Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : EDUMATIC: Jurnal Pendidikan Informatika

Network Forensic Serangan DoS pada Jaringan Cloud berdasarkan Generic Framework for Network Forensics (GFNF) Tri Hesti Damayanti; Ira Rosianal Hikmah
Jurnal Pendidikan Informatika (EDUMATIC) Vol 6, No 2 (2022): Edumatic: Jurnal Pendidikan Informatika
Publisher : Universitas Hamzanwadi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29408/edumatic.v6i2.6466

Abstract

The attacks on cloud-based networks have increased and could lead to various disadvantages such as the inaccessibility of services until the loss of user’s trust. Owncloud is one cloud implementation that runs on a network with more than 200 million users. The aims of these researches are to find digital evidence from DoS attacks. Some DoS attacks are SSH brute force, SYN flood, ping of death, and port scanning on the Owncloud network and then finding the digital evidence such as the attacker's IP, time occurred of the attack, types of the attack, also the resource usage of CPU and RAM. This research uses Wireshark and Snort tools to analyze the network and the method of Generic Framework for Network Forensic (GFNF) as a framework during the simulation process until performing the evidence. The simulation was carried out for 1 minute with 30 trials for each attack. The results of this study found the attacker’s IP, time of the attack occurred, types of attack, and also the increase of the resource usage on CPU and RAM when an attack occurred. The found of results digital evidence such as the attacker's IP, the time occurred of attack, and the types of attack were visualized as a table and presented on the ELK Stack dashboard. 
Analisis Perbandingan Kinerja dan Kegunaan Aplikasi Pengelola Kata Sandi Closed-Source berdasarkan ISO/IEC 25010 Whisnu Yudha Aditama; Ira Rosianal Hikmah
Jurnal Pendidikan Informatika (EDUMATIC) Vol 6 No 2 (2022): Edumatic: Jurnal Pendidikan Informatika
Publisher : Universitas Hamzanwadi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29408/edumatic.v6i2.6697

Abstract

The number of services used by internet users such as social media, online transportation, entertainment, and banking. this encourages the use of weak, short, and repetitive passwords that can trigger sensitive data leaks and impact individuals or organizations. These problems can be overcome with open-source and closed-source password manager applications to help users create, store, and manage passwords. Closed-source password manager apps have an advantage in the features they provide compared to open-source ones. The many providers of password manager applications make users face many choices so that the specifications of the password manager application need to be known as consideration for determining the application to be used. In this study, a comparative analysis was conducted to assess the advantages and disadvantages of several popular and widely used closed-source password management applications, including Lastpass, 1Password, and Keeper. Comparative analysis was carried out based on the performance, and usability of ISO/IEC 25010. This study used mixed methods. Quantitative data was obtained during performance testing, while qualitative data was obtained when distributing questionnaires to measure usability. The result is that, in terms of performance characteristics, each application has its own advantages in a different sub-characteristic. On usability characteristics, Keeper application excels in four sub characteristics while 1Password excels in two sub characteristics.