Busthomi, Iqbal
Unknown Affiliation

Published : 6 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 6 Documents
Search

OPTIMASI KEAMANAN AUTENTIKASI DARI MAN IN THE MIDDLE ATTACK (MITM) MENGGUNAKAN TEKNOLOGI BLOCKCHAIN Riadi, Imam; Umar, Rusydi; Busthomi, Iqbal
JIEET (Journal of Information Engineering and Educational Technology) Vol 4, No 1 (2020)
Publisher : Universitas Negeri Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/jieet.v4n1.p15-19

Abstract

Teknologi informasi memberikan dampak yang besar dalam aspek bisnis. Sistem informasi merupakan salah satu dampak dari kemajuan teknologi yang menjadi salah satu sarana untuk memudahkan pengelolaan informasi dan pelaporan pada sebuah perusahaan. Sistem informasi menggunakan proses autentikasi sebagai gerbang depan untuk melakukan validasi user sebelum mendapatkan layanan. Proses autentikasi memiliki kerentanan dari serangan siber, diantaranya adalah Man-in-the-middle attack. Payload autentikasi yang dikirim dan diterima pada sebuah sistem informasi perlu diamankan dengan baik. Pengiriman payload autentikasi dalam bentuk plaintext rentan akan serangan Man-in-the-middle. Teknologi Blockchain memberikan solusi keamanan berupa mekanisme blok hash untuk mengamankan data payload. Payload autentikasi sebelum dikirmkan diubah menjadi blok hash, sehingga keamanan dan kerahasiaan data payload lebih terjamin.
Optimasi Keamanan Autentikasi dari Man in the Middle Attack (MiTM) Menggunakan Teknologi Blockchain Riadi, Imam; Umar, Rusydi; Busthomi, Iqbal
JIEET (Journal of Information Engineering and Educational Technology) Vol 4, No 1 (2020)
Publisher : Universitas Negeri Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/jieet.v4n1.p15-19

Abstract

Teknologi informasi memberikan dampak yang besar dalam aspek bisnis. Sistem informasi merupakan salah satu dampak dari kemajuan teknologi yang menjadi salah satu sarana untuk memudahkan pengelolaan informasi dan pelaporan pada sebuah perusahaan. Sistem informasi menggunakan proses autentikasi sebagai gerbang depan untuk melakukan validasi user sebelum mendapatkan layanan. Proses autentikasi memiliki kerentanan dari serangan siber, diantaranya adalah Man-in-the-middle attack. Payload autentikasi yang dikirim dan diterima pada sebuah sistem informasi perlu diamankan dengan baik. Pengiriman payload autentikasi dalam bentuk plaintext rentan akan serangan Man-in-the-middle. Teknologi Blockchain memberikan solusi keamanan berupa mekanisme blok hash untuk mengamankan data payload. Payload autentikasi sebelum dikirmkan diubah menjadi blok hash, sehingga keamanan dan kerahasiaan data payload lebih terjamin.
Block-hash of blockchain framework against man-in-the-middle attacks Riadi, Imam; Umar, Rusydi; Busthomi, Iqbal; Muhammad, Arif Wirawan
Register: Jurnal Ilmiah Teknologi Sistem Informasi Vol 8, No 1 (2022): In progress (January)
Publisher : Information Systems - Universitas Pesantren Tinggi Darul Ulum

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26594/register.v8i1.2190

Abstract

Payload authentication is vulnerable to Man-in-the-middle (MITM) attack. Blockchain technology offers methods such as peer to peer, block hash, and proof-of-work to secure the payload of authentication process. The implementation uses block hash and proof-of-work methods on blockchain technology and testing is using White-box-testing and security tests distributed to system security practitioners who are competent in MITM attacks. The analyisis results before implementing Blockchain technology show that the authentication payload is still in plain text, so the data confidentiality has not minimize passive voice. After implementing Blockchain technology to the system, white-box testing using the Wireshark gives the result that the authentication payload sent has been well encrypted and safe enough. The percentage of security test results gets 95% which shows that securing the system from MITM attacks is relatively high. Although it has succeeded in securing the system from MITM attacks, it still has a vulnerability from other cyber attacks, so implementation of the Blockchain needs security improvisation.
Capabilities of cellebrite universal forensics extraction device in mobile device forensics Sutikno, Tole; Busthomi, Iqbal
Computer Science and Information Technologies Vol 5, No 3: November 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v5i3.p254-264

Abstract

The powerful digital forensics tool cellebrite universal forensics extraction device (UFED) extracts and analyzes mobile device data, helping investigators solve criminal and cybersecurity cases. Advanced methods and algorithms allow Cellebrite UFED to recover data from erased or obscured devices. Cellebrite UFED can pull data from call logs, texts, emails, and social media, providing valuable evidence for investigations. The use of smartphones and tablets in personal and professional settings has spurred the development of mobile device forensics. The intuitive user interface speeds up data extraction and analysis, revealing crucial information. It can decrypt encrypted data, recover deleted files, and extract data from multiple devices. The sector's best data extraction functionality, Cellebrite UFED, helps forensic analysts gather crucial evidence for investigations. Legal and ethical considerations are crucial in mobile device forensics. Legal considerations include allowing access to data, protecting privacy, and adhering to chain of custody protocols. Ethics include transparency, defamation, and information exploitation protection. Using Cellebrite UFED, researchers can navigate complex data on mobile devices more efficiently and precisely. Artificial intelligence (AI) and machine learning (ML) algorithms may automate data extraction in future tools. Examiners must train, maintain, and establish clear protocols for using Cellebrite UFED in forensic investigations.
Power of analytic tools in Oxygen Forensic® Detective based on NIST cybersecurity framework Sutikno, Tole; Busthomi, Iqbal
Computer Science and Information Technologies Vol 6, No 1: March 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v6i1.p8-19

Abstract

The National Institute of Standards and Technology (NIST) cybersecurity framework is a systematic approach for assessing and improving cybersecurity procedures in digital investigations. Oxygen Forensic® Detective is a digital forensic software that integrates multiple analytic tools to assist investigators in extracting valuable insights from digital evidence. The analytic tools, including timeline, social graph, image categorization, facial categorization, maps, data search, key evidence, optical character recognition, statistics, and translation, assist investigators in thoroughly analyzing digital artifacts, establishing connections, and accurately classifying images with precision and effectiveness. By incorporating these analytical resources into Oxygen Forensic® Detective, a comprehensive strategy is established to effectively combat cyber threats. The NIST cybersecurity framework is incorporated into the tool, offering a methodical approach to identifying and reducing cybersecurity risks. Law enforcement agencies can enhance the productivity and effectiveness of their forensic methodologies by implementing these advanced technologies. This can result in successful prosecutions and improved cybersecurity practices.  Overall, the utilization of analytical tools in criminological inquiries has experienced a substantial rise in the contemporary digital era.
Block-hash of blockchain framework against man-in-the-middle attacks Riadi, Imam; Umar, Rusydi; Busthomi, Iqbal; Muhammad, Arif Wirawan
Register: Jurnal Ilmiah Teknologi Sistem Informasi Vol 8 No 1 (2022): January
Publisher : Information Systems - Universitas Pesantren Tinggi Darul Ulum

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26594/register.v8i1.2190

Abstract

Payload authentication is vulnerable to Man-in-the-middle (MITM) attack. Blockchain technology offers methods such as peer to peer, block hash, and proof-of-work to secure the payload of authentication process. The implementation uses block hash and proof-of-work methods on blockchain technology and testing is using White-box-testing and security tests distributed to system security practitioners who are competent in MITM attacks. The analyisis results before implementing Blockchain technology show that the authentication payload is still in plain text, so the data confidentiality has not minimize passive voice. After implementing Blockchain technology to the system, white-box testing using the Wireshark gives the result that the authentication payload sent has been well encrypted and safe enough. The percentage of security test results gets 95% which shows that securing the system from MITM attacks is relatively high. Although it has succeeded in securing the system from MITM attacks, it still has a vulnerability from other cyber attacks, so implementation of the Blockchain needs security improvisation.