Claim Missing Document
Check
Articles

Found 30 Documents
Search

Analisa Keamanaan Jaringan Komputer Menggunakan Sistem Deteksi Intrusi Shorewall Hendri, Hendri Alamsyah
JURNAL AMPLIFIER : JURNAL ILMIAH BIDANG TEKNIK ELEKTRO DAN KOMPUTER Vol. 13 No. 1 (2023): Amplifier Mei Vol. 13, No. 1 2023
Publisher : UNIB Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33369/jamplifier.v13i1.27888

Abstract

Penelitian ini bertujuan untuk membangun sistem pendeteksi gangguan dalam jaringan berbasis Network Intrusion Detection System (NIDS) menggunakan Shorewall, serta mengetahui cara kerja dari shorewall dalam mencegah dan mengatasi sistem keamanan jaringan komputer SMK N 3 Kepahiang. Penelitian ini menggunakan metode penelitian eksprimen. Pada penelitian ini dilakukan analisa yang akan dijadikan sebagai bahan untuk Implementasi sistem deteksi intrusi menggunaakn metode Network Intrusion Detection System (NIDS) dengan memanfaatkan tools shorewall. Hasil eksprimen selanjutnya didokumentasikan untuk melakukan analisis sehingga dihasilkan rekomendasi yang tepat untuk sistem keamanan menggunakan deteksi intrusi shorewall. Hasil penelitian ini menunjukkan Shorewall dapat diterapkan pada jaringan menggunakan 2 interface yang dapat digunakan untuk terhubung ke jaringan internet dan juga jaringan lokal, shorewall juga dapat digunakan sebagai sistem deteksi intrusi untuk Mac clone dan DDoS attack yang dapat dilakukan dalam jaringan sehingga dapat melakukan reject terhadap aktifitas mac clone dan DDoS attack. Penerapan shorewall sebagai sistem deteksi intrusi tidak mempengeruhi kualitas layanan, dimana dari hasil pengujian Berdasarkan ITU G.114 masih dikategorikan baik dengan nilai dari delay sebesar 1.92 ms, jitter sebesar 33.3 ms, packet loss sebesar 0%, dan throughput sebesar 548 kb.
Alat Sistem Penjemur Ikan Asin Otomatis Berbasis IoT (Internet Of Things) Herwanto, Prengki Rahmadan; Kalsum, Toibah Umi; Alamsyah, Hendri
JURNAL AMPLIFIER : JURNAL ILMIAH BIDANG TEKNIK ELEKTRO DAN KOMPUTER Vol. 13 No. 2 (2023): Amplifier November Vol. 13, No. 2 2023
Publisher : UNIB Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33369/jamplifier.v13i2.31803

Abstract

The fishing industry is currently one of the choices of food ingredients for daily needs. In everyday life, we are familiar with salted fish. To process salted fish, the drying process is done manually so fishermen have to directly control the drying of salted fish using 5-6 fishermen and drying salted fish cannot be left alone because salted fish is very vulnerable to rainwater. To minimize damage to salted fish and make fishermen's work easier, technology for automatic drying of salted fish based on the internet of things has been developed. The components used in making this IoT-based salted fish dryer are NodeMcu, rain sensors, light sensors, and servo motors. This research uses experimental methods, this research was carried out on ANTB (Bengkulu Traditional Fishermen's Alliance) on the coast of Bengkulu. The results of the research, the salted fish drying equipment can be controlled remotely using the Blynk Platform with an ON-OF controller, opening the drying roof by detecting the bright light sensor and closing the drying roof by detecting the rain sensor, then monitoring the drying remotely using the Blynk Platform so that it can determine bright conditions by displaying the LDR sensor value and indicator light for the rain sensor.
Monitoring and Detection System of Level and Turbidity in Embankment Water in Real Time Based on IoT Alamsyah, Hendri; Sawaludin, Prengki; Kalsum, Toibah Umi
Internet of Things and Artificial Intelligence Journal Vol. 4 No. 3 (2024): Volume 4 Issue 3, 2024 [August]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/iota.v4i3.760

Abstract

In 2020 there were floods in the Air Hitam and Tanjung Alam villages, Bengkulu Province, and surrounding areas. These floods have caused a lot of losses to the community, especially resulting in damage to houses and agricultural land. Flooding in the Air Hitam and Tanjung Alam village areas, Bengkulu Province, occurred due to heavy rain that fell for 3 consecutive days, resulting in the overflow of the Musi Hydroelectric Power Plant (Hydroelectric Power Plant) dam which was unable to withstand the water discharge and eventually overflowed. So in this research, a prototype system for monitoring and detecting height and turbidity in embankment water in real time based on IoT will be designed. The method used is a waterfall, where the ultrasonic sensor and turbidity sensor will be connected to the ESP-8266 NodeMCU so that data on the height and turbidity of the embankment water is obtained in real-time via the user interface on the Thinger io Platform. Apart from that, the system uses LEDs in red, yellow, and green as indicators of the embankment water level. These results show that the implementation of a real-time IoT-based monitoring and detection system for height and turbidity in embankment water has good capabilities. This is indicated by the user being able to see data on the prototype system for monitoring and detecting height and turbidity in embankment water in real-time based on IoT with the display of numbers and LED indicator lights. The seawater height scale used in the system on the red LED indicator lights is 16 - 20 cm, yellow is 10 - 15 cm, and green is 0 - 9 cm.
Pelatihan Jaringan Komputer Sebagai Sarana Pembelajaran Di Smk Negeri 2 Empat Lawang Khairil, Khairil; Sapri, Sapri; Alamsyah, Hendri; Zulfiandy, Ricky
Jurnal Dehasen Untuk Negeri Vol 4 No 1 (2025): Januari
Publisher : Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jdun.v4i1.7722

Abstract

This training aims to enhance students' knowledge of computer networks, providing various benefits in the era of technological advancement. By learning about computer networks, students acquire skills relevant to industry needs, improve digital literacy, and open promising career opportunities. Additionally, this training prepares students for further education. The training was conducted at SMK Negeri 2 Empat Lawang with 46 student participants. The materials covered included fundamental concepts of computer networks, such as protocols, topologies, and network hardware and software. The training was designed using an approach that included delivering materials, simulating the construction of simple computer networks, and evaluation sessions through Q&A to deepen students' understanding. The results of this training showed an increase in students' knowledge, particularly in understanding the basics of computer networks and their ability to assemble and configure simple networks. Moreover, the training successfully fostered students' curiosity and interest in information technology, preparing them to face challenges in the digital era and become individuals ready to compete in the workforce and pursue higher education.
Development Of Wifi 6 Based Computer Network At LPK Sulthoon 4M Ananda, Rizky; Alamsyah, Hendri; Mardiana, Yessi
Jurnal Media Computer Science Vol 4 No 1 (2025): Januari
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v4i1.7709

Abstract

The development of computer networks has reached various aspects of life, with its wide use by groups and individuals. Computer network technology is very important because it has many advantages, such as developing a Wi-Fi 6-based computer network at LPK Sulthoon 4M to improve network performance and overcome the obstacles of slow connections that often occur when many devices are connected. The research method used is a field research approach with the stages of observation, interviews, documentation, and network quality testing. The network development process was conducted through the Network Development Life Cycle (NDLC) method, which includes requirements analysis, topology design, Wi-Fi 6 device implementation, and network performance testing based on Quality of Service (QoS) parameters, such as throughput, delay, jitter, and packet loss. The test results show a significant increase in data transfer speed with an average throughput of 5,049.71 kbps and a packet loss rate of 0%, and an average delay of 6.55 ms. The implementation of Wi-Fi 6 is proven effective in improving network stability and speed, thus supporting the smooth running of digital-based learning activities at LPK Sulthoon 4M.
Manajemen Pembelajaran Kolaboratif Melalui Integrasi Teknologi dalam Implementasi Kurikulum Merdeka Sebagai Inovasi Pembelajaran di SMP N 2 Kota Bengkulu Citra Dewi; Suwarni; Feby Elra Perdima; Juwita; Hendri Alamsyah; Dariusman; Hebrian Ananda
BEKTI : Jurnal Pengabdian kepada Masyarakat Vol. 3 No. 2 (2024): BEKTI : Jurnal Pengabdian Kepada Masarakat (November 2024 - February 2025)
Publisher : Lembaga Citra Pustaka

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56480/bekti.v3i2.1319

Abstract

Collaborative learning is learning that places students with diverse backgrounds and abilities working together in small groups to achieve common goals. There are several characteristics of collaborative learning, namely: (1) positive dependence, (2) interaction (face to face), (3) individual and group accountability, (4) development of interpersonal skills (5) formation of heterogeneous groups, (6) sharing knowledge between teachers and students, (7) sharing authority or roles between teachers and students, and (8) teachers as mediators. Collaborative learning is in accordance with the constructivism ideology. According to the constructivism ideology, knowledge cannot be transferred from teacher to student, but must be actively constructed by students themselves. In this community service, the Dehasen Bengkulu University Lecturer Team provided assistance/socialization related to Collaborative Learning Management through technology integration in the implementation of the independent curriculum as a form of learning innovation at SMPN 2 Bengkulu City. This activity aims to increase knowledge for teachers at SMPN 2 Bengkulu City to be able to further develop varied and student-centered learning. Through collaborative learning, students can provide each other with intellectual guidance that allows them to work on more complex tasks. This would be difficult to achieve if students did it individually.
Penerapan Sistem Keamanan Web Menggunakan Metode Web Aplication Firewall Riska, Riska; Alamsyah, Hendri
JURNAL AMPLIFIER : JURNAL ILMIAH BIDANG TEKNIK ELEKTRO DAN KOMPUTER Vol. 11 No. 1 (2021): Amplifier Mei Vol. 11, No. 1 2021
Publisher : UNIB Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33369/jamplifier.v11i1.16683

Abstract

The application of a security system on the web needs to be done considering that the web itself can be accessed through a public network. In this study, a Web Application Firewall (WAF)-based security system will be implemented using modsecurity, in which the purpose of implementing this web security system is to understand the concept of a security system on the web and pay attention to the results before the application of the firewall and after the application of the firewall on the web. This research uses experimental research methods, in this study the implementation of a web application firewall (WAF) using modsecurity as a web security system is carried out, then an analysis is carried out to get the right recommendations for a firewall as a web security system. The results of this study indicate that a firewall using the modSecurity module and rule based on the Web Application Firewall (WAF) on a web security system can block SQL Injection, Cross Site Scripting (XSS), and Command Execution by displaying an error message to the user who performs the command.
Designing a Virtual Lan Network Using Manageable Switches at Smkn 3 Bengkulu City Dwinata, Renaldo; Kalsum, Toibah Umi; Alamsyah, Hendri
Jurnal Media Computer Science Vol 4 No 2 (2025): Juli
Publisher : LPPJPHKI Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v4i2.8255

Abstract

This study aims to design a VLAN network using a manageable switch at SMKN 3 Kota Bengkulu. The research method used in this study is the PPDIOO method. The hardware used in the configuration of the Virtual LAN network design is a Mikrotik Haplite Rb941 4 port and a D-link manageable switch, while the software used for the configuration is the Windows 10 operating system and a web browser. Data collection was carried out by observation, laboratory studies, and literature studies. The results showed that the quality of the VLAN network was better than the actual network as measured by the parameters of throughput, packet loss, delay, and jitter. The throughput value on the actual network was 198 Kb (poor) and increased on the VLAN network by 1367 kb (good). The actual network delay value was 3.56 ms (moderate) and decreased on the VLAN network by 2.53 ms (good). The jitter value also decreased from 8.30 ms (moderate) to 7.45 ms (good). Meanwhile, the packet loss value on the actual network and VLAN are both 0% (very good). In addition, the performance of file transfer speed between PCs using VLAN networks is better than the actual network, which is 10.9 MB/s for the actual network and 11 MB/s for the VLAN network. The use of VLAN networks can also improve network security because it can separate teacher and administration PCs as evidenced by the two PCs not being connected when the ping test was carried out.
Analisa Sistem Keamanan Web Menggunakan OWASP Zed Attack Proxy (ZAP) Alamsyah, Hendri; Roynaldi, Tomy; Kalsum, Toibah Umi
Journal Computer Science and Information Systems : J-Cosys Vol 5, No 1 (2025): Maret
Publisher : Universitas Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53514/jco.v5i1.613

Abstract

Keamanan web sangat penting untuk menjaga integritas dan kerahasiaan data. Penelitian ini menganalisis keamanan dua situs web berbasis CMS WordPress dan menggunakan OWASP Zed Attack Proxy (ZAP) dengan Authentication Testing, Authorization Testing, dan Session Management Testing. Hasil pengujian menunjukkan bahwa CMS WordPress memiliki celah SQL Injection berisiko tinggi pada http://192.168.10.250/wp-comments-post.php dan 12 celah otorisasi berisiko sedang yang mengarah ke direktori penyimpanan web. Sebaliknya, CMS Drupal tidak ditemukan celah keamanan pada ketiga aspek pengujian. Kesimpulannya, CMS WordPress lebih rentan dibandingkan CMS Drupal, terutama dalam autentikasi dan otorisasi. Oleh karena itu, perlu mitigasi seperti kebijakan keamanan yang lebih ketat, pembaruan sistem berkala, serta penguatan metode autentikasi dan otorisasi untuk mengurangi risiko serangan.
Analisa Dan Implementasi Keamanan Jaringan Berbasis Firewall RAW Terhadap Serangan DDoS Pada Router Mikrotik Riduan, Mas Agus Okto; Riska, Riska; Alamsyah, Hendri
Jurnal Media Infotama Vol 21 No 1 (2025): April 2025
Publisher : UNIVED Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmi.v21i1.7835

Abstract

Penelitian ini bertujuan untuk menganalisis dan mengimplementasikan keamanan jaringan berbasis Firewall Raw terhadap serangan Distributed Denial of Service (DDoS) pada Router Mikrotik. DDoS merupakan ancaman serius yang dapat mengganggu layanan jaringan, sehingga penting untuk menguji efektivitas Firewall Raw dalam menghadapi serangan tersebut. Dalam penelitian ini, pengujian dilakukan dengan tiga jenis serangan DDoS, yaitu TCP SYN Flood, UDP Flood, dan ICMP Flood, pada jaringan lokal dan jaringan internet. Metode penelitian yang digunakan adalah metode eksperimental, di mana konfigurasi Firewall Raw disesuaikan untuk berbagai protokol yang diuji. Hasil penelitian menunjukkan firewall raw mampu memblokir lebih dari 70% paket serangan DDoS. Dari sisi performansi sebelum firewall raw diaktifkan, penggunaan CPU pada router sebesar 100% dan free memory 5.8 MiB saat serangan terjadi. Ketika Firewall Raw diaktifkan, CPU menurun menjadi 60-70% dan free memory meningkat menjadi 9.8 MiB. Pada pengujian DDoS lewat jaringan internet juga menunjukkan penurunan CPU Load dari 100% turun menjadi 5% dan free memory dari 4.5 MiB meningkat menjadi 8.0 MiB. Pengukuran Quality of Service, menunjukkan tidak terlihat peningkatan yang signifikan saat Firewall Raw diaktifkan. Penelitian ini menyimpulkan bahwa Firewall Raw cukup efektif dalam memblokir sebagian besar paket dari serangan DDoS. Namun, belum mampu meningkatkan stabilitas jaringan karena jaringan masih mengalami penurunan saat Firewall Raw aktif.