Claim Missing Document
Check
Articles

Found 10 Documents
Search

Investigation on the Services of Private Cloud Computing by Using ADAM Method Nur Widiyasono; Imam Riadi; Ahmad Luthfie
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 5: October 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (926.321 KB) | DOI: 10.11591/ijece.v6i5.pp2387-2395

Abstract

Cloud services are offered by many cloud service providers, but in for large companies generally are build  by a private cloud computing. In cloud systems of abuse it can be done by internal users or due to misconfiguration or may also refer to weaknesses in the system. This study evaluated the ADAM method (Advanced Data Acquisition Model) and tested the case schemes which are being carried out in the laboratory simulation of the process in order to obtain forensic evidence of digital data on private cloud computing services. Referring to the results of the investigation process by using ADAM Method, it can be verified that there are several parameters of the success investigation including the structure of files, files, time stamp, mac-address, IP address, username password, and the data from a server both from the desktop PC or smartphone, therefore the investigation by using ADAM can be succesed properly and correctly. Another contribution of this study was to identify the weaknesses of the service system that used owncloud in users list of the the same group can change another’s user’s passwod.
Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Network Forensics Abdul Fadlil; Imam Riadi; Sukma Aji
Bulletin of Electrical Engineering and Informatics Vol 6, No 2: June 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (995.882 KB) | DOI: 10.11591/eei.v6i2.605

Abstract

Distributed Denial of Service (DDoS) is a type of attack using the volume, intensity, and more costs mitigation to increase in this era. Attackers used many zombie computers to exhaust the resources available to a network, application or service so that authorize users cannot gain access or the network service is down, and it is a great loss for Internet users in computer networks affected by DDoS attacks. In the Network Forensic, a crime that occurs in the system network services can be sued in the court and the attackers will be punished in accordance with law. This research has the goal to develop a new approach to detect DDoS attacks based on network traffic activity were statistically analyzed using Naive Bayes method. Data were taken from the training and testing of network traffic in a core router in Master of Information Technology Research Laboratory University of Ahmad Dahlan Yogyakarta. The new approach in detecting DDoS attacks is expected to be a relation with Intrusion Detection System (IDS) to predict the existence of DDoS attacks.
Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Network Forensics Abdul Fadlil; Imam Riadi; Sukma Aji
Bulletin of Electrical Engineering and Informatics Vol 6, No 2: June 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (995.882 KB) | DOI: 10.11591/eei.v6i2.605

Abstract

Distributed Denial of Service (DDoS) is a type of attack using the volume, intensity, and more costs mitigation to increase in this era. Attackers used many zombie computers to exhaust the resources available to a network, application or service so that authorize users cannot gain access or the network service is down, and it is a great loss for Internet users in computer networks affected by DDoS attacks. In the Network Forensic, a crime that occurs in the system network services can be sued in the court and the attackers will be punished in accordance with law. This research has the goal to develop a new approach to detect DDoS attacks based on network traffic activity were statistically analyzed using Naive Bayes method. Data were taken from the training and testing of network traffic in a core router in Master of Information Technology Research Laboratory University of Ahmad Dahlan Yogyakarta. The new approach in detecting DDoS attacks is expected to be a relation with Intrusion Detection System (IDS) to predict the existence of DDoS attacks.
Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Network Forensics Abdul Fadlil; Imam Riadi; Sukma Aji
Bulletin of Electrical Engineering and Informatics Vol 6, No 2: June 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (995.882 KB) | DOI: 10.11591/eei.v6i2.605

Abstract

Distributed Denial of Service (DDoS) is a type of attack using the volume, intensity, and more costs mitigation to increase in this era. Attackers used many zombie computers to exhaust the resources available to a network, application or service so that authorize users cannot gain access or the network service is down, and it is a great loss for Internet users in computer networks affected by DDoS attacks. In the Network Forensic, a crime that occurs in the system network services can be sued in the court and the attackers will be punished in accordance with law. This research has the goal to develop a new approach to detect DDoS attacks based on network traffic activity were statistically analyzed using Naive Bayes method. Data were taken from the training and testing of network traffic in a core router in Master of Information Technology Research Laboratory University of Ahmad Dahlan Yogyakarta. The new approach in detecting DDoS attacks is expected to be a relation with Intrusion Detection System (IDS) to predict the existence of DDoS attacks.
Analisis Forensik Smartphone Android Menggunakan Metode NIST dan Tool MOBILedit Forensic Express Nasirudin Nasirudin; Sunardi Sunardi; Imam Riadi
Jurnal Informatika Universitas Pamulang Vol 5, No 1 (2020): JURNAL INFORMATIKA UNIVERSITAS PAMULANG
Publisher : Teknik Informatika Universitas Pamulang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (274.423 KB) | DOI: 10.32493/informatika.v5i1.4578

Abstract

Technological advances are growing rapidly, including mobile device technology, one of which is an Android smartphone that is experiencing rapid progress with a variety of features so that it can spoil its users, with the rapid development of smartphone technology, many users benefit, but many are disadvantaged by the growing smartphone. technology, so that many perpetrators or persons who commit crimes and seek profits with smartphone facilities. Case simulation by securing Samsung Galaxy A8 brand android smartphone evidence using the MOBILedit forensic express forensic tool with the National Institute of Standards and Technology (NIST) method which consists of four stages of collection, examination, analysis and reporting. The results of testing the Samsung Galaxy A8 android smartphone are carried out with the NIST method and the MOBILedit Forensic Express tool obtained by data backup, extraction and analysis so that there are findings sought for investigation and evidence of crimes committed by persons using android smartphone facilities.
Forensik Mobile Pada Kasus Cyber Fraud Layanan Signal Messenger Menggunakan Metode NIST Imam Riadi; Herman Herman; Nur Hamida Siregar
JOINTECS (Journal of Information Technology and Computer Science) Vol 6, No 3 (2021)
Publisher : Universitas Widyagama Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31328/jointecs.v6i3.2591

Abstract

Perkembangan dalam penggunaan media sosial mengalami peningkatan yang sangat pesat saat ini. Salah satu faktor meningkatnya penggunaan media sosial yaitu pandemi Covid-19. Segala aktivitas pekerjaan diharuskan dan dialihkan untuk dikerjakan secara online. Aplikasi Signal Messenger memiliki fitur serupa WhatsApp (WA) tetapi lebih aman dari segi keamanan data pribadi. Keamanan data pribadi menjadi salah satu faktor beralihnya pengguna WA ke signal messenger. Penggunaan media sosial memiliki dampak positif dan dampak negatif. Salah satu contoh dampak negatif yaitu terjadinya tindak kejahatan. Tindak kejahatan dapat terjadi selama aplikasi yang digunakan menyediakan fitur untuk mengirim pesan teks, gambar maupun video. Aplikasi signal messenger juga memungkinkan disalahgunakan oleh individu yang tidak bertanggung jawab. Hal ini mendorong dilakukannya investigasi terhadap kasus cyber fraud melalui analisis forensik menggunakan pendekatan atau metode National Institute of Standarts and Technology (NIST). Tujuan penelitian ini yaitu mendapatkan barang bukti digital berupa data teks percakapan (chat), gambar, GIF, dokumen pdf, video, voice call dan video call. Perangkat yang digunakan sebagai objek penelitian berupa smartphone android. Perangkat lunak forensik mobile yang digunakan pada penelitian ini yaitu MOBILedit Forensic Express. Berdasarkan hasil analisis forensik, kinerja tools MOBILedit Forensic cukup baik karena mampu mengangkat bukti digital berupa 2 gambar, 1 GIF, 1 dokumen pdf, dan 1 video. Bukti digital yang diperoleh dari penelitian ini memiliki tingkat keberhasilan secara keseluruhan sebesar 57,14%. Barang bukti dapat digunakan sebagai pendukung penyelidikan tindak kejahatan kasus cyber fraud di pengadilan. Penelitian ini mendapatkan hasil sesuai tujuan yang diharapkan walaupun belum mampu membaca chat, histori voice call dan video call.    
Analisis Deteksi Vulnerability Pada Web Server Open Journal System Menggunakan OWASP Scanner Yunanri. W; Imam Riadi; Anton Yudhana
Jurnal Rekayasa Teknologi Informasi (JURTI) Vol 2, No 1 (2018): Jurnal Rekayasa Teknologi Informasi (JURTI)
Publisher : Universitas Mulawarman

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1890.895 KB) | DOI: 10.30872/jurti.v2i1.1319

Abstract

Keamanan merupakan suatu usaha yang dilakukan untuk melindungi informasi yang terdapat didalamnya yang mengacu pada kerahasiaan. Sebuah sistem yang terhubung dengan jaringan internet, akan memiliki tingkat kerawanan tinggi akan menjadi sebuah polemik bagi pemilik layanan sebuah informasi. Metode yang dilakukan adalah mengaudit webserver Open Jurnal System (O.J.S). Kegiatan ini bertujuan untuk mengidentifikasi dan mengekploitasi kerentanan pada webserver Open Jurnal Sistem (O.J.S). Pada penelitian ini menggunakan tool Open Web Aplication Security Project (OWASP). Pengujian ini bertujuan mencari vulnerability pada webserver Open Jurnal Sistem (OJS) adapun tingkatan vulnerability yang dideteksi dalam pengujian ini antara lain high risk, medium risk, low risk. tujuan mengamankan dari serangan SQL Injection maupun Cross Site Scripting XSS, karena akan membawa dampak kegagalan sistem. Manfaat dari pengujian ini sebagai alert atau peringatan. adanya serangan SQl Injection maupun serangan Cross Site Scripting XSS, oleh tool OWASP dalam mengaudit secara mandiri pada webserver Open Jurnal System sendiri.
Analisis Forensik Recovery pada Smartphone Android Menggunakan Metode National Institute Of Justice (NIJ) Imam Riadi; Sunardi Sunardi; Sahiruddin Sahiruddin
Jurnal Rekayasa Teknologi Informasi (JURTI) Vol 3, No 1 (2019): Jurnal Rekayasa Teknologi Informasi (JURTI)
Publisher : Universitas Mulawarman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30872/jurti.v3i1.2292

Abstract

keberadaan smartphone saat ini dianggap sangat membantu aktifitas manusia dalam melakukan pekerjaan sehari- hari. Berkembangnya fitur-fitur yang ada pada smartphone memudahkan para penggunanya beraktifitas seperti melakukan pekerjaan kantor, bisnis, e-banking, dan untuk berinteraksi dengan pengguna lain di media sosial. Perkembangan smartphone tidak hanya memberikan dampak positif tetapi bisa berdampak negatif  ketika perkembangan tersebut dimanfaatkan untuk melakukan tindakan kejahatan. Saat ini terdapat banyak kasus penghapusan barang bukti kejahatan yang dilakukan oleh tersangka untuk mengilangkan  bukti kejahatan yang  dilakukan  oleh seorang  pelaku. Hal ini menjadi tantangan bagi  forensika teknologi informasi dan  penegak  hukum melakukan  penyelidikan  secara forensik terhadap smartphone dari  tersangka dalam sebuah  kasus  kejahatan  untuk mendapatkan kembali bukti digital yang akan dijadikan sebagai barang bukti dalam sebuah persidangan. Penelitian ini menggunakan tools  MOBILedit Forensic, Wondershare dr. Fone for Android, dan Belkasoft Evidence Center untuk memperoleh bukti digital serta menggunakan metode National Institute of Justice (NIJ) yaitu dengan mengidentifikasi, mengusulkan solusi, melakukan uji solusi yang ditawarkan, mengevaluasi dan melaporkan hasil. Dari hasil pengujian tool forensik yang peneliti gunakan, tool MOBILedit Forensic tidak bisa mengembalikan data yang sudah dihapus, tool Wondershare dr. Fone For Android berhasil mengembalikan data kontak, log panggilan,dan pesan yang sudah dihapus, sementara tool Belkasoft Evidence Center hanya bisa mengembalikan data kontak, dan log panggilan yang sudah dihapus.
Steganalysis Bukti Digital pada Media Storage Menggunakan Metode GCFIM Muh Hajar Akbar; Sunardi Sunardi; Imam Riadi
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 5 No. 2 (2020): September 2020
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (969.618 KB) | DOI: 10.14421/jiska.2020.52-04

Abstract

Steganography is an anti-forensic technique that allows a criminal to hide information in other messages, so that during an examination it will be difficult to obtain evidence of the crime information. Therefore we need a technique to detect hidden messages in the data. This technique is known as steganalysis. Steganalysis is an anti-steganography science whose main purpose is to study the hiding characteristics of data on digital media and detect the existence of secret messages that are hidden using steganography techniques. The purpose of this study is to apply steganalysis techniques to detect the presence of messages that are hidden in other messages by using the forensic method, namely Generic Computer Forensic Investigation Model (GCFIM). In this study, the process of inserting steganographic messages using the Hiderman application, while the steganalysis process uses the StegSpy application. The results obtained in this study were the process of steganalysis using the help of the StegSpy application proved to be successful in detecting the presence of hidden messages in the five files that were scanned by steganographic messages.
Non-linear Kernel Optimisation of Support Vector Machine Algorithm for Online Marketplace Sentiment Analysis Abdul Fadlil; Imam Riadi; Fiki Andrianto
JUITA: Jurnal Informatika JUITA Vol. 12 No. 1, May 2024
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30595/juita.v12i1.19798

Abstract

Twitter is a social media platform that is very important in the digital world. Fast communication and interaction make Twitter a vital information center in sentiment analysis. The purpose of this research is to classify public opinion about the presence of marketplaces in Indonesia, both positive and negative sentiments, using a Non-linear SVM algorithm based on 1276 tweets. This research involves the stages of data pre-processing, labeling, feature extraction using TF-IDF, and data division into three scenarios: 80% training data and 20% test data, 50% training data and 50% test data scenario, and 20% training data and 80% test data scenario. The last process, GridSearchCV, combines cross-validation and non-linear SVM parameters for model evaluation using a confusion matrix. The best SVM model resulting from the scenario was 80% training and 20% test data, with hyperparameters Gamma = 100 and C = 0.01, achieving 89% accuracy. When tested on never-before-seen data, the accuracy increased to 90%, with an f1-score of 91%, precision of 88%, and recall of 95% on negative sentiments. In conclusion, evaluating the performance of non-linear SVM kernels with a combination of hyperparameter values can improve accuracy, especially on public response information about online marketplaces and public sentiment.