Claim Missing Document
Check
Articles

Found 37 Documents
Search

Analysis and Implementation of Comparison Between Podman and Docker in Container Management Husain, Husain; Marzuki, Khairan; lauw, Christopher Michael; Azhar Mardedi, Lalu Zazuli
International Journal of Electronics and Communications Systems Vol. 3 No. 2 (2023): International Journal of Electronics and Communications System
Publisher : Universitas Islam Negeri Raden Intan Lampung, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24042/ijecs.v3i2.19860

Abstract

The increasing use of the internet makes the implementation process more accessible, but the problem is that it is difficult to manage network management, with the emergence of container technologies such as Docker and Podman as efficient application management solutions. This research compares Docker and Podman regarding container management using the Network Development Life Cycle (NDLC) methodology. This study evaluates three parameters: accessing the Fedora project registry, handling images or ISOs, and user access in containers. The results show that Podman performs better regarding registry access, is slightly faster with images, and offers faster user creation. Overall, the study concludes that Podman is superior, demonstrating compatibility with Docker and proving its efficacy in container management.
Automation of Software Defined Network (SDN) Configuration Management Based on Proxmox with Ansible Marzuki, Khairan; Husain, Husain; Apriliana, Zikriati
International Journal of Electronics and Communications Systems Vol. 4 No. 2 (2024): International Journal of Electronics and Communications System
Publisher : Universitas Islam Negeri Raden Intan Lampung, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24042/ijecs.v4i2.23821

Abstract

Automation of software-defined networking (SDN) in Proxmox VE 8.1 enhances virtual network management by improving efficiency, scalability, and the speed of network configuration changes. This study aims to automate SDN configuration management in Proxmox VE using Ansible and evaluate its performance. The research follows the Network Development Life Cycle (NDLC) method, consisting of six stages: Analysis, Design, Simulation Prototyping, Implementation, Monitoring, and Management. Automation was implemented successfully using an Ansible playbook to manage creating and deleting zones, VNets, subnets, IP gateways, and DHCP ranges. The automated process was tested over three trials, with creation times of 23, 20, and 21 seconds and deletion times of 20, 19, and 20 seconds, respectively. By contrast, the manual process required 6 minutes 6 seconds for creation and 2 minutes 37 seconds for deletion. These results demonstrate that automation using Ansible significantly reduces configuration time, offering a more efficient and reliable approach than manual methods. The findings highlight the potential of Ansible to streamline SDN management in Proxmox VE, saving time, energy, and resources while ensuring scalability and consistency in virtualized network environments.
Otomatisasi Konfigurasi Wazuh Terintegrasi VirusTotal Menggunakan Ansible Untuk Mendeteksi dan Memproteksi Serangan Malware Putra, Muhamad Alvan Ekawan; Hariyadi, I Putu; Marzuki, Khairan
Melek IT : Information Technology Journal Vol. 11 No. 1 (2025): Melek IT: Information Technology Journal
Publisher : Informatics Department-Universitas Wijaya Kusuma Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30742/melekitjournal.v11i1.403

Abstract

The rapid advancement of digital technology has increased the risk of malware that can disrupt systems, steal data, and hinder operations. Wazuh emerges as an open-source solution capable of detecting suspicious activities through log analysis. However, its accuracy can be enhanced by integrating VirusTotal as a verification service for suspicious files. The main objective of this study is to develop an Ansible playbook to automate the installation process, Wazuh configuration, integration with VirusTotal, and real-time notification delivery to Telegram. The method used is the Network Development Life Cycle (NDLC) approach, consisting of three stages: analysis, design, and simulation prototyping. The analysis stage involves literature review and comparison of previous studies. The design stage covers network, system, and IP configuration planning. The simulation is conducted in a virtual environment using five virtual machines consisting of a Wazuh server, Ansible server, two agents (Windows and Linux), and an additional VM for configuration automation testing. The results show that the developed system effectively detects three main types of malware (trojan, ransomware, and worm), performs active response, and sends alerts automatically via Telegram. Installation and configuration processes become faster and more consistent thanks to the Ansible playbook. The system also proves to be reliable and efficient in handling malware attacks automatically. Active response timing varies for each type of malware—both in detection and removal—affected by internet connection quality and API usage time limits, leading to time differences. Additionally, the use of Ansible significantly reduces configuration time and minimizes the potential for human error during deployment in the virtual network environment. The conclusion of this study is that the integration of Wazuh and VirusTotal with Ansible-based configuration automation improves efficiency, accuracy, and scalability in malware detection and protection. This automation not only accelerates the security process but also reduces manual configuration errors, offering a more robust security solution that can be further developed.
Rancang Bangun Jaringan Komputer LAN Berdasarkan Perbandingan Kinerja Routing Protokol EIGRP dan Routing Protokol OSPF Mardedi, Lalu Zazuli Azhar; Marzuki, Khairan
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol. 18 No. 2 (2019)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v18i2.372

Abstract

Nowadays computer networks are growing rapidly and internet usage is increasing everyday. The need to design an internet network cannot be separated from the routing protocol which functions to integrate all computers with the highest flexibility. Routing is one part that provides effective performance in the network. In comparing the performance of EIGRP and OSPF routing protocols, the implementation of EIGRP and OSPF must be implemented when building a network, so administrators easily know the difference in the performance values of the two routing protocols. The discussion in this study is to compare the performance of the EIGRP routing protocol and OSPF routing protocol that is on the network using the hybird topology. Overcoming problems with high-scale network access, we will analyze and compare performance between EIGRP routing protocol and OSPF routing protocol. In obtaining the value and to verify the results of the implementation, the simulation software uses a Packet Tracer simulator.
IMPLEMENTASI CHATBOT PADA TELEGRAM UNTUK MENDETEKSI SPAM MENGGUNAKAN METODE XGBOOST Juliyanto, Fery; Husain; Lilik Widyawati; Khairan Marzuki; I Made Yadi Dharma
Jurnal Manajemen Informatika dan Sistem Informasi Vol. 8 No. 2 (2025): MISI Juni 2025
Publisher : LPPM STMIK Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36595/misi.v8i2.1681

Abstract

Meningkatnya pemakaian aplikasi Telegram sebagai sarana komunikasi mendorong kebutuhan akan sistem otomatis yang bisa mendeteksi pesan spam secara langsung, karena pesan spam dapat mengganggu kenyamanan pengguna dan bahkan menyebabkan kerugian. Studi ini bertujuan untuk merancang dan menerapkan chatbot di Telegram untuk mengidentifikasi pesan spam dengan metode XGBoost. Proses pengembangan mengikuti langkah-langkah CRISP-DM, yang mencakup business understanding, data preparation, modeling, evaluation, dan deployment. Dataset terbagi menjadi dua bagian, yaitu data pelatihan dan data pengujian, untuk mengukur kinerja model. Model XGBoost dilatih menggunakan data training dan diuji dengan data testing pada tiga skenario pembagian proporsi, yaitu 70% - 30%, 80% - 20%, dan 90% - 10%, guna menghitung tingkat akurasi dalam mengklasifikasikan pesan sebagai spam atau non spam (ham). Hasil penerapan menunjukkan bahwa chatbot mampu mengenali pesan spam dengan baik dan dapat melakukan tindakan seperti memberikan peringatan, menghapus pesan spam, serta memblokir pengirim jika ada pengulangan pesan spam yang sama lebih dari dua kali. Oleh karena itu, sistem ini dapat mempertahankan kenyamanan komunikasi di platform Telegram dengan cara yang otomatis dan fleksibel. Tingkat akurasi tertinggi yang diraih dari semua pengujian adalah 0.9656 atau 96.57%. Rata-rata precision untuk pesan ham dan spam adalah 96% dan 97%, recall masing-masing sebesar 96% dan 97%, serta F1-score masing-masing 96% dan 97%. Matriks kebingungan pada setiap skenario menunjukkan akurasi yaitu 94.86% (70% - 30%), 94.42% (80% - 20%), dan 94.87% (90% - 10%). Kontribusi utama dari studi ini adalah hadirnya sistem chatbot berbasis XGBoost yang terintegrasi dalam aplikasi Telegram, yang dapat mendeteksi dan menangani pesan spam secara langsung. Sistem ini membantu menciptakan suasana komunikasi yang lebih aman, nyaman, dan secara otomatis terhindar dari gangguan spam.
Evaluasi Tata Kelola Teknologi Informasi Pada Aplikasi ”Sipantes” Menggunakan Cobit 5.0 Pada Domain Edm dan Dss Lalu Ahmad Najmul Munir; Khairan Marzuki
Jurnal Riset Multidisiplin Edukasi Vol. 2 No. 8 (2025): Jurnal Riset Multidisiplin Edukasi (Edisi Agustus 2025)
Publisher : PT. Hasba Edukasi Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.71282/jurmie.v2i8.801

Abstract

Saat ini, implementasi Teknologi Informasi di Dinas Sosial Kota Mataram telah dijalankan, beberapa bagian unit kerja sudah memanfaatkan teknolo-gi informasi dalam proses bisnisnya, namun terdapat beberapa kendala yang mengganggu dalam proses bisnisnya. Sebagai contoh, di beberapa unit kerja di Program Keluarga Harapan (PKH) kekurangan sumber daya manusia untuk mengelola dan mengembangkan sistem dan teknologi informasi dan unit kerjanya, selain itu pada saat pergantian jabatan atau per-pindahan lokasi kerja seringkali menyebabkan kosongnya posisi personil yang mengelola aplikasi SIPANTES. Dari permasalahan itu penelitian ini menggunakan Framework Cobit 5.0 dengan menggunakan Domain Evaluate, Direct and Monitor (EDM) dan Deliver, Service and Support (DSS). Pemilihan domain pada tata kelola teknologi informasi berdasarkan kebutuhan organisasi saat ini. Populasi dalam penelitian ini adalah pegawai Dinas Sosial Kota Mataram, Pendamping PKH, dan Pendamping Sosial Masyarakat yang berjumlah 106 orang. Hasil dari penelitian ini yaitu Pada domain EDM01 mendapatkan nilai akhir sebesar 0,82 yang dimana pengaturan dan pemeliharaan kerangka tata kelola pada Dinas Sosial Kota Mataram sudah terbilang baik, Pada domain EDM04 mendapatkan nilai akhir sebesar 1,01 yang dimana pengoptimalan sumber daya pada Dinas Sosial Kota Mataram sudah terbilang baik, Pada domain EDM05 mendapatkan nilai akhir sebesar 1,01 yang dimana transparansi pemangku kepentingan pada Dinas Sosial Kota Mataram sudah terbilang baik, Pada domain DSS03 mendapatkan nilai akhir sebesar 0.94 yang dimana pengelolaan permasalahan pada Dinas Sosial Kota Mataram sudah terbilang baik, dan Pada domain DSS05 mendapatkan nilai akhir sebesar 1,02 yang dimana pengelolaan layanan keamanan pada Dinas Sosial Kota Mataram sudah terbilang cukup baik.
Implementation of Neural Machine Translation in Translating from Indonesian to Sasak Language Wardhana, Helna; Yadi Dharma, I Made; Marzuki, Khairan; Syarif Hidayatullah, Ibjan
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol. 23 No. 2 (2024)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v23i2.3465

Abstract

Language translation is part of Natural Language Processing, also known as Machine Translation, which helps the process of learning foreign and regional languages using translation technology in sentence form. In Lombok, there are still people who are not very fluent in Indonesian because Indonesian is generally only used at formal events. This research aimed to develop a translation model from Indonesian to Sasak. The method used was the Neural Machine Translation with the Recurrent Neural Network - Long Short Term Memory architecture and the Word2Vec Embedding with a sentence translation system. The dataset used was a parallel corpus from the Tatoeba Project and other open sources, divided into 80% training and 20% validation data. The result of this research was the application of Neural Machine Translation with the Recurrent Neural Network - Long Short Term Memory algorithm, which could produce a model with an accuracy of 99.6% in training data and 71.9% in test data. The highest ROUGE evaluation metric result obtained on the model was 88%. This research contributed to providing a translation model from Indonesian to Sasak for the local community to facilitate communication and preserve regional language culture.