Claim Missing Document
Check
Articles

Found 8 Documents
Search
Journal : MULTINETICS

Perancangan dan Analisis Intrusion Prevention System Berbasis SNORT dan IPTABLES dengan Integrasi Honeypot pada Arsitektur Software Defined Network Barends, Julian Kevin; Dewanta, Favian; Karna, Nyoman Bogi Aditya
MULTINETICS Vol. 7 No. 2 (2021): MULTINETICS Nopember (2021)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v7i2.4276

Abstract

Software Defined Network is a network architecture that allows the network to be controlled centrally by separating the Control Plane and Data Plane making it easier from the operator's side to manage the network consistently, therefore SDN is believed to be able to replace the existing network which tends to be rigid. But despite the capabilities of the SDN, SDN security is still a major concern. In project, the design of an Snort and IPTables based IPS system that is integrated with the Honeypot system in the Software Defined Network network architecture will be carried out. IPS will detect attacks based on the applied rules and if there is an attack then IPS will give an alert to the Controller which then the Controller will check the database and divert the attack traffic to the Honeypot. The results shows that the accuracy rate is 99.87%, the average detection speed for Port Scanning, Ping of Death, ICMP Flood and TCP SYN Flood attacks are 1.207 s, 1.045 s, 1.047 s, and 1.101 s. While the QoS measurement shows that after the attack is transferred, there is an increase in the Throughput value and a decrease in the Packet Loss value.
Migrasi Mikroservis Pada Fog Computing Untuk Mendukung Kinerja Komputasi Robot dengan Cakupan Pergerakan yang Luas Dewanta, Favian
MULTINETICS Vol. 6 No. 1 (2020): MULTINETICS Mei (2020)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v6i1.2930

Abstract

Kekuatan komputasi robot sangat bergantung pada jenis processor, hard disk, memory, serta jenis software/bahasa pemrograman yang mengeksekusi algoritma pada robot tersebut. Semakin kompleks algoritma yang dikerjakan suatu robot, semakin besar pula kebutuhan komputasi yang harus dipenuhi. Terlebih lagi jika robot tersebut dituntut untuk memberikan respon yang cepat dari mulai pembacaan sensor hingga eksekusi oleh aktuator, maka kebutuhan komputasi yang tinggi sudah tidak bisa ditawar lagi. Untuk mengatasi permasalahan kekurangan komputasi, beberapa perusahaan / institusi menggunakan fog computing sebagai pendukung sistem. Pada penelitian ini, kami membahas mikroservis sebagai bagian infrastruktur fog computing untuk mengatasi kekurangan kekuatan komputasi pada robot. Sebagai satu bagian proyek penelitian, kami secara khusus membahas migrasi mikroservis untuk mendukung mobilitas robot yang berpindah dari area cakupan suatu fog computing menuju suatu fog computing yang lainnya. Hasil eksperimen menunjukkan delay proses pengiriman image mikroservis berkontribusi paling banyak pada proses migrasi mikroservis jika dibandingkan dengan delay pembuatan checkpoint dan instalasi image mikroservis pada server fog computing tujuan. Delay pengiriman tersebut bertambah sangat signifikan jika proses pengiriman image mikroservis menggunakan protokol SSH jika dibandingkan dengan protokol FTP.
Implementasi Ethereum Blockchain dan Smart Contract Pada Jaringan Smart Energy Meter Mabruroh, Anggun Mugi; Dewanta, Favian; Wardana, Aulia Arif
MULTINETICS Vol. 7 No. 1 (2021): MULTINETICS Mei (2021)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v7i1.4122

Abstract

In this study, we propose the creation of an Internet of Things device, namely a smart energy meter by implementing a blockchain system as a database. Internet of Things has a centralized storage system on the database server, if the server is down then the database cannot be used and data may be lost. There is a storage system that has a decentralized and distributed network, namely the blockchain. The private blockchain system is built using the Ethereum framework. Sensor data will be read by the Raspberry Pi 4B and sent to node 1 via MQTT. Node 1 will save the data to the block. Two nodes Ethereum account will validate the block. If accepted then the block will be stored on the blockchain and create a new block chain. In the storage process, there is a smart contract between Ethereum accounts that is created using Solidity and accessed using the web3 API. Successfully saved data will be displayed to the user's web. Based on the results of measuring the performance of the MQTT protocol and blockchain system when compared to traditional databases, blockchain is less fast in the storage process because there is a transaction process and data verification. However, if it is applied to smart energy meter data, it doesn't matter because the time required for the storage process is a maximum of 1 minute. The number of nodes and the size of the data or block does not affect the performance of the proof of authority consensus algorithm
Rancang Bangun Smart Farming Untuk Observasi Pertumbuhan Tanaman Kangkung Dengan Dukungan Teknologi Sonic Bloom Rezeki, Putri Ayu; Dewanta, Favian; Astuti, Sri
MULTINETICS Vol. 8 No. 1 (2022): MULTINETICS Mei (2022)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v8i1.4683

Abstract

Water spinach is one of the popular vegetables in Indonesia because it has fast-growing properties and is relatively fast in harvesting. Currently, some farmers are cultivating water spinach hydroponically because the technique is more efficient. In the growth of kale, farmers usually always look directly at the garden. So to see from a distance, a water spinach growth monitoring test will be carried out using the Internet of Things (IoT) combined with sonic bloom technology taken from dangdut, jazz, and murottal music with a frequency of 4000 Hz. Sonic Bloom is a technology development that utilizes sound waves to accelerate the opening of the leaf mouth (stomata). The parameters for testing the productivity of water spinach were plant height, room temperature, and water temperature. Network performance testing parameters are delay, throughput, and packet loss. The purpose of this study was to compare the results of three types of music that affect water spinach and water spinach without sonic bloom technology and to test the results of network performance. The application of sonic bloom technology was successfully implemented on water spinach with the most influential result being jazz music with a height of 25.47 cm. Very good network performance in this study is testing with delivery every 5 minutes in 30 minutes of observation with a distance of 2 meters with a delay value of 28.34 ms, throughput 71010.70 bps and packet loss of 0%.
ANALISIS PENGGUNAAN ECC PADA SISTEM AUTENTIKASI DI IOT Purwiko, Daniel Perdana Putra; Dewanta, Favian; Afianti, Farah
MULTINETICS Vol. 8 No. 1 (2022): MULTINETICS Mei (2022)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v8i1.4701

Abstract

The Internet of Things is a complex system that is widely used in many ways to advance human life. As a result, Internet of Things (IoT) has many security vulnerabilities and requires an authentication system to protect user data. Selecting the authentication type that suits your needs is critical to achieving excellent performance on your Internet of Things (IoT) devices with relatively minimal specifications. Due to this situation, Elliptic Curve Cryptography (ECC) algorithm is one of the recommended algorithms which consumes less resources in the process. This study aims to test and compare the Fiat-Shamir based Elliptic Curve Cryptography (ECC) and Elliptic Curve Diffie-Hellman based Hash Message Authentication Code (ECDH-HMAC) authentication algorithms. Parameters for this test are computation time, delay, program storage, and communication cost of the authentication algorithm. The experimental results show that the Elliptic Curve Diffie-Hellman based Hash Message Authentication Code (ECDH-HMAC) algorithm has the lowest computational time, delay, and program storage usage, and the Fiat-Shamir based Elliptic Curve Cryptography (ECC) algorithm has the lowest communication cost value.
Analisis Perbandingan Block Cipher Simon-Speck, Simeck, Skinny pada Komunikasi Berbasis LoRa Putri, Winda Ezranata; Favian Dewanta; Farah Afianti
MULTINETICS Vol. 8 No. 2 (2022): MULTINETICS Nopember (2022)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v8i2.4821

Abstract

Inventions solving problems through the incorporation of technology and social impacts to facilitate human life can be defined as the Internet of Things (IoT). Security and privacy are challenges in various Internet of Things applications given the rapid growth of IoT devices. Meanwhile, IoT devices still do not have sufficient communication security. Communication systems on IoT devices require cryptographic to maintain the security of their communications. The appropriate algorithm to be implemented on IoT devices should be the smallest and fastest lightweight cryptographic algorithm or commonly called Lightweight Cryptography because IoT devices have limited memory and computing power. In this study, the proposed algorithm to be implemented in Long Range or LoRa-based IoT devices is the Simon-Speck, Simeck, and Skinny encryption algorithm. This study discusses the implementation of the Simon-Speck, Simeck, and Skinny algorithms on Long Range-based IoT devices. The parameters compared are the computation time of the encryption and decryption process and the avalanche effect value. In the encryption and decryption process, the Speck algorithm has the fastest computation time. Meanwhile, the highest avalanche effect value is obtained by the Skinny algorithm, which is 50.34%.
Analisis QoS Pengaplikasian Network Slicing Pada Topologi Abilene Jaringan SDN Menggunakan FlowVisor Dan POX Controller Putra, Fadly Firmansyah; Dewanta, Favian; Naning Hertiana, Sofia
MULTINETICS Vol. 9 No. 1 (2023): MULTINETICS Mei (2023)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v9i1.5498

Abstract

Software Defined Network (SDN) is a new paradigm in computer networks that separates the data plane and the control plane. With this separation, network configuration will be easier to do, not as complicated as conventional networks. This research discusses how to implement the network slicing method using FlowVisor on the SDN network with POX as the controller. Network slicing allows each network slice to be designed to guarantee different levels of network performance. The emulator used to design the topology as well as the data plane is Mininet. The results of this researchs indicate that FlowVisor can isolate flowspace for each slice on the SDN network based on the TCP port that is passed when communication occurs between hosts. Comparison of SDN networks without using the network slicing method with SDN networks using the network slicing method produces values that are not much significant, but the QoS parameter values are better on SDN networks without network slicing. Throughput on 1 Mbps link bandwidth is 0.8 Mbps, slow slice 0.79 Mbps, on 10 Mbps link bandwidth is 7.4 Mbps, fast slice is 6.6 Mbps. Delay on 1 Mbps link bandwidth is 1.361 ms, slow slice 1.389 ms, on 10 Mbps link bandwidth 0.155 ms, fast slice 0.2426 ms. Jitter on 1 Mbps link bandwidth is 0.000283 ms, slow slice 0.000257 ms, on 10 Mbps link bandwidth 0.0000304 ms, fast slice is 0.0000347 ms.
IMPLEMENTASI DAN ANALISIS MIGRASI DATA LMS PADA KLASTER KUBERNETES ANTAR-PUBLIC CLOUD MENGGUNAKAN BACKUP DAN RESTORE Ranunegoro, Adimas Fachri; Dewanta, Favian; Aditya, Bagus
MULTINETICS Vol. 9 No. 1 (2023): MULTINETICS Mei (2023)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v9i1.5556

Abstract

Moodle is one of the media for learning management systems that are widely used today because non-face-to-face learning is unavoidable. Fluctuating user traffic makes moodle suitable for deployment to a public cloud. Public clouds are easier to scale, especially when combined with a container orchestrator such as Kubernetes. However, there are times when it is necessary to migrate data on a Kubernetes cluster from a public cloud to another public cloud to mitigate disasters in a specific region in the public cloud. Moodle applications can be routed to different regions, but this will cause high latency. This problem can be solved by migrating the Kubernetes cluster on Google Cloud to the same region on Microsoft Azure as an alternative public cloud. This final project will discuss the migration of a kubernetes cluster along with persistent volume data between public clouds from Google Cloud Platform to Microsoft Azure and vice versa using backup and restore methods. Velero is used as a backup and restore tool, then the restic plugin is added so that Velero can also backup and restore persistent volumes located outside the Kubernetes cluster. The test results show that Velero with the restic plugin can backup and restore persistent volumes outside the cluster. The larger the data size, the longer the backup, restore, and migration time will be. Backup and restore time for each incremental size of approximately 500 MB will increase the backup and restore time by approximately 10 seconds. Meanwhile, on the utility side, the amount of CPU usage during restore consumes more resources than when backup. At the time of backup, the maximum CPU spike was 3.5% at 3 GB data size in both public cloud clusters. Meanwhile, at the time of restore, the maximum CPU spike is 5% at 3 GB of data size.
Co-Authors Adhirajasa, Radhiyya Putra Adi Nugroho Aditya Karyadi Kusuma Ahmad Tri Hanuranto Angga Rusdinar Anita Rosdina Nasution Arif Indra Irawan AULIA ARIF WARDANA Bagus Aditya Bagus Aditya Baiq Yuniar Yustiarini Barends, Julian Kevin Danang Triantoro Murdiansyah Deny Kurniawan Devi Pratami Dhanar Bintang Pratama Dhea Dearly Herman Dimas, I Gusti Ngurah Bagus Doan Perdana Dong-Sung Kim Evander Alfa Bahana Fajrin, Alvin Nur Farah Afianti Farah Afianti Hanif, Nasywan Harsritanto, Bangun Indrakusumo Radityo Hilal Hudan Nuha Hilman Fauzi, Hilman Ibrahim, Khalif Ika Arum Puspita Istikmal Izzulhaq, Muhammad Hilmi Kautsar , Rifki Ikbar Litasari Widyastuti, Litasari Loudry Achmad Tiransri Mabruroh, Anggun Mugi Manalu, Jesseline Regina Muhammad Abdillah Muhammad Abdullah Rasyad Muhammad Bagas Arya Darmawan Muhammad Hafiz Amrullah Muhammad Zuhairi Naning Hertiana, Sofia Nasution, Muhammad Surya Alghifary Niken Dwi Wahyu Cahyani Nuha, Hilal H Nurislami, Rifky Nudhar Nurul Ikhsan Nyoman Bogi Aditya Karna Parulian, Christian Antonius Puji Dwika Pradana Purwiko, Daniel Perdana Putra Putra, Fadly Firmansyah Putri, Vicha Octavia Dewanto Putri, Winda Ezranata Raffinaldy, Muhammad Zaky Ranunegoro, Adimas Fachri Rendy Munadi Retno Hendryanti Reza Rendian Septiawan Rezeki, Putri Ayu Ridha Muldina Negara Rissa Mellani Nur Wulandari Rizky, Muhamad Wildan Salma Salma Salsabila, Balqis Hasna Saputra, Maulana Reza Sitepu, Dharma Agung Sofia Naning Hertiana Sri Astuti Sri Astuti Subagyo, Lutfi Bramantio Sussi Syamsul Rizal Tarigan , Jesikapna Kristina Br Umar Ali Ahmad Wardana, Fareza Arya ZK Abdurahman Baizal