakan InterPlanetary File System (IPFS) untuk menyimpan data secara terdistribusi dan smart contract blockchain untuk menyimpan hash file ijazah/transkrip. Dalam mengetahui performansi sistem, maka dilakukan pengujian Quality of Service (QoS) dengan menggunakan parameter throughput, packet loss dan delay serta analisis penggunaan Central Processing Unit (CPU) dan Random Access Memory (RAM). Berdasarkan penelitian yang sudah dilakukan, sistem pendeteksi ijazah/transkrip palsu dapat dijalankan dengan baik dengan menggunakan 1 node sampai dengan 5 node. Nilai throughout terbaik pada saat proses pembuatan serta proses validasi ijazah/transkrip adalah dengan menggunakan 1 node. Nilai packet loss pada proses pembuatan serta proses validasi ijazah/transkrip memiliki kategori sangat bagus. Nilai delay pada proses pembuatan serta proses validasi ijazah/transkrip memiliki kategori sangat bagus. Kata kunci : IPFS, Blockchain, Ijazah
Access Control and File Distribution Management for Electronic Diploma and Transcript using Ethereum Smart Contract and InterPlanetary File System Muhammad Danil Muis; Muhammad Rifki Fauzan; Parman Sukarno; Aulia Arif Wardana
Jurnal Sistem Informasi Vol. 17 No. 2 (2021): Jurnal Sistem Informasi (Journal of Information System)
Publisher : Faculty of Computer Science Universitas Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (575.083 KB) | DOI: 10.21609/jsi.v17i2.1093

Abstract

This reserach build access control and file distribution management system for electronic diploma and transcript using ethereum smart contract and InterPlanetary File System (IPFS). The falsification of diplomas/transcripts is one of the problems in education. In Indonesia, falsification of diplomas/transcripts is a form of criminal act of falsifying letters. In addition, diplomas/transcripts that have not been digitalized make them easily damaged, lost, and difficult to manage. Therefore, this research developed digital diploma/transcript as digital twin from the hardcopy of diploma/tramscript. This research used IPFS to store data in a distributed system and Smart Contracts Blockchain to store and protect the digital diploma/transcript. The system also comes with access control to create and give approval for diplomas or transcripts to be published and saved into the system. Access control settings will be saved using the blockchain. This research using Quality of Service test method for measurethroughput, packet loss, and delay. Beside that, tis research also analysis the usage of Central Processing Unit and Random Access Memory from the system. Based on the test that has been done, the fake diploma/transcript detection system can be run properly by using 1 node to 5 nodes. The best throughput value during the process of making and validating the diploma/transcript is to use 1 node. The value of packet loss in the process of making and validating the certificate/transcript has a very good category. The value of delay in the process of making and validating the diploma/transcript has a very good category.
Monitoring Floating Solar Tracker Based on Axis Coordinates using LoRa Network Abyan Arief Fernandez; Andrian Rakhmatsyah; Aulia Arif Wardana
International Journal of Renewable Energy Development Vol 9, No 2 (2020): July 2020
Publisher : Center of Biomass & Renewable Energy, Diponegoro University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/ijred.9.2.141-149

Abstract

This research aimed to build a solar tracker for a floating solar panel and used long–range (LoRa) communication to harvest energy and monitor its process. With the rising demand for renewable energy in these recent years especially for solar energy, it needs to meet this demand to remain relevant for the upcoming years where it will have an even larger impact as we shift into clean energy. Monitoring single–axis solar trackers on rural areas difficult and cost–intensive. The purpose of a floating solar farm is to reduce the cost from buying/renting land. Floating solar panels cannot be monitored using wired because they are moving nodes in the water, it makes wired installation complicated. Hence, using wireless sensornetwork is a solution that allowsremote monitoring of floating solar panels in rural areas and makes moving nodes mentioned above possible. Testing wasperformed by sending 100 packets from the node to its gateway using LoRa modulation, and the gateway successfully received about 90% of the packets sent by the node. The vertical single-axis solar tracker used in floating solar managed to get 17% more energy than the fixed solar with a more stable income for the whole duration of sending 100 packets.
Estimasi Utilisasi Prosesor pada Jaringan Interkoneksi Optik menggunakan Regresi Gaussian NUHA, HILAL HUDAN; WARDANA, AULIA ARIF
ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika Vol 10, No 3: Published July 2022
Publisher : Institut Teknologi Nasional, Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26760/elkomika.v10i3.702

Abstract

ABSTRAKTeknologi prosesor paralel melibatkan lebih dari satu node prosesor dalam interkoneksi optik. Unjuk kerja dari desain dari jaringan optik tersebut harus diestimasi sebelum diimplementasikan. Atribut yang bisa diambil diambil dari desain tersebut yaitu nomor node dan thread, distribusi spasial dan temporal, dan rasio T/R. Kajian ini mengevaluasi teknik estimasi utilitasi prosesor menggunakan regresi Gaussian yang dibandingkan dengan Support Vector Machine untuk regresi dan regresi linear. Hasil percobaan penunjukkan bahwa regresi Gaussian menghasilkan akurasi estimasi paling tinggi dengan nilai koefisien determinasi sebesar 98.75%.Kata kunci: Utilisasi prosesor, interkoneksi optik, regresi Gaussian ABSTRACTParallel processor technology involves more than one processor node in an optical interconnection. The performance of the design of the optical network must be estimated before further deployment. The attributes that can be obtained from the design are the number of nodes and threads, the spatial and temporal distribution, and the T/R ratio. This study evaluates the processor utility estimation technique using Gaussian regression compared to the Support Vector Machine for linear regression and regression. The experimental results show that Gaussian regression produces the highest estimation accuracy with a coefficient of determination of 98.75%.Keywords: Processor Utilization, Optical Interconnection, Gaussian Regression
Electronic Medical Records (EMR) Using a Software as a Service (SaaS) with a Single Identity Number at the Polije Polyclinic Pratama, Mudafiq Riyan; Alfiansyah, Gamasiano; Swari, Selvia Juwita; Wardana, Aulia Arif
International Journal of Health and Information System Vol. 1 No. 2 (2023): September
Publisher : Indonesian Journal Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47134/ijhis.v1i2.12

Abstract

Manual management of medical records at the Polije Polyclinic causes long data retrieval time, misfiling, and requiring a lot of spaces for storage, thus hampering health services. Electronic Medical Records (EMR) are one type of medical record management that can be used to solve the issue. EMR is built based on Software as a Service (SaaS) which enables it to be used by all healthcare providers with minimal infrastructure and optimal data integration. The application used a single identity number for each patient, and it caused less redundancy in patient registration data. Developed using the Waterfall method, it was processed at several stages: analysis, design, implementation, testing, deployment, and maintenance. The EMR system had some features: recording history, diagnosis, and therapy. In the diagnosis section, the system had a disease code related to ICD-10. It can be concluded that the Electronic Medical Record (EMR) is ready to be implemented in the POLIJE polyclinic. The implementation of EMR is important to reinforce the Regulation of the Indonesian Minister of Health Number 24 of 2022 concerning Medical Records.
Implementasi Ethereum Blockchain dan Smart Contract Pada Jaringan Smart Energy Meter Mabruroh, Anggun Mugi; Dewanta, Favian; Wardana, Aulia Arif
MULTINETICS Vol. 7 No. 1 (2021): MULTINETICS Mei (2021)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v7i1.4122

Abstract

In this study, we propose the creation of an Internet of Things device, namely a smart energy meter by implementing a blockchain system as a database. Internet of Things has a centralized storage system on the database server, if the server is down then the database cannot be used and data may be lost. There is a storage system that has a decentralized and distributed network, namely the blockchain. The private blockchain system is built using the Ethereum framework. Sensor data will be read by the Raspberry Pi 4B and sent to node 1 via MQTT. Node 1 will save the data to the block. Two nodes Ethereum account will validate the block. If accepted then the block will be stored on the blockchain and create a new block chain. In the storage process, there is a smart contract between Ethereum accounts that is created using Solidity and accessed using the web3 API. Successfully saved data will be displayed to the user's web. Based on the results of measuring the performance of the MQTT protocol and blockchain system when compared to traditional databases, blockchain is less fast in the storage process because there is a transaction process and data verification. However, if it is applied to smart energy meter data, it doesn't matter because the time required for the storage process is a maximum of 1 minute. The number of nodes and the size of the data or block does not affect the performance of the proof of authority consensus algorithm
Simplification of Workflow-oriented Security Assessment Yunizal, Edri; Wardana, Aulia Arif; Niarman, Abdurrahman
IJAIT (International Journal of Applied Information Technology) Vol 07 No 02 (November 2023)
Publisher : School of Applied Science, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/ijait.v7i02.6797

Abstract

One of the protection mechanisms for organizations to protect their data is through information security risk assessment. The main obstacle in this area is asset dependency. Previous research developments tended to produce models that were difficult to implement because they were only applied to small assets, in contrast to the complexity of implementation in the field. This form of problem solving is a workflow-oriented security assessment solution that provides security rationale from a holistic perspective. The weakness of complexity in workflow oriented then became the basis of this research. The proposed solution is a simplification by using combined nodes that enable a modular concept. The modular concept is then applied to a reliable model, a data flow diagram. The study output shows the contribution of offerings with assessment solutions that consider dependencies by simplifying asset complexity in workflows in a modular manner with data flow diagrams.