Claim Missing Document
Check
Articles

Automation of Software Defined Network (SDN) Configuration Management Based on Proxmox with Ansible Marzuki, Khairan; Husain, Husain; Apriliana, Zikriati
International Journal of Electronics and Communications Systems Vol. 4 No. 2 (2024): International Journal of Electronics and Communications System
Publisher : Universitas Islam Negeri Raden Intan Lampung, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24042/ijecs.v4i2.23821

Abstract

Automation of software-defined networking (SDN) in Proxmox VE 8.1 enhances virtual network management by improving efficiency, scalability, and the speed of network configuration changes. This study aims to automate SDN configuration management in Proxmox VE using Ansible and evaluate its performance. The research follows the Network Development Life Cycle (NDLC) method, consisting of six stages: Analysis, Design, Simulation Prototyping, Implementation, Monitoring, and Management. Automation was implemented successfully using an Ansible playbook to manage creating and deleting zones, VNets, subnets, IP gateways, and DHCP ranges. The automated process was tested over three trials, with creation times of 23, 20, and 21 seconds and deletion times of 20, 19, and 20 seconds, respectively. By contrast, the manual process required 6 minutes 6 seconds for creation and 2 minutes 37 seconds for deletion. These results demonstrate that automation using Ansible significantly reduces configuration time, offering a more efficient and reliable approach than manual methods. The findings highlight the potential of Ansible to streamline SDN management in Proxmox VE, saving time, energy, and resources while ensuring scalability and consistency in virtualized network environments.
Otomatisasi Konfigurasi Wazuh Terintegrasi VirusTotal Menggunakan Ansible Untuk Mendeteksi dan Memproteksi Serangan Malware Putra, Muhamad Alvan Ekawan; Hariyadi, I Putu; Marzuki, Khairan
Melek IT : Information Technology Journal Vol. 11 No. 1 (2025): Melek IT: Information Technology Journal
Publisher : Informatics Department-Universitas Wijaya Kusuma Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30742/melekitjournal.v11i1.403

Abstract

Pesatnya perkembangan teknologi digital turut meningkatkan risiko Malware yang dapat mengganggu sistem, mencuri data, dan menghambat operasional. Wazuh hadir sebagai solusi open-source untuk mendeteksi aktivitas mencurigakan melalui analisis log, namun akurasinya dapat ditingkatkan dengan integrasi VirusTotal sebagai layanan verifikasi file mencurigakan. Tujuan utama dari penelitian ini adalah membangun playbook Ansible untuk mengotomatisasi proses instalasi, konfigurasi Wazuh, integrasi dengan VirusTotal, dan pengiriman notifikasi ke Telegram secara real-time. Metode yang digunakan adalah pendekatan Network Development Life Cycle (NDLC) dengan tiga tahapan, yaitu: analisis, desain, dan simulation prototyping. Analisis dilakukan dengan studi literatur dan perbandingan penelitian terdahulu. Tahap desain mencakup perancangan jaringan, sistem, dan konfigurasi IP. Tahap simulasi dilakukan dalam lingkungan virtual menggunakan lima VM yang terdiri dari server Wazuh, server Ansible, dua agen (Windows dan Linux), serta satu VM tambahan untuk pengujian. Hasil penelitian menunjukkan bahwa sistem yang dikembangkan mampu secara efektif mendeteksi tiga jenis Malware utama (Trojan, Ransomware, dan Worm), melakukan active response, dan mengirimkan peringatan secara otomatis melalui Telegram. Proses instalasi dan konfigurasi dapat dilakukan dengan lebih cepat dan konsisten berkat playbook Ansible. Sistem ini juga terbukti handal dan efisien dalam menangani serangan Malware secara otomatis. Kesimpulan dari penelitian ini adalah bahwa integrasi Wazuh dan VirusTotal yang diotomatisasi konfigurasinya menggunakan Ansible dapat meningkatkan efisiensi, akurasi, dan skalabilitas dalam deteksi serta proteksi terhadap Malware. Otomatisasi ini tidak hanya mempercepat proses pengamanan, tetapi juga mengurangi kesalahan konfigurasi manual, sehingga memberikan solusi keamanan yang lebih tangguh dan dapat dikembangkan lebih lanjut.
Rancang Bangun Jaringan Komputer LAN Berdasarkan Perbandingan Kinerja Routing Protokol EIGRP dan Routing Protokol OSPF Mardedi, Lalu Zazuli Azhar; Marzuki, Khairan
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol. 18 No. 2 (2019)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v18i2.372

Abstract

Nowadays computer networks are growing rapidly and internet usage is increasing everyday. The need to design an internet network cannot be separated from the routing protocol which functions to integrate all computers with the highest flexibility. Routing is one part that provides effective performance in the network. In comparing the performance of EIGRP and OSPF routing protocols, the implementation of EIGRP and OSPF must be implemented when building a network, so administrators easily know the difference in the performance values of the two routing protocols. The discussion in this study is to compare the performance of the EIGRP routing protocol and OSPF routing protocol that is on the network using the hybird topology. Overcoming problems with high-scale network access, we will analyze and compare performance between EIGRP routing protocol and OSPF routing protocol. In obtaining the value and to verify the results of the implementation, the simulation software uses a Packet Tracer simulator.
IMPLEMENTASI CHATBOT PADA TELEGRAM UNTUK MENDETEKSI SPAM MENGGUNAKAN METODE XGBOOST Juliyanto, Fery; Husain; Lilik Widyawati; Khairan Marzuki; I Made Yadi Dharma
Jurnal Manajemen Informatika dan Sistem Informasi Vol. 8 No. 2 (2025): MISI Juni 2025
Publisher : LPPM STMIK Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36595/misi.v8i2.1681

Abstract

Meningkatnya pemakaian aplikasi Telegram sebagai sarana komunikasi mendorong kebutuhan akan sistem otomatis yang bisa mendeteksi pesan spam secara langsung, karena pesan spam dapat mengganggu kenyamanan pengguna dan bahkan menyebabkan kerugian. Studi ini bertujuan untuk merancang dan menerapkan chatbot di Telegram untuk mengidentifikasi pesan spam dengan metode XGBoost. Proses pengembangan mengikuti langkah-langkah CRISP-DM, yang mencakup business understanding, data preparation, modeling, evaluation, dan deployment. Dataset terbagi menjadi dua bagian, yaitu data pelatihan dan data pengujian, untuk mengukur kinerja model. Model XGBoost dilatih menggunakan data training dan diuji dengan data testing pada tiga skenario pembagian proporsi, yaitu 70% - 30%, 80% - 20%, dan 90% - 10%, guna menghitung tingkat akurasi dalam mengklasifikasikan pesan sebagai spam atau non spam (ham). Hasil penerapan menunjukkan bahwa chatbot mampu mengenali pesan spam dengan baik dan dapat melakukan tindakan seperti memberikan peringatan, menghapus pesan spam, serta memblokir pengirim jika ada pengulangan pesan spam yang sama lebih dari dua kali. Oleh karena itu, sistem ini dapat mempertahankan kenyamanan komunikasi di platform Telegram dengan cara yang otomatis dan fleksibel. Tingkat akurasi tertinggi yang diraih dari semua pengujian adalah 0.9656 atau 96.57%. Rata-rata precision untuk pesan ham dan spam adalah 96% dan 97%, recall masing-masing sebesar 96% dan 97%, serta F1-score masing-masing 96% dan 97%. Matriks kebingungan pada setiap skenario menunjukkan akurasi yaitu 94.86% (70% - 30%), 94.42% (80% - 20%), dan 94.87% (90% - 10%). Kontribusi utama dari studi ini adalah hadirnya sistem chatbot berbasis XGBoost yang terintegrasi dalam aplikasi Telegram, yang dapat mendeteksi dan menangani pesan spam secara langsung. Sistem ini membantu menciptakan suasana komunikasi yang lebih aman, nyaman, dan secara otomatis terhindar dari gangguan spam.
Evaluasi Tata Kelola Teknologi Informasi Pada Aplikasi ”Sipantes” Menggunakan Cobit 5.0 Pada Domain Edm dan Dss Lalu Ahmad Najmul Munir; Khairan Marzuki
Jurnal Riset Multidisiplin Edukasi Vol. 2 No. 8 (2025): Jurnal Riset Multidisiplin Edukasi (Edisi Agustus 2025)
Publisher : PT. Hasba Edukasi Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.71282/jurmie.v2i8.801

Abstract

Saat ini, implementasi Teknologi Informasi di Dinas Sosial Kota Mataram telah dijalankan, beberapa bagian unit kerja sudah memanfaatkan teknolo-gi informasi dalam proses bisnisnya, namun terdapat beberapa kendala yang mengganggu dalam proses bisnisnya. Sebagai contoh, di beberapa unit kerja di Program Keluarga Harapan (PKH) kekurangan sumber daya manusia untuk mengelola dan mengembangkan sistem dan teknologi informasi dan unit kerjanya, selain itu pada saat pergantian jabatan atau per-pindahan lokasi kerja seringkali menyebabkan kosongnya posisi personil yang mengelola aplikasi SIPANTES. Dari permasalahan itu penelitian ini menggunakan Framework Cobit 5.0 dengan menggunakan Domain Evaluate, Direct and Monitor (EDM) dan Deliver, Service and Support (DSS). Pemilihan domain pada tata kelola teknologi informasi berdasarkan kebutuhan organisasi saat ini. Populasi dalam penelitian ini adalah pegawai Dinas Sosial Kota Mataram, Pendamping PKH, dan Pendamping Sosial Masyarakat yang berjumlah 106 orang. Hasil dari penelitian ini yaitu Pada domain EDM01 mendapatkan nilai akhir sebesar 0,82 yang dimana pengaturan dan pemeliharaan kerangka tata kelola pada Dinas Sosial Kota Mataram sudah terbilang baik, Pada domain EDM04 mendapatkan nilai akhir sebesar 1,01 yang dimana pengoptimalan sumber daya pada Dinas Sosial Kota Mataram sudah terbilang baik, Pada domain EDM05 mendapatkan nilai akhir sebesar 1,01 yang dimana transparansi pemangku kepentingan pada Dinas Sosial Kota Mataram sudah terbilang baik, Pada domain DSS03 mendapatkan nilai akhir sebesar 0.94 yang dimana pengelolaan permasalahan pada Dinas Sosial Kota Mataram sudah terbilang baik, dan Pada domain DSS05 mendapatkan nilai akhir sebesar 1,02 yang dimana pengelolaan layanan keamanan pada Dinas Sosial Kota Mataram sudah terbilang cukup baik.
Implementation of Neural Machine Translation in Translating from Indonesian to Sasak Language Wardhana, Helna; Yadi Dharma, I Made; Marzuki, Khairan; Syarif Hidayatullah, Ibjan
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol. 23 No. 2 (2024)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v23i2.3465

Abstract

Language translation is part of Natural Language Processing, also known as Machine Translation, which helps the process of learning foreign and regional languages using translation technology in sentence form. In Lombok, there are still people who are not very fluent in Indonesian because Indonesian is generally only used at formal events. This research aimed to develop a translation model from Indonesian to Sasak. The method used was the Neural Machine Translation with the Recurrent Neural Network - Long Short Term Memory architecture and the Word2Vec Embedding with a sentence translation system. The dataset used was a parallel corpus from the Tatoeba Project and other open sources, divided into 80% training and 20% validation data. The result of this research was the application of Neural Machine Translation with the Recurrent Neural Network - Long Short Term Memory algorithm, which could produce a model with an accuracy of 99.6% in training data and 71.9% in test data. The highest ROUGE evaluation metric result obtained on the model was 88%. This research contributed to providing a translation model from Indonesian to Sasak for the local community to facilitate communication and preserve regional language culture.
Penerapan Algoritma Cosine Similarity dan Pembobotan TF-IDF System Penerimaan Mahasiswa Baru pada Kampus Swasta Apriani, Apriani; Zakiyudin, Hizbu; Marzuki, Khairan
Jurnal Bumigora Information Technology (BITe) Vol. 3 No. 1 (2021)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/bite.v3i1.1110

Abstract

The era of globalization is marked by the development of technology and information, this has an impact on the human need for information. PMB(Reception New Students) is a routine college activity at each opening of new teachings. The implementation of PMB is not without questions that has been asked before. By making use of technology information the an FAQ (Frequently Asked Questions) was born which contain answers of the questions that are often asked by people who are need information. To reduce the question repeatedly, then an FAQ answering system was built by applying TF-IDF (Term Frequency - Inverse Document) and the cosine similarity algorithm. TF-IDFweighting is a method for giving weights the relationship of a word (term) to a document is based on two concepts, namely frequency of occurrence of words in a document and frequency inverse documents containing the word. Meanwhile, cosine similarity is a method used to calculate the level of similarity between two objects. This method calculates the similarity between two pieces the object represented in two vectors using keywords of a document as a measure. This study uses 7 data samples from all FAQ data obtained from an interview with Ms. Susilawati, S.Kom. The sample data used will go through a processpreprocessing, TF-IDF weighting, and the cosine similarity method fordetermines the highest level of similarity that will come out as a result end. By using TF-IDF weighting and the cosine similarity method on 7 sample data can get an accuracy rate of up to 64,28%.
Peningkatan Kinerja Metode Random Forest Berbasis Smote-Tomek Link Pada Sentimen Analisis Pariwisata Lombok Marzuki, Khairan; Rady Putra, Lalu Ganda; Hairani, Hairani; Mardedi, Lalu Zazuli Azhar; Guterres, Juvinal Ximenes
Jurnal Bumigora Information Technology (BITe) Vol. 5 No. 2 (2023)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/bite.v5i2.3166

Abstract

Background: Tourists visiting Lombok Island can access various sources of tourist information and can share their views and tourist experiences through social media such as positive and negative experiences. Objective: This research aims to analyze the sentiment of Lombok tourism reviews using the Smote-Tomek Link and Random Forest algorithms.Methods: The research was carried out in several stages, namely collecting the Lombok tourism dataset, text preprocessing, text weighting using the Term Frequency-Inverse Document Frequency (TF-IDF) method, data sampling using SMOTE-Tomek Link, text classification using Random Forest, and the final stage was performance testing based on accuracy. Result: The research results obtained using the Smote-Tomek Link and Random Forest methods in sentiment analysis analysis of tourist reviews about Lombok were 94%. Conclusion: The use of the Smote-Tomek Link and Random Forest methods in Lombok tourism sentiment analysis produces very good accuracy.
Bandwith Optimization on Hotspot using PCQ Method And L2tp VPN Routing for Online Game Latency Affan, Usman Ibnu; Marzuki, Khairan; Mardedi, Lalu Zazuli Azhar
International Journal of Engineering and Computer Science Applications (IJECSA) Vol. 1 No. 2 (2022): September 2022
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v1i2.2379

Abstract

VPN L2TP (Layer 2 Tunneling Protocol) is available on one of the services at Mikrotik. L2TP is a development of PPTP and a combination of L2F. The network security protocol and encryption used for authentication is the same as PPTP. However, to communicate, L2TP requires UDP port 1701 so that the security is better, L2TP is connected to IPSec to L2TP/IPSec. An example of its use is for the Windows operating system, which by default the Windows OS uses L2TP/IPSec. However, the consequences in terms of configuration are not as simple as PPTP. The client side must also support IPSec when implementing L2TP/IPSec. In terms of encryption, of course, encryption on L2TP/IPSec has a higher level of security than PPTP which uses MPPE. Traffic passing through the L2TP tunnel will experience overhead. The L2TP protocol is more firewall friendly than other types of VPNs such as PPTP. This is a big advantage if using this protocol, because most firewalls do not support GRE. However, L2TP does not have encryption, so it requires additional services to support higher security. So the author concludes that it will be easier to configure with online games. Online game is a type of computer game that is currently growing and requires a computer network . The networks that are usually used are internet networks or internet wifi and the like and always use current technology, such as modems and cable connections. Therefore, internet service providers (ISPs) must provide stable and fast internet quality. Bandwidth Needs Online games must be supported by an internet network that supports the speed and stability of the internet connection, especially the stability of the latency of the online game itself
Implementasi Disaster Recovery melalui Backup Otomatis pada XenServer berbasis FreeNAS Ikrom, Paizul; Husain, Husain; Marzuki, Khairan; Azhar, Raisul; Hariyadi, I Putu
CORISINDO 2025 Vol. 1 (2025): Prosiding Seminar Nasional CORISINDO 2025
Publisher : CORISINDO 2025

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/corisindo.v1.5420

Abstract

Penelitian ini bertujuan untuk mengembangkan sistem disaster recovery dan backup data otomatis yang terintegrasi dengan XenServer, menggunakan FreeNAS sebagai media penyimpanan. Sistem dirancang untuk melakukan backup virtual machine (VM) secara otomatis dari XenServer ke FreeNAS Primary, dan dilanjutkan dengan replikasi ke FreeNAS Secondary sebagai cadangan tambahan. Proses backup dilakukan secara terjadwal menggunakan skrip otomatis berbasis cron dan rsync, serta ditambahkan fitur notifikasi untuk memantau keberhasilan proses backup. Implementasi dilakukan dalam beberapa tahap, mulai dari konfigurasi jaringan NFS antara XenServer dan FreeNAS, pengujian proses backup harian, replikasi data antar storage, hingga simulasi proses restore VM dari backup. Hasil pengujian menunjukkan bahwa sistem mampu melakukan backup dan replikasi secara konsisten, serta dapat melakukan pemulihan data dengan cepat ketika terjadi kerusakan atau kehilangan data di XenServer. Proses backup otomatis menggunakan cron telah terbukti berjalan secara terjadwal dan konsisten. Setiap file hasil backup disimpan dalam direktori yang sama dengan penamaan unik berdasarkan tanggal dan waktu (timestamp), sehingga tidak terjadi penimpaan antar file.