Claim Missing Document
Check
Articles

Found 10 Documents
Search

Investigation on the Services of Private Cloud Computing by Using ADAM Method Nur Widiyasono; Imam Riadi; Ahmad Luthfie
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 5: October 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (926.321 KB) | DOI: 10.11591/ijece.v6i5.pp2387-2395

Abstract

Cloud services are offered by many cloud service providers, but in for large companies generally are build  by a private cloud computing. In cloud systems of abuse it can be done by internal users or due to misconfiguration or may also refer to weaknesses in the system. This study evaluated the ADAM method (Advanced Data Acquisition Model) and tested the case schemes which are being carried out in the laboratory simulation of the process in order to obtain forensic evidence of digital data on private cloud computing services. Referring to the results of the investigation process by using ADAM Method, it can be verified that there are several parameters of the success investigation including the structure of files, files, time stamp, mac-address, IP address, username password, and the data from a server both from the desktop PC or smartphone, therefore the investigation by using ADAM can be succesed properly and correctly. Another contribution of this study was to identify the weaknesses of the service system that used owncloud in users list of the the same group can change another’s user’s passwod.
Analisis SIM Card Cloning Terhadap Algoritma Random Number Generator Nuril Anwar; Imam Riadi; Ahmad Luthfi
Jurnal Buana Informatika Vol. 7 No. 2 (2016): Jurnal Buana Informatika Volume 7 Nomor 2 April 2016
Publisher : Universitas Atma Jaya Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24002/jbi.v7i2.493

Abstract

Abstract. Crime in telecommunication sector has increased prevalently, especially with the use of mobile phone which is detrimental both for customers and the providers. In the GSM security system, several weaknesses are found concerning data security outside the network. SIM card clone is part of the security problem in which the data can be transferred to SIM card cloning media. SIM card cloning research can be presented in the form of SRES analysis algorithms A3 and A8 RAND to get Ki Auc for further analysis on SIM card cloning. To test the performance of SIM card cloning, testing parameters such as due under test (DUT) and trial and error are employed. The conclusion of this study is that the SIM card cloning method can occur when Auc Ki is obtained by downloading a crack a8 RAND Random Number Generator analysis algorithms A3 sign SIM card to match the SRES response to the Auc Ki along with supporting data contained in SIM card clones.Keywords: SIM card cloning, Random Number Generator (RAND), Sign Response (SRES).Abstrak. Kejahatan di sektor telekomunikasi kian marak akhir-akhir ini khususnya mobile phone yang merugikan baik bagi customer maupun provider seluler. Pada sistem keamanan GSM, ditemukan beberapa kelemahan di sisi pengamanan data di luar jaringan. SIM card clone adalah bagian dari masalah keamanan pada device SIM card dengan data SIM card yang dapat dipindahkan ke media SIM card cloning. Penelitian SIM Card Cloning ini disajikan berupa analisis algoritma A3 SRES, dan A8 RAND untuk mendapatkan Ki AUc untuk selanjutnya dilakukan analisis SIM Card Cloning. Untuk menguji performa SIM card cloning digunakan parameter pengujian seperti Due Under Test (DUT) dan Trial and Error. Kesimpulan dari penelitian ini didapatkan bahwa metode SIM Card Cloning dapat terjadi bilamana AUc Ki diperoleh dengan melakukan crack A8 Random Number Generator RAND sedang analisis algoritma SIM card dengan mencocokkan A3 Sign Respons SRES terhadap AUc Ki beserta data pendukung yang terdapat pada SIM card hasil kloning. Kata kunci: SIM card cloning, Random Number Generator (RAND), Sign Respons (SRES).
PEMETAAN PERAN PEMANGKU KEPENTINGAN TERHADAP PENGAMBILAN KEPUTUSAN TERHADAP KETERBUKAAN DATA Emigawaty Emigawaty; Ahmad Luthfi
JURNAL ILMIAH BETRIK : Besemah Teknologi Informasi dan Komputer Vol 12 No 3 (2021): JURNAL ILMIAH BETRIK : Besemah Teknologi Informasi dan Komputer
Publisher : LPPM Sekolah Tinggi Teknologi Pagar Alam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The role of stakeholders in government agencies in making decisions to disclose dataset in the public domain is very important and fully central. In Indonesia, government institutions are primary data providers and have the authority to determine which types of datasets may be disclosed to the public. Nevertheless, the decision-making process to open datasets carried out by government institutions is cumbersome and faces several challenges. At the same time, stakeholders can have different perspective on data disclosure, and therefore there can be pros and cons between them. Some of the causes of potential disputes in this decision making are because of several factors, such as differences in goal settings, interests, and requirements among stakeholders. The purpose of this study is to map the role of stakeholders in making data disclosure decisions. In order to map roles, this research involves several stakeholders from internal government institutions such as decision-makers, data analysts, and data evangelists. The results of this mapping indicate that each stakeholder proposes a unique blend of expertise, legitimacy, experience, risk-averse culture, as well as potential usefulness in making decisions to disclose data to the public domain. Based on the results of a case study using a semi-structured interview approach, it can be concluded that the decision-maker tends to consider the benefits and risks efficiency factors. Data analysts have an important role in weighing the benefits and risks. Meanwhile, data evangelists also play an essential role in in-depth technical analysis aspects to make stronger evidence-based or reference-based decision-making. This research contributes to providing the level of stakeholder involvement in the form of mapping roles and interests to change the current state of the stakeholder position to the desired state in the government strategic plan.
Towards Privacy by Design on the Internet of Things (IoT) Use: A Qualitative Descriptive Study Ahmad Luthfi; Emigawaty Emigawaty
Journal of Information System and Informatics Vol 4 No 2 (2022): Journal of Information Systems and Informatics
Publisher : Universitas Bina Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51519/journalisi.v4i2.302

Abstract

From remote control and surveillance to energy and health monitoring, IoT devices provide cutting-edge services to improve our lives. Nevertheless, IoT technologies raise complicated, innovative privacy-related issues that might limit their widespread adoption. Due to the passive nature of many IoT devices, it may be challenging for users to understand that their personal information is being gathered. Therefore, this paper aims to examine the Privacy by Design IoT application idea. We adapted the seven principles of Ann Cavoukian's Privacy by Design, which were first developed. In this study's qualitative descriptive methodology with interview sections are used. The results indicate that the majority of IoT users agree with and have high expectations for the Privacy by Design concept to be one of the remedies to the imbalance between concerns about the risks and benefits of using IoT.
Investigation of Fake Insider Threats on Private Cloud Computing Services Dwi Kurnia Wibowo; Ahmad Luthfi; Nur Widiyasono
International Journal of Science, Technology & Management Vol. 3 No. 5 (2022): September 2022
Publisher : Publisher Cv. Inara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46729/ijstm.v3i5.613

Abstract

Cloud-based services are service system mechanisms used by companies or organizations in conducting computerized and integrated transactions in a computer network. A service system must of course be balanced with a level of security. This is used to anticipate cyber crimes that have the potential to occur. Cloud-based services themselves are usually offered by a Cloud Service Provider (CSP). CSPs are generally configured so that they are accessible on the public internet for their services. Companies that prioritize data security want a system that is safe from a series of cyber crimes. Private cloud computing scheme is a solution that can be implemented as an alternative. The problem that occurs is the possibility of MITC (Man in the Cloud) attacks that infiltrate and manipulate identities so that they are detected as fake insider threats on cloud systems. This thesis aims to carry out threat analysis with the Man in the Cloud attack technique on private cloud computing services based on a study of the ISO 27032 standard. Reports and documentation of the results of the analysis are expected to become recommendations for the cybersecurity investigation and management process related to threats to cloud services with private schemes cloud computing.
Information System Project Development Management Ratio Set Assy GP Using Scrum Method Muchammad Abdulloh Munib; Ahmad Luthfi
Journal of Information System and Informatics Vol 5 No 1 (2023): Journal of Information Systems and Informatics
Publisher : Universitas Bina Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51519/journalisi.v5i1.456

Abstract

In April 2011, the term Industry 4.0 was introduced at the Hannover Fair. PT Yamaha Indonesia was an early adopter, implementing it in their piano manufacturing process. To achieve production targets, it is necessary to monitor the production series, including the assembly of piano components into a complete unit. SAP, a software platform, is used to improve efficiency, with one of its modules being K-STAFF, which has four derivative applications: K-Master, K-Ticket, K-Score, and K-Tiptop. However, the current production process is monitored through scanning input using a SAP derivative application, which is not visualized in the production area, leading to failed targets. To address this issue, a system is required to visualize input scan results to enable direct monitoring of the production process and achieve production targets. As a result, PT Yamaha Indonesia developed the Ratio Set Assy Grand Piano system using the SCRUM method. This system includes an MIS that monitors the ratio set of piano, visualized with Apache E-Charts, manages planning, and identifies priority spare parts in real-time. This research contributes to the development of a more efficient and effective production process
Live Forensics untuk mengenali Karakteristik Serangan File Upload Guna Meningkatkan Keamanan pada Web Server: Indonesia Isriade Putra; Yudi Prayudi; Ahmad Luthfi
JIIP - Jurnal Ilmiah Ilmu Pendidikan Vol. 6 No. 6 (2023): JIIP (Jurnal Ilmiah Ilmu Pendidikan)
Publisher : STKIP Yapis Dompu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54371/jiip.v6i6.2173

Abstract

Serangan file upload pada web server menyebabkan seseorang dapat melakukan Distributed denial-of-service yang bisa melumpuhkan web server dan web shell dapat membuat penyerang mengeksekusi perintah dari jarak jauh. Penelitian ini menggunakan metoide live forensics, dengan mengumpulkan artefak pada perangkat jaringan, yaitu router, menggunakan winbox karena router ialah perangkat jaringan yang terhubung langsung ke web server ketika terjadi serangan dan komputer server menggunakan wireshark secara visualisasi dan dynamic, sehingga data yang diperoleh dari router dan komputer server dapat menjadi perbandingan. Hasil dari analisis penelitian ini ialah mengetahui karakteristik artefak serangan distributed Denial-of-service yaitu banyaknya paket Synchronization-Acknowledgment yang dikirim ke web server dan web shell dengan ciri artefak unggahan script ekstensi .php. Selanjutnya artefak yang ditemukan pada serangan distributed denial-of-service pada router menggunakan aplikasi winbox kemudian memberikan rekomendasi perbaikan untuk meningkatkan keamanan pada web server.
Development of Logistics Driver Tenko System (ORIENT) Application Using Scrum Framework Adelia Maharani; Ahmad Luthfi
Journal of Information System and Informatics Vol 5 No 2 (2023): Journal of Information Systems and Informatics
Publisher : Universitas Bina Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51519/journalisi.v5i2.522

Abstract

Occupational safety and health hold significant importance for both agencies and individuals alike. A crucial aspect of assessing driver readiness involves examining their physical well-being. Truck drivers who possess unhealthy physical conditions face a four-fold higher risk of work accidents compared to those with sound physical health. PT. Toyota Motor Manufacturing Indonesia (TMMIN), being a manufacturing company, must prioritize occupational safety and health, particularly within the logistics domain. Presently, some logistics partners collaborating with TMMIN adhere to their own standards when conducting checks, relying on paper records for documenting the results. Unfortunately, this approach hinders proper archiving of inspection records and fails to establish a direct link with logistics partner customers in cases involving drivers with health issues. Hence, PT. Toyota Motor Manufacturing Indonesia is dedicated to enhancing the quality of driver health checks through logistics partners by implementing an integrated recording system called the Logistics Driver Tenko System Application (ORIENT). The development of ORIENT is based on the Scrum framework. This research aims to offer insights into the direct implementation of the Scrum method in project development.
Comparison of Naïve Bayes and Logistic Regression in Sentiment Analysis on Marketplace Reviews Using Rating-Based Labeling Satya Abdul Halim Bahtiar; Chandra Kusuma Dewa; Ahmad Luthfi
Journal of Information System and Informatics Vol 5 No 3 (2023): Journal of Information Systems and Informatics
Publisher : Universitas Bina Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51519/journalisi.v5i3.539

Abstract

This research focuses on sentiment analysis in the marketplace reviews in Google Play Store, a platform for downloading Android applications and providing reviews. Sentiment analysis is essential for understanding user responses to applications, particularly in the app marketplace. In this study, two machine learning algorithms, Naïve Bayes and Logistic Regression, are employed to classify user reviews. The application rating is used as a reference to determine the sentiment of each comment. The dataset is divided into two conditions: using 2 labels (positive & negative) and 3 labels (positive, neutral, & negative). The test results indicate that the highest performance is achieved by classifying with Logistic Regression on the Shopee dataset with 2 labels. The accuracy reaches 84.58%, precision reaches 84.66%, and recall reaches 84.63%. Additionally, the fastest processing time occurs when testing the Lazada 2-label dataset with Naïve Bayes, taking only 0.038 seconds. Overall, the research suggests that datasets with 2 labels tend to yield higher accuracy compared to datasets with 3 labels.
METODE KLASIFIKASI DAN ANALISIS KARAKTERISTIK MALWARE MENGGUNAKAN KONSEP ONTOLOGI Abdul Haris Muhammad; Bambang Sugiantoro; Ahmad Luthfi
Jurnal Teknomatika Vol 9 No 2 (2017): TEKNOMATIKA
Publisher : Fakultas Teknik dan Teknologi Informasi, Universitas Jenderal Achmad Yani Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Analisis malware membutuhkan keterampilan khusus untuk melakukan pendeteksian dan memahami cara kerja dari malware tersebut. Program berbahaya atau malware menjadi sebuah ancaman atau masalah yang sulit bagi para peneliti, tidak ada platform komputasi atau lingkungan yang kebal terhadap ancaman tersebut. Kompleksitas yang meningkat membuat para peneliti harus bekerja keras dan membutuhkan waktu untuk memahami cara kerja malware. Terdapat dua teknik dasar yang sering digunakan untuk melakukan analisis malware yaitu statis dan dinamis analisis, dan penelitian malware yang dilakukan selama ini masih berfokus pada analisis perilaku yang keberhasilan metode tersebut tergantung pada model malware. Penggunaan teknik signature based sangat tergantung pada perilaku malware yang dianalisis, analisis menjadi sulit ketika ditemukan malware baru yang menggunakan suatu teknik baru untuk menyulitkan sistem analisis. Berdasarkan uraian fakta yang disampaikan, dianggap perlu dibangun sebuah ontologi dalam melakukan analisis terhadap malware sehingga dapat digunakan sebagai pengemabangan, pemetaan pengetahuan serta mengindetifikasi tren, dan pola dalam melakukan analisis malware. Pada penelitian ini metode yang diusulkan adalah pengembangan dari metode Malware Analysis Body of Knowledge, dimana metode ini bekerja pada domain tertentu untuk memetakan karakteristik dan mengklasifikasi jenis malware yang akan dibahas. Pada penelitian ini berfokus kepada ontologi sebagai knowledge base dan pembahasannya lebih kepada memetakan karakteristik dan pengklasifikasian jenis malware.