Claim Missing Document
Check
Articles

Found 7 Documents
Search

A SYSTEMATIC REVIEW METHOD FOR SECURITY ANALYSIS OF INTERNET OF THINGS ON HONEYPOT DETECTION Yuswanto, Andrie; Wibowo, Budi
TEKNOKOM Vol. 4 No. 1 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (225.547 KB) | DOI: 10.31943/teknokom.v4i1.54

Abstract

A very significant increase in the spread of malware has resulted in malware analysis. A recent approach to using the internet of things has been put forward by many researchers. Iot tool learning approaches as a more effective and efficient approach to dealing with malware compared to conventional approaches. At the same time, the researchers transformed the honeypot as a device capable of gathering malware information. The honeypot is designed as a malware trap and is stored on the provided system. Then log the managed events and gather information about the activity and identity of the attacker. This paper aims to use a honeypot in machine learning to deal with malware The Systematic Literature Review (SLR) method was used to identify 207 . Then 12 papers were selected to be investigated based on inclusion and exclusion criteria. The technique used by most researchers is to utilize the available honeypot dataset. Meanwhile, based on the type of malware being analyzed, honeypot in machine learning is mostly used to collect IoT-based malware.
ANALYSIS AND APPLICATION OF CLOUD STORAGE SECURITY UTILIZATION BASED ON AS A SERVICE (IaaS) INFRASTRUCTURE SERVICE MODEL AS A DOCUMENT SHARING MEDIA DURING PANDEMI Isra Wardanu, Fyan; Wibowo, Budi; Yuswanto, Andrie
TEKNOKOM Vol. 5 No. 1 (2022): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (302.766 KB) | DOI: 10.31943/teknokom.v5i1.67

Abstract

Storage via the cloud is very necessary which is carried out in this research can be used as a basis for research at PT. Indocode technology has a problem where the problem is that the process of storing and sharing data on storage media via the cloud can be used both on internal and external networks. Implementing cloud-based storage greatly simplifies the process of sharing files with employees or the board of directors to be able to filter which data can be accessed by all employees and limited needs.. The server is designed using the Owncloud application which aims to support the process of information or data transactions with commissioners, directors and employees using owncloud, so that the data transfer process no longer uses external storage from the internet or other physical storage media. In addition, the use of owncloud for enterprises is very helpful because it is easy to use and the file sharing capabilities can be adjusted according to the user's permissions and can be accessed anywhere and anytime.
DESIGN OF MACHINE LEARNING DETECTION MASK USING YOLO AND DARKNET ON NVIDIA JETSON NANO Danu Prasetia, Deny; Yuswanto, Andrie; Wibowo, Budi
TEKNOKOM Vol. 5 No. 1 (2022): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (712.977 KB) | DOI: 10.31943/teknokom.v5i1.69

Abstract

In the Covid-19 pandemic, wearing a mask has become the obligation of Indonesian citizen,for outdoor and indoor.  Public awareness of wearing masks when leaving the house according to the government's appeal is still low.  This can be seen from the many people who do not wear masks while on the public place or in other place.  Technology that can help increase public awareness of using masks is a mask detection application.  The application to detect use of masks is made using Artificial Intelligence and uses machine learning methods from a tool that will read every use of masks on the face automatically, either using masks appropriately, using inappropriate masks or not using masks. The method used in this research is to use the Research and Development method, namely research that can produce a product. Based on the test results using masks with facial motifs, there are different results from the two samples tested depending on the quality of the image on the mask Yolo (You Only Look Once) is an object detection system in real time.  Darknet is an open source neural network framework written in the C and CUDA programming languages.  The Jetson Nano is a System On Module (SoM) and developer kit from the Nvidia Jetson family.
Analisis Pengukuran Kompleksitas Website SOC Menggunakan Function Point Sidqi, Akbar; Yuswanto, Andrie; Yaqin, Muhammad Ainul
Journal Automation Computer Information System Vol. 4 No. 2 (2024): November
Publisher : Indonesian Journal Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47134/jacis.v4i2.82

Abstract

Pengukuran kompleksitas perangkat lunak telah menjadi fokus utama dalam pengembangan perangkat lunak, merupakan cara untuk menggambarkan seberapa rumitnya suatu program, bertujuan untuk menilai dan memprediksi berbagai karakteristik, seperti tingkat kompleksitas komputasi dan keandalan model, serta kemampuan evaluasi model tersebut, dengan memanfaatkan beragam metrik dan alat analisis. pada penelitian ini bertujuan mengukur kompleksitas dengan metode pengukuran Function Point Analysis dengan pendekatan berorientasi pada fungsi yang banyak digunakan untuk mengukur fungsionalitas perangkat lunak. pada setiap dashboard website diukur menggunakan kriteria FPA yang menyatakan tingkat kompleksitas dengan level simple, average, dan complex. pada penelitian ini bertujuan mengukur nilai kuantitatif dari fungsionalitas perangkat lunak website soc untuk menghasilkan tingkat kompleksitas website. Hasil dari pengukuran terdapat 3 faktor yaitu: Crude Function Point, Relative Complexity Adjustment Factor, dan Function Point. yang menunjukkan nilai CFP 310, RCAF 70, dan FP 418,5 yang menunjukkan kompleksitas tinggi pada website soc
Cyber Resilience to Digital Threats for Education Institutions 4.0 Wibowo, Budi; Yuswanto, Andrie; Hidayat, Taufik; Ibrahim, Nadim
International Journal of Management Science and Application Vol. 4 No. 1 (2025): IJMSA
Publisher : Sultan Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58291/ijmsa.v4i1.370

Abstract

The emergence of Education 4.0, characterized by personalized learning, smart technologies, and digital interconnectivity, has revolutionized academic environments. However, this digital transformation has simultaneously increased the exposure of educational institutions to sophisticated cyber threats. This research addresses the pressing need for a robust cyber resilience framework tailored to the education sector. Employing a qualitative descriptive methodology, supported by secondary data analysis and case study reviews, the study identifies core vulnerabilities in digital infrastructure, policy shortcomings, and a general lack of cybersecurity awareness among stakeholders. In response, the paper proposes a contextualized cyber resilience framework grounded in layered security principles, zero-trust architecture, and institution-wide digital hygiene initiatives. Key findings indicate that effective cyber resilience in Education 4.0 must be multidimensional, incorporating stringent policy enforcement, continuous digital skills training, and adaptive technological strategies. The primary contribution of this study lies in offering a practical, scalable framework that aligns cybersecurity practices with the evolving demands of digital education. Future research is encouraged to explore real-time implementation metrics, cross-institutional collaborations, and the integration of AI-driven threat detection systems to further strengthen educational cyber resilience.
Cybersecurity Education Strategies Based on Open-Source Intelligence (OSINT) to Enhance Public Awareness Hidayat, Taufik; Wibowo, Budi; Yuswanto, Andrie; Fathul Jannah, Annisa
International Journal of Science Education and Cultural Studies Vol. 4 No. 2 (2025): ijsecs
Publisher : Sultan Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58291/ijsecs.v4i2.422

Abstract

In today’s rapidly evolving digital landscape, cybersecurity threats are escalating in both frequency and complexity, which points to the urgent need for effective educational approaches to enhance public awareness. Open-Source Intelligence (OSINT), which leverages publicly available information, offers a practical framework for identifying and understanding cyber risks. This study proposes the design, implementation, and evaluation of an OSINT-based cybersecurity education strategy aimed at non-technical audiences. Employing a mixed-methods approach including literature review, module development, and surveys, this research measures the strategy’s effectiveness in improving cybersecurity comprehension. The results indicate that the OSINT-based educational approach significantly enhances participants’ understanding of cyber risks, yielding an average increase of 35% in comprehension scores. Furthermore, the integration of real-world OSINT demonstrations makes cybersecurity threats more tangible and personally relevant, thereby motivating proactive preventive behavior. In conclusion, incorporating OSINT into cybersecurity education provides an effective and scalable strategy for improving public awareness and resilience against modern digital threats.
A Review Method for Analysis of the Causes of Data Breach in the Pasca Pandemic Yuswanto, Andrie; wibowo, Budi; Hafiz, Luqman
Jurnal Komputer dan Elektro Sains Vol. 3 No. 1 (2025): komets
Publisher : Sultan Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58291/komets.v3i1.205

Abstract

The vulnerability of personal data breaches makes countries aware of the importance of regulations governing the protection of personal data Therefore, the importance of this research is to conduct a systematic review of the causes of data breaches based on the mechanism of activities carried out to answer problems and provide solutions to problems related to information security. The Systematic Literature Review (SLR) method was used to identify 283 papers in IEEE Xplore database, direct and signature digital science library based on automated search and predefined strings. Then 18 papers were selected for study based on inclusion and exclusion criteria. From the literature study, it can be concluded that the trends analyzed, data breaches are caused by user behavior that has not been educated about the dangers of data theft and awareness of information security.