Claim Missing Document
Check
Articles

Deteksi Malware Statis Menggunakan Deep Neural Networks Pada Portable Executable Dieta Wahyu Asry; Eko Siswanto; Dendy Kurniawan; Haris Ihsanil Huda
Teknik: Jurnal Ilmu Teknik dan Informatika Vol 3 No 1 (2023): Mei: Teknik: Jurnal Ilmu Teknik dan Informatika
Publisher : LPPM Sekolah Tinggi Ilmu Ekonomi - Studi Ekonomi Modern

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/teknik.v3i1.325

Abstract

Latar Belakang: Dua komponen utama pada analisismalware adalah analisis malware statis yang melibatkan pemeriksaan struktur dasar malware yang dapat dieksekusi tanpa mengeksekusinya sedangkan analisis malware dinamis bergantung pada pemeriksaan perilaku malware setelah menjalankannya di lingkungan yang terkendali. Analisis malware statis biasanya dilakukan oleh perangkat lunak anti-malware modern dengan menggunakan analisis berbasis tanda tangan atau analisis berbasis heuristik. Tujuan Utama: Tujuan dari penelitian ini adalah megusulkan dan mengevaluasi deep neural network untuk menganalisis file portabel secara statis guna mempelajari fitur-fitur dari portable executable malware untuk meminimalkan terjadinya false positive saat mengenali malware baru. Metode penelitian: Model yang diusulkan dalam penelitian ini adalah model Neural Network with Dropout terhadap model pohon keputusan untuk memeriksa seberapa baik kinerjanya dalam mendeteksi file PE berbahaya yang sebenarnya. Metode format-agnostik digunakan untuk mengekstrak fitur dari file. Dataset digunakan untuk melatih model yang diusulkan dan membandingkan hasil dengan dataset malware lain yang diketahui. hasil: Hasil dari penelitian ini menunjukkan bahwa penggunaan jaringan saraf dalam yang sederhana untuk mempelajari fitur PE vektor tidak hanya efektif, tetapi juga kurang intensif sumber daya dibandingkan dengan metode deteksi heuristik konvensional. kesimpulan: Model yang diusulkan dalma penelitian ini mencapai AUC sebesar 99,8% dengan 98% true positive pada 1% false positive pada kurva ROC. Untuk menunjukkan bahwa model ini berpotensi melengkapi atau menggantikan perangkat lunak anti-malware konvensional maka untuk penelitian dimasa depan diusulkan untuk mengimplementasikan model ini secara praktis
CAPTIVE PORTALDAN IMPLEMENTASI BANDWIDTH MANAGEMENT DI STIKES St. ELISABETH SEMARANG Eko Siswanto; Indra Ava Dianta; Danang Danang
MANAJEMEN Vol 1 No 1 (2021): MEI : MANAJEMEN (Jurnal Ilmiah Manajemen dan Kewirausahaan)
Publisher : LPPM Politeknik Pratama

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (786.352 KB) | DOI: 10.51903/imk.v1i1.55

Abstract

Computer network is one of the important technologies in the field of information and communication technology which is currently growing rapidly and rapidly. Computer networks within a company or agency are very helpful for work activities to be carried out quickly, precisely and efficiently. Basically, computer network technology cannot be separated by cable as an intermediary medium. Excessive use of cable media will certainly affect the mobility and flexibility of internet and intranet users. Wireless technology is a solution to meet the need for high mobility and flexibility. Wireless technology uses radio waves as a transmission medium, this technology has several advantages including high freedom and flexibility. Users or users can access the internet or intranet as long as they are within wireless range.STICK St. Elisabeth as one of the educational institutions in the health sector so far has had a wireless network or hotspot area, so that teaching staff, students, and visitors at STIKES St. Elisabeth who wants to be connected to the internet or intranet can directly connect to the network without going through network security. This causes the user hotspot not to be managed so that it affects the efficiency of bandwidth usage and network security. To provide a solution to these problems, the authors propose the design of Captive Portal and Implementation of Bandwidth Management STIKES St. Elisabeth uses a Mikrotik RB750G Router.This final project report will describe the stages of designing and implementing hotspot network security at STIKES St. Elisabeth. These stages include analysis of existing networks, planning and design stages of network security which consist of determining security systems, determining topology, data collection and user management. The implementation phase is the process of installing and configuring the network security device system. The things that have been done, and the testing of the security system will be reviewed at the end of the report.
Material Requipment Planning Untuk Penentuan Harga Pokok Produksi Pada PT Philnesia International M Munifah; Eko Siswanto; Novi Sri Setiyawati
Kompak :Jurnal Ilmiah Komputerisasi Akuntansi Vol. 13 No. 2 (2020): Jurnal Ilmiah Komputer Akuntansi
Publisher : Universitas Sains dan Teknologi Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/kompak.v13i2.292

Abstract

PT Philnesia International is a limited liability company engaged in the business of manufacturing furniture products. At PT Philnesia International, if an order is received by the company, then the company makes products in accordance with existing orders. Control and planning of raw materials are very important in the production process so that the production process can run smoothly, on time and can reduce delays in delivery. PT Philnesia International wants to create a computerized Production Accounting Information System. In addition to making it more effective, accurate and efficient, the owner wants to make it easier for his employees to perform more advanced and modern and makes it easier to view reports every day. The results that will be obtained from the design of this system is an information system that can make it easier for companies to determine raw material requirements, the production process and view the required reports.
Rancangan Bangun Otomasi Air Suling Daun Cengkeh Berbasis Arduino Muhamad Khoirul Umam; Danang Danang; Eko Siswanto; Nuris Dwi Setiawan
Repeater : Publikasi Teknik Informatika dan Jaringan Vol. 2 No. 2 (2024): April : Repeater : Publikasi Teknik Informatika dan Jaringan
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/repeater.v2i2.40

Abstract

The MSME group "Manuggal Karya" located in Ngambarsari Village, Karang Tengah District, Wonogiri, Central Java is a business group that operates in the field of refining clove leaf essential oil. can be monitored properly so that overflowing essential oils often spill from the reservoir and improper handling can actually cause the essential oils to become dirty. The use of an automation system that can keep essential oils sterile and can stop the flow of oil to the reservoir if the reservoir is full. The result that the author hopes is that by making this tool, the MSME Group "Manunggal Karya" can increase production efficiency to produce quality clove leaf essential oil.
CAPTIVE PORTALDAN IMPLEMENTASI BANDWIDTH MANAGEMENT DI STIKES St. ELISABETH SEMARANG Eko Siswanto; Indra Ava Dianta; Danang Danang
MANAJEMEN Vol. 1 No. 1 (2021): MEI : MANAJEMEN (Jurnal Ilmiah Manajemen dan Kewirausahaan)
Publisher : LPPM Politeknik Pratama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/imk.v1i1.55

Abstract

Computer network is one of the important technologies in the field of information and communication technology which is currently growing rapidly and rapidly. Computer networks within a company or agency are very helpful for work activities to be carried out quickly, precisely and efficiently. Basically, computer network technology cannot be separated by cable as an intermediary medium. Excessive use of cable media will certainly affect the mobility and flexibility of internet and intranet users. Wireless technology is a solution to meet the need for high mobility and flexibility. Wireless technology uses radio waves as a transmission medium, this technology has several advantages including high freedom and flexibility. Users or users can access the internet or intranet as long as they are within wireless range.STICK St. Elisabeth as one of the educational institutions in the health sector so far has had a wireless network or hotspot area, so that teaching staff, students, and visitors at STIKES St. Elisabeth who wants to be connected to the internet or intranet can directly connect to the network without going through network security. This causes the user hotspot not to be managed so that it affects the efficiency of bandwidth usage and network security. To provide a solution to these problems, the authors propose the design of Captive Portal and Implementation of Bandwidth Management STIKES St. Elisabeth uses a Mikrotik RB750G Router.This final project report will describe the stages of designing and implementing hotspot network security at STIKES St. Elisabeth. These stages include analysis of existing networks, planning and design stages of network security which consist of determining security systems, determining topology, data collection and user management. The implementation phase is the process of installing and configuring the network security device system. The things that have been done, and the testing of the security system will be reviewed at the end of the report.
DEEP LEARNING ALGORITHM FOR CONNECTING SCIENTIFIC RECORDS AND SOCIAL PLATFORM Budi Santoso; Agustinus Budi Santoso; Eko Siswanto
Journal of Engineering, Electrical and Informatics Vol. 2 No. 2 (2022): Juni: Journal of Engineering, Electrical and Informatics:
Publisher : Pusat Riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jeei.v2i2.913

Abstract

In the healthcare industry, professionals develop big amounts of disorganized data. The complexity of this data and the loss of computational capability lead to delays in the investigation. Nevertheless, with the advent of Deep Learning algorithms and connection to computing power such as Graphic Processor Units (GPUs) and Tensor Processing Units (TPUs), text and image processing has become usable. Deep Learning (DL) data bring about a big outcome in Natural Language Processing (NLP) and computer perception. The main purpose of this study is to build an undivided approach that can relate social platforms, literature, and scientific records to develop an approach to medicinal education for the public and experts. This study focuses on NLP in the healthcare industry and compiles data by Electronic Medical Records (EMR), medical literature, and social platforms. The framework proposed in this study is one for connecting social platforms, medical literature, and Electronic Medical Records scientific records using Deep Learning algorithms. Linking data sources requires defining the relationships between them, and finding concepts in medical texts. The National Library of Medicine (NLM) introduced the Unified Medical Language System (UMLS) and uses this system as the basis for the proposed system. The dynamic nature of a social platform can be recognized and supervised methodologies can be applied under supervision to develop conception. Named entity Recognition (NER) enables the active eradication of data or individuals by the pharmaceutical literature.
Cash Processing Administration System In The Indonesian Red Cross Blood Transfusion Unit, Semarang City Okky Dwianto Wahyu Nugrohojati; Eko Siswanto; Bagus Sudirman
Journal of Engineering, Electrical and Informatics Vol. 2 No. 3 (2022): Oktober: Journal of Engineering, Electrical and Informatics:
Publisher : Pusat Riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jeei.v2i3.2849

Abstract

The cash processing administration system in a company plays a very important role. One of the problems that often arises in a cash processing administration system is the inaccurate calculation results of cash administration reports. This can result in inaccurate calculations of a company's profits and losses. Besides that, the use of company funds for something is not necessary, because every income and expenditure of company funds can be seen clearly and can be checked at any time. In short, companies will be able to quickly and easily find out the income and expenditure of funds. Information technology which is developing rapidly at this time provides very helpful benefits for the development of a company's information system, especially with the use of computer-based information technology, because by using computer technology in an information system you will be able to process data more quickly with lower error rates. minimal and saves time. The procedures that will be processed consist of the administration section and the finance section. If there is an income or expenditure of money or funds, the data can simultaneously be entered into the computer and will automatically influence or add to the existing data in the company. In this way, the condition of the money or funds in the company can be known with certainty and accuracy.
DINAMIKA KONFLIK DAN NEGOSIASI DALAM PENGAMBILAN KEPUTUSAN DI SDN PENDRIKAN KIDUL Herry Erwanto; Eko Siswanto; Noor Miyono
Pendas : Jurnal Ilmiah Pendidikan Dasar Vol. 10 No. 01 (2025): Volume 10 No. 01 Maret 2025 In Process
Publisher : Program Studi Pendidikan Guru Sekolah Dasar FKIP Universitas Pasundan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23969/jp.v10i01.21768

Abstract

Penelitian ini bertujuan untuk mengidentifikasi sumber-sumber konflik yang terjadi di SDN Pendrikan Kidul dan menganalisis dampaknya terhadap dinamika pengambilan keputusan di sekolah. Selain itu, penelitian ini juga membahas strategi negosiasi yang diterapkan dalam mengelola konflik antara kepala sekolah dan guru, serta mengevaluasi efektivitasnya. Metode penelitian menggunakan pendekatan deskriptif kualitatif, data dikumpulkan melalui observasi partisipatif, wawancara mendalam, dan kajian dokumen. Temuan utama menunjukkan bahwa konflik di SDN Pendrikan Kidul sering muncul karena perbedaan persepsi antar pemangku kepentingan, komunikasi yang kurang efektif, dan pembagian sumber daya yang tidak merata. Kesimpulannya dengan manajemen konflik yang tepat, termasuk penerapan strategi negosiasi berbasis kompromi dan kolaborasi, konflik tersebut dapat diubah menjadi peluang untuk perbaikan organisasi. Penelitian ini memberikan rekomendasi untuk meningkatkan keterampilan negosiasi, komunikasi yang lebih inklusif, dan penerapan strategi kolaboratif dalam manajemen konflik di sekolah. Kontribusi penelitian ini dapat memberikan wawasan dan solusi praktis bagi sekolah-sekolah lain dalam menghadapi dinamika konflik internal dalam upaya meningkatkan kualitas pendidikan.
Karakteristik Pasien Infeksi Saluran Kemih di Ruang Rawat Inap Bedah Al-bayyan RSUD Meuraxa Kota Banda Aceh Tahun 2025 Sifa, Geubrina Dara; Zurriyani; Eko Siswanto
Future Academia : The Journal of Multidisciplinary Research on Scientific and Advanced Vol. 3 No. 3 (2025): Future Academia : The Journal of Multidisciplinary Research on Scientific and A
Publisher : Yayasan Sagita Akademia Maju

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61579/future.v3i3.559

Abstract

Infeksi saluran kemih (ISK) merupakan salah satu infeksi bakteri tersering yang menyerang sistem saluran kemih dan banyak dijumpai pada pasien rawat inap. Kondisi ini dapat disebabkan oleh berbagai faktor seperti usia, jenis kelamin, lokasi infeksi, serta respon imun tubuh yang tercermin dari jumlah leukosit darah. Penelitian ini bertujuan untuk mengetahui karakteristik dan faktor resiko pasien ISK di ruang rawat inap Bedah Al-Bayyan RSUD Meuraxa Kota Banda Aceh pada periode Maret–Mei 2025. Penelitian ini merupakan penelitian deskriptif dengan pendekatan cross-sectional yang menggunakan data sekunder dari 40 rekam medik pasien yang memenuhi kriteria inklusi dan eksklusi. Data dianalisis secara univariat dan disajikan dalam bentuk distribusi frekuensi dan persentase. Mayoritas pasien ISK berada pada kelompok usia dewasa (19–59 tahun). Perempuan lebih banyak terinfeksi dibandingkan laki-laki. Lokasi infeksi tersering adalah kandung kemih (Sistitis). Pada pemeriksaan laboratorium darah pada pasien ISK mayoritas didapatkan peningkatan leukosit (leukositosis). Kesimpulan: Infeksi saluran kemih paling sering terjadi pada perempuan dewasa dengan lokasi infeksi utama di kandung kemih, serta menunjukkan respon inflamasi melalui peningkatan leukosit. Hasil ini diharapkan menjadi dasar edukasi dan pencegahan ISK di lingkungan rumah sakit.
Hybrid Zero Trust Container Based Model for Proactive Service Continuity under Intelligent DDoS Attacks in Cloud Environment Danang Danang; Eko Siswanto; Nuris Dwi Setiawan; Priyo Wibowo
International Journal of Computer Technology and Science Vol. 2 No. 3 (2025): International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v2i3.291

Abstract

Growth rapid computing cloud, especially on academic, government, and service platforms. public, has trigger improvement frequency and complexity Distributed Denial of Service (DDoS) attacks. Intelligent DDoS attacks AI based capable copy pattern Then cross user valid, so that difficult detected and mitigated. The majority approach mitigation moment This nature reactive, no scalable, and tends to sacrifice availability service for authorized users. Research​ This aiming develop architecture proactive and adaptive defense​ For ensure continuity service during attack ongoing. Security model proposed hybrid​ integrating Zero Trust Architecture (ZTA), adaptive bandwidth control, and isolation service container -based. Architecture consists of from three layer Main: (1) ZTA Policy Engine which performs verification identity and assessment behavior through tokens and policies intelligent; (2) Adaptive Bandwidth Load Balancer which automatically dynamic separate and arrange Then cross based on reputation and level trust ; and (3) Containerized Service Cluster which groups request to in different containers For user trusted and not known . Components addition such as blockchain -based smart contracts are used For recording request and verification access , as well as lightweight AI module used for profiling then cross in real-time. Simulation results show that this model succeed increase availability service for user trusted during attack , press false positive rate , as well as optimize allocation source power. Integration of zero trust policies with intelligence Then cross and segmentation service in real-time forming framework effective and scalable defense​ to modern DDoS threats . In conclusion , the study This contributes a robust , adaptive , and modular architectural model for maintain continuity cloud services in condition network at risk .