Claim Missing Document
Check
Articles

IMPLEMENTASI WIRESHARK DALAM MELAKUKAN PEMANTAUAN PROTOCOL JARINGAN: Studi Kasus : Intranet Jurusan Teknologi Informasi Universitas Udayana I Putu Agus Eka Pratama; Putu Adhika Dharmesta
Jurnal Mantik Vol. 3 No. 1 (2019): May: Manajemen dan Informatika
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (392.431 KB)

Abstract

Wireshark is a leading open source tool that is widely used to analyze and troubleshoot network problems, allowing us to find out about network problems. The development of Wireshark evolved thanks to the contribution of volunteer network experts around the world and is a continuation of the project started by Gerald Combs in 1998. This monitoring covers the flow of protocol that is being used by networks and computers. This test will implement Wireshark as an application to monitor computer communication networks to see and process the results of network monitoring with case studies on the intranet of the Information Technology Department of the Faculty of Engineering, Udayana University
IMPLEMENTASI IDS MENGGUNAKAN SNORT PADA SISTEM OPERASI UBUNTU: Implementasi IDS Menggunakan Snort Pada Sistem Operasi Ubuntu I Putu Agus Eka Pratama; NI Kade Mega Handayani
Jurnal Mantik Vol. 3 No. 1 (2019): May: Manajemen dan Informatika
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (863.392 KB)

Abstract

Network security can be improved by implementing the Intrusion Detection System (IDS). Snort is an Intrusion Detection System program, which is a program that can detect an intrusion attempt on a computer network system. Implementation of an Open Source intrusion based Snort detection system is a cost advantage with reliable performance in detecting attacks. Snort can be implemented on various operating systems including Ubuntu Linux. An attack can be detected or not by Snort IDS, depending on the rules / rules in Snort. Snort testing is done with several attack patterns such as Ping, Port Scanning, Ping of Deatch with several tools such as NMAP, SQLMAP and others. Based on the results of testing Snort can detect and provide warnings about attacks that threaten a computer network of a server. The test results are expected to be used as a alternative in server network security.
Content Based Image Retrieval Using Lacunarity and Color Moments Of Skin Diseases I Gusti Ayu Triwayuni; I Ketut Gede Darma Putra; I Putu Agus Eka Pratama
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i1.pp243-248

Abstract

The research conducted contributed in the form of CBIR application which was developed using texture and color feature extraction in searching the contents information of an object of skin disease image. The textured feature is extracted using Lacunarity, while for color feature extraction using Color Moments as well as a combination of both methods. The results of color characteristic extraction test using Color Moments Method yielded images corresponding to 100% similarity percentages and experimentation of texture characteristic extraction using Lacunarity Method yielded images corresponding to a percentage of suitability of 25%, followed by a combined test of both methods and the normalization process produces images corresponding to a percentage of conformity of 60%.
Pengujian IaC Berbasis DevOps dan Ansible Menggunakan Metode Black Box Testing I Putu Agus Eka Pratama; Putu Bayu Suarnata Wahyu Putra
Faktor Exacta Vol 15, No 2 (2022)
Publisher : LPPM

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30998/faktorexacta.v15i2.12039

Abstract

The development of information technology, which is followed by an increase in the need for devices and computing resources for services on computer networks, requires cost and time for the configuration and development process. Infrastructure as Code (IaC) based on DevOps using Ansible, is a solution to this problem, by combining development and operational processes. However, post-implementation, it is necessary to test on the application side to determine the functionality of the running system. For this reason, in this research, a Black Box Testing method with three steps is proposed for testing the implementation of DevOps-based IaC using Ansible. The test results show that the implementation of Ansible for DevOps-based IaC was successfully carried out by configuring the host node and running the Ansible playbook from the host server.
Penetration Testing on the SISAKTI Application at Udayana University Using the OWASP Testing Guide Version 4 Reyhan Todo Noer Yamin; I Made Agus Dwi Suarjaya; I Putu Agus Eka Pratama
Jurnal Ilmiah Merpati (Menara Penelitian Akademika Teknologi Informasi) Vol 10 No 3 (2022): Vol. 10, No. 3, December 2022
Publisher : Lembaga Penelitian dan Pengabdian kepada Masyarakat Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JIM.2022.v10.i03.p04

Abstract

SISAKTI application is an information system to facilitate online administration of Udayana University student participation credit units. Until now, there has been no security testing carried out on the SISAKTI application, therefore this study aimed to test the security of SISAKTI application using Black Box penetration testing technique, conduct an assessment of system vulnerabilities and provide recommendations for improvements. The method used is by following the guidelines from OWASP Testing Guide version 4 using Information Gathering, Input Validation Testing, and Authorization Testing modules. From these three modules, there were 28 sub-tests that were successfully carried out, the results were 15 positive tests, 6 negative tests, and 7 tests which cannot be done, from the 28 sub-tests there are 8 vulnerabilities that have a direct effect on the system and are assessed using CVSS calculator, the results are 6 vulnerabilities have a vulnerable value from 6.4 (Medium) to 9.9 (Critical).
DATA WAREHOUSE KEPEMILIKAN MCK MENGGUNAKAN METODE ETL DAN BLACK-BOX (STUDI KASUS: KELURAHAN NITU, NTB) I Putu Agus Eka Pratama; Muhammad Syakurrahman
Jurnal Indonesia : Manajemen Informatika dan Komunikasi Vol. 4 No. 1 (2023): Jurnal Indonesia : Manajemen Informatika dan Komunikasi (JIMIK)
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) AMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jimik.v4i1.107

Abstract

Preparation of government policies related to public services and facilities requires population data and its supporting technology. The Government of Bima, West Nusa Tenggara (NTB) has population data related to the ownership of each family in Nitu Village but is constrained by the technology to process these data. This research designs and implements a Data warehouse using the Extraction, Transformation, and Loading (ETL) method with the concept of multi-dimensional data. The system is implemented using Pentaho, then tested using the Black-Box method. The Data warehouse collects data from residents of the Nitu Kelurahan related to MCK ownership, then processed it to produce reports and data visualization. The stages of the research include data collection, identification of data dimensions, design, implementation, and Testing of the Data warehouse, as well as conclusions. The final results of the research show that the Data warehouse that was built helps the government in determining policy strategies and making decisions regarding the provision of MCK facilities for the people of Nitu Village, through reports and data visualization
SMALL ROAD MONITORING SYSTEM FOR FOUR WHEEL VEHICLES Efraim William Solang; I Made Agus Dwi Suarjaya; I Putu Agus Eka Pratama
Jurnal Indonesia : Manajemen Informatika dan Komunikasi Vol. 4 No. 1 (2023): Jurnal Indonesia : Manajemen Informatika dan Komunikasi (JIMIK)
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) AMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jimik.v4i1.139

Abstract

The application of the vehicle regulation system at intersections in rural areas does not yet have a good regulatory system compared to the vehicle control system in urban areas. The lack of equitable distribution of road widening in rural areas makes people often have problems accessing roads when using four-wheeled vehicles. People often experience problems when accessing small roads, especially when more than one vehicle passes at the same time. This problem was also experienced in DesaTanjung Sari, Kecamatan Cijeruk, Kabupaten Bogor. This study aims to design and build a small road monitoring system so that car drivers get a warning if there are four-wheeled vehicles that have passed the small road. The object recognition method used in the small road monitoring system for four-wheeled vehicles is the HC-SR04 ultrasonic sensor which is placed on the left, right, and top sides. Arduino Uno R3 microcontroller will be used as the main system device. The communication between points used is LoRa Ra-02 as the sender and receiver. The results of this study show the results of the system prototype running well in accordance with the planned functions.
ANALISIS PERBANDINGAN EFISIENSI BIAYA PENGGUNAAN LINUX CLEAROS DAN MIKROTIK UNTUK KEBUTUHAN SOHO Putu Veda Andreyana; I Made Sunia Raharja; I Putu Agus Eka Pratama
J-ICON : Jurnal Komputer dan Informatika Vol 10 No 2 (2022): Oktober 2022
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v10i2.8486

Abstract

Currently, various sectors of life and organizations require the availability of computer networks and the internet to be able to provide faster and optimal services, one of which is the Small Office Home Office (SOHO). Internet access requires management so that the internet network can be allocated according to the needs of each field and requires cost calculations according to the ability of the organization. Linux ClearOS and Mikrotik are two operating system platforms commonly used for network management, including SOHO. The test was conducted in the form of a comparison between ClearOS Linux and Mikrotik in terms of cost, basic network capabilities (bandwidth manager, wifi, proxy, load balancing, user management), availability of security features, and additional device requirements. The test results show that for the same needs on SOHO, Linux ClearOS has advantages in terms of lower costs and complete features, so it is more recommended than Mikrotik
Implementation Enterprise Resource Planning Sales and Purchase of Goods Using WebERP Fushia Clothing Store Denpasar Irianto Yohanes Sampe; I Putu Agus Eka Pratama; Ni Made Ika Marini Mandenni
Jurnal Ilmiah Merpati (Menara Penelitian Akademika Teknologi Informasi) Vol 11 No 1 (2023): Vol. 11, No. 1, April 2023
Publisher : Lembaga Penelitian dan Pengabdian kepada Masyarakat Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JIM.2023.v11.i01.p04

Abstract

The application of integrated information systems in business requires improvements related to system performance. A business can run well if every division in it is integrated with one another. One of the obstacles in this research is that the sales business process is still done manually, data storage on Ms. Excel, and between divisions one with other divisions have not been integrated. The technology proposed as a solution to these problems is Enterprise Resource Planning. This research was conducted by implementing the ERP model using WebERP which is used to assist the entire series of business processes at Fushia Stores. The research conducted focuses on three parts of the process, namely on the Sales, Purchase, and Inventory sections. The implemented implementation has met the needs of Fushia Stores with a system trial result of 71.66% or the equivalent of an agree index scale. The system implemented is able to improve and integrate all data so that data processing becomes more effective and efficient to use. Keywords: Business Process, Enterprise Resource Planning, Fushia Shop, Likert Scala, WebERP.
PENGEMBANGAN APLIKASI TEMPAT PENGOLAHAN SAMPAH BERBASIS ANDROID MENGGUNAKAN MODEL EXTREME PROGRAMMING DAN BLACK BOX TESTING Pramayota Fane'a Lampung; I Putu Agus Eka Pratama
Jurnal Indonesia : Manajemen Informatika dan Komunikasi Vol. 4 No. 2 (2023): Jurnal Indonesia : Manajemen Informatika dan Komunikasi (JIMIK)
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) AMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jimik.v4i2.206

Abstract

The closure of the TPA, which had been operating since 1990, forced Gunaksa Village to have its own TPST or Local Waste Processing Site (TOSS) as a waste processing site. The Klungkung regency government also requires each village to process household waste independently. This policy obliges Gunaksa Village to have its own (TOSS) as a waste processing site. According to Law No. 18 of 2008 concerning waste management, it is necessary to change the pattern of waste management which is based on reducing and handling waste. The output of this research is in the form of a local waste management application that can help TOSS in Gunaksa Village, Klungkung Regency which is expected to be able to integrate the management of each division and level so that it runs effectively and efficiently. This application is intended as a recording system in the management of waste banks. Research will be conducted using the methodextreme programming. The system will be designed using the Unified Modeling Language (UML). System testing will use the Black Box method. The results of the black box test state that the input and output of the Gunaksa Bank Garbage Application (GUNABANGSA) are appropriate.
Co-Authors Adhigamika, Dewa Putu Surya Adinatha, Dewa Gde Eka Krisna Altry David Purba Anak Agung Bagus Arya Wiradarma Anam, Fahri Choirul Andreyana, Putu Veda Anindya, Tabina Dea Arista, I Putu Gede Eka Yuda Arya Widyaningrat, Made Gunawan Assegaf, Achmad Jefri Ayu Wirdiani Bernard, Rey Budi Rahardjo Butarbutar, Ryan Timothy Benget Daulat Daniswara, Rasendriya Revo Debora, Uli Rindu Dewa Gede Kesuma Yoga Dharmawangsa, I Dewa Gede Govindha Dharmesta, Putu Adhika Dwi Chayani, Ni Kadek Chita Dwi Putra Githa Efraim William Solang Gede Rasben Dantes Geovaldo, I Putu Hendra Gusti Agung Ayu Putri Gusti Made Arya Sasmita Hrikesa, I Gusti Ngurah Agung Agie I Gede Agus Pradipta I Gusti Agung Made Wirautama I Gusti Ayu Triwayuni I Ketut Adi Purnawan I ketut Gede Darma Putra I Komang Wahyu Hadi Permana I Made Adhiarta Wikantyasa I Made Agus Dwi Suarjaya I Made Candiasa I Made Oka Widyantara I Made Sunia Raharja I Made Sunia Raharja I Made Sunia Raharja, I Made Sunia I Nyoman Gunantara I Nyoman Piarsa I Putu Gede Eka Yuda Arista I Wayan Gus Arisna Ida Bagus Kade Taruna Irianto Yohanes Sampe Isna Wanda Robiulla Johan Tamin Kevin Christopher Bakkara Krisnadinatha, I Gede Arya Lampung, Pramayota Fane'a Linawati Linawati Linawati Liukae, Herry Daniel Prasetia Mahaputra, Putu Andre Maharani, Ni Putu Berliana Mahawardana, Putu Pasek Okta Meilani, Ni Putu Cindy Mohammad Ernico Suryo Wicaksono Muhammad Syakurrahman NI Kade Mega Handayani Ni Made Ika Marini Mandenni nugraha, gemara adiyasa parahita Nurjana, Putu Ramaditya Pramayota Fane'a Lampung Pratika, Made Toby Sathya pratiwi, Dewa Ayu gandhi Prawira, I Gede Denis Yuda Purniawan, I Made Arta Putra, I Putu Bayu Aditya Putra, Yogiswara Dharma Putu Adhika Dharmesta Putu Adhika Dharmesta Putu Bayu Suarnata Wahyu Putra Putu Ramaditya Nurjana Putu Veda Andreyana Putu Veda Andreyana Radityawan, I Wayan Ananta Reyhan Todo Noer Yamin Riani, Dinda Sasmita, Gusti Arya Sasmita, Gusti Made Arya Satriya, Rizki Dwi Syakurrahman, Muhammad Theca Difa Yulian Syahputri Wati, Ni Luh Made Adi Dharma Wibowo, I Kadek Tribuana Tungga Wicaksono, Mohammad Ernico Suryo Wiradarma, Anak Agung Bagus Arya Wiranatha, A. A. Kt. Agung Cahyawan Yogiswara Dharma Putra