Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : bit-Tech

Cloud-Based High Availability Architecture Using Least Connection Load Balancer and Integrated Alert System Prinafsika; Junaidi, Achmad; Muharrom Al Haromainy, Muhammad
bit-Tech Vol. 8 No. 1 (2025): bit-Tech
Publisher : Komunitas Dosen Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32877/bt.v8i1.2520

Abstract

Ensuring optimal service continuity remains a critical challenge in cloud computing, especially when dealing with high traffic loads and system failure potential that can cause losses. To address this, this research presents the implementation of a high availability (HA) cloud system using the Least Connection load balancing algorithm implemented with Nginx, integrated with early anomaly detection and alert mechanisms. The HA architecture is implemented across two geographically distributed cloud service providers, Alibaba Cloud and Google Cloud, to analyze latency and performance differences under high load conditions. The system's resilience and scalability were evaluated through load testing using K6, simulating workloads ranging from 100 to 1000 Virtual Users (VUs) for single server configurations and 200 to 2000 VUs for HA configurations. The experiment results showed a significant improvement in service availability, reaching 100% uptime with the HA configuration compared to a peak of 98.79% in the single server environment. The Least Connection strategy effectively balanced traffic by monitoring active connections, resulting in a 29.73% increase in processed requests and a 42% reduction in system load at 1000 VUs. Additionally, the alert system successfully sent real-time Telegram notifications for delays or failures, enabling proactive mitigation. These results confirm that combining dynamic load balancing with proactive alerts can significantly improve service reliability, resource efficiency, and resilience to failures in distributed cloud infrastructure providing a viable model for robust and scalable cloud service architectures.
Website Security Testing Using PTES Method and OWASP Top 10 Approach Firnanda, Mochammad Yoga; Henni Endah Wahanani; Achmad Junaidi
bit-Tech Vol. 8 No. 1 (2025): bit-Tech
Publisher : Komunitas Dosen Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32877/bt.v8i1.2564

Abstract

Rapid technological advancements have greatly benefited the industrial sector, making technology essential for business operations. However, this reliance also introduces vulnerabilities, particularly in Enterprise Resource Planning (ERP) systems, which are critical for managing business processes and sensitive data. Due to their complexity and integration, ERP systems are prime targets for cyberattacks, emphasizing the need for robust security testing. This research aims to identify, evaluate, and exploit vulnerabilities in the ERP website of PT. XYZ, specifically targeting pages accessible by users with the SPV Marketing role. The Penetration Testing Execution Standard (PTES) methodology was used to guide the process from intelligence gathering to exploitation and reporting. PTES also ensures that testing is conducted legally during the pre-engagement phase. Tools such as Google Dorking, Netcraft, Wappalyzer, and Nmap were employed for intelligence gathering. For threat modeling, ISO 27005 was employed to identify vulnerabilities, while ISO 25010 served as a standard for security quality. A ZAP scan revealed 23 security vulnerabilities, including 18 that fall under the OWASP Top 10, such as Broken Access Control and Injection. Simulated attacks successfully identified Cross-Site Scripting (XSS), Session Hijacking, and Cross-Site Request Forgery (CSRF). Based on the findings, the recommendations focus on enhancing ERP system security according to the OWASP Top 10 guidelines, ensuring clarity for the development team. This study highlights the need for improved ERP security and offers a structured PTES-OWASP framework applicable across sectors. Future research may integrate multiple tools to enhance vulnerability detection.
Optimasi Hiperparameter LSTM Menggunakan PSO untuk Peramalan Bawang Merah dan Bawang Putih Tanjung, Mutiq Anisa; Sari, Anggraini Puspita; Junaidi, Achmad
bit-Tech Vol. 8 No. 1 (2025): bit-Tech
Publisher : Komunitas Dosen Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32877/bt.v8i1.2569

Abstract

This research develops a shallot and garlic price prediction model using a Long Short-Term Memory (LSTM) network optimized through the Particle Swarm Optimization (PSO) method. Indonesia experiences an annual increase in demand for these two commodities. This research focuses on optimizing LSTM parameters, such as the number of units in each layer, learning rate, batch size, time step, and number of training epochs using PSO. Various trials were conducted with different PSO parameter settings and data partitioning scenarios to find the best configuration in predicting prices. The results show that the LSTM model optimized with PSO produces an RMSE value of 436,969 for shallots and 173,866 for garlic. In addition to RMSE, the Mean Absolute Percentage Error (MAPE) and R² metrics also show high prediction accuracy. The 90:10 data partitioning scenario showed the best evaluation results, indicating that more data improves the accuracy of the LSTM in learning price patterns. Scatter plots comparing predicted prices with actual prices show a good match, although there is some variation in certain price ranges. This study also highlights the effect of data partitioning on model performance. The LSTM-PSO approach proved effective in improving the accuracy of price predictions and has practical implications for farmers and policy makers in decision making. The model has the potential to be a decision support tool in the agribusiness sector, with the possibility of further development with external factors.