Claim Missing Document
Check
Articles

Found 29 Documents
Search

Implementation of the Turbo Boyer Moore Method in Searching Thesis Titles at the Website-Based Faculty of Economics Gustian Febri Syah Putra; Juju Jumadi; Abdussalam Al Akbar
Jurnal Media Computer Science Vol 2 No 2 (2023): Juli
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v2i2.4377

Abstract

Every year, students are required to complete a final project in the form of a thesis as one of the graduation requirements. However, in determining a thesis title that is relevant to the chosen scientific field, students often experience difficulties. The number of thesis titles available in libraries and websites can confuse students in choosing the right title. One method that can be used to achieve this goal is the Turbo Boyer-Moore pattern search method. Turbo Boyer-Moore is one of the efficient pattern matching algorithms to search for certain words or phrases in text. From the results of the tests carried out, it can be concluded that the implementation of the designed program in searching and detecting the same title with a similarity percentage.
Android-Based Cryptography Applications Using The Rail Fence Cipher Algorithm Raden Diky Zailani; Khairil Khairil; Abdussalam Al Akbar
Jurnal Media Computer Science Vol 2 No 2 (2023): Juli
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v2i2.4569

Abstract

Android-based cryptographic applications using the rail fence cipher algorithm are made using the Java programming language (AndroidStudio), the PHP programming language (JSON File Web Service) and the MySQL database. This application has a url link for storing PHP files and message data in the database, while the url link is http://railfencecipher.my.id/. An Android-based cryptographic application using the rail fence cipher algorithm has been uploaded to Google Playstore by entering the rail keyword fence cipher. An android-based cryptographic application using the rail fence cipher algorithm can be used to assist communication between the two parties, both the sender and the recipient of the message. In addition, this application has implemented a rail fence cipher algorithm that is used to maintain the confidentiality of the message stored in the application's database. The records in the message body column in the database are in random form, therefore they cannot be read. This of course makes the application maintain the confidentiality of the messages sent, because there is a process of scrambling (encryption) of the message. Based on the results of the tests that have been carried out, the functionality of the android-based cryptographic application using the rail fence cipher algorithm runs well as expected and the message sent between the recipient and the sender is kept confidential because the message is encrypted.
The Design And Implementation Of Computer Network Monitoring And Security System Using Linux Ubuntu Server Anisa Dewi Sahara; Sapri Sapri; Abdussalam Al Akbar
Jurnal Media Computer Science Vol 3 No 1 (2024): Januari
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v3i1.5328

Abstract

One system that can carry out network monitoring is using ntopng tool or application. Linux Ubuntu Server is an open source operating system, this operating system is very good for use as a server because it does not require high hardware specifications and can also be obtained for free because it is open source. Ntopng in carrying out network monitoring is very well applied at SMK S 1 Pembangunan of Bengkulu City, this is because at SMK S 1 Pembangunan of Bengkulu City, the computer network in the computer and visual laboratory is used by students, both for learning and teaching activities as well as the media used by students to fill their free time. When monitoring the network, Ntopng can do this based on the IP address of the device connected to the network
Implementation of Snort as a Wireless Network Security Detection Tool Using Linux Ubuntu Insani, Puteri Puji; Kanedi , Indra; Akbar , Abdussalam Al
Jurnal Komputer, Informasi dan Teknologi Vol. 3 No. 2 (2023): Desember
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v3i2.1488

Abstract

Implementation of snort as a wireless network security detection tool using linux ubuntu by adding a server that is used to observe activities on a wireless network, if there is an activity that is considered dangerous by the client, the information will be stored in the snort log and database. The web-based front-end uses BASE (Basic Analysis and Security Engine) which can be accessed through a browser with the url : IPaddressServer/base/. The information provided is related to attacks detected by snort that have been stored in the database. The information is in the form of source and destination IP addresses, the type of attack that occurred. Based on the tests carried out, it was found that the implementation of snort as a wireless network security detection tool using linux ubuntu can help detect attacks that occur on the network and provide information related to these attacks.
Spicework Implementation On Linux Operating System Ubuntu Server For Network Monitoring At Smk n 1 Kota Bengkulu Rivaldo, Ahmad; Supardi, Reno; Al Akbar, Abdussalam
Jurnal Komputer, Informasi dan Teknologi Vol. 3 No. 2 (2023): Desember
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v3i2.1516

Abstract

One system that can monitor computer networks is using spicework. Spiceworks monitors based on the ip address of the computer connected to the network, spicework in monitoring the network requires high hardware specifications of at least 4GB memory. A system that can monitor the network does not yet exist on the SMK N 1 Bengkulu City network, the computer network at SMK N 1 Bengkulu City is used by students, teachers and TU, libraries and for other purposes, in addition to knowing whether or not the computer is connected to the SMK N 1 Bengkulu City computer network, it can also be used to monitor the resources (hard disk and memory) of the device. In doing so.
Implementation Of A Combination Of Stream Cipher Algorithm And Rotate 13 For Data Security Mukrozi, Ikhsan Tri; Sapri, Sapri; Akbar , Abdussalam Al
Jurnal Komputer, Informasi dan Teknologi Vol. 4 No. 1 (2024): June
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v4i1.1727

Abstract

The issue of data security and confidentiality is one of the important aspects of data, messages and information. Stream Cipher is often referred to as a stream cipher. The advantage of this method is that it is relatively faster in the encryption-decryption process and is also not limited by the length of the plaintext. ROT13 is a substitution cipher encryption by shifting characters forward 13 times, counting 1 character in front of it, and shifting characters based on the order of characters in the ASCII table. By combining the Stream Cipher and ROT13 algorithms, it produces a method that can provide a better level of security compared to the application of each of these methods separately. The results of the analysis and testing carried out using different decryption keys resulted in the ciphertext cannot be returned which shows normal things because the method used is symmetrical cryptography so that the decryption process can only be done using the same key as the key during decryption.
The Design And Implementation Of Backup Server Using The Failover Method Karneli, Septi; Sapri, Sapri; Akbar, Abdussalam Al
Jurnal Media Computer Science Vol 3 No 2 (2024): Juli
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v3i2.6086

Abstract

One of the most widely used data storage in databases today is using MySQL. MySQL is able to store many data items in it, even up to millions of items. So with so much data in this database, it is very necessary to replicate data to maintain data safety and security. Linux ubuntu server 18.04 is an open source operating system, this operating system is very well used as a server because it does not require high hardware specifications and can also be obtained for free because it is open source. The replication technique is very well applied to the Bengkulu Province Communication and Information Service, this is because the Bengkulu Province Communication and Information Service holds a lot of data. Both internal data and external data. In communicating data to the database using the replication technique, it is very fast with a time of +/- 3 seconds of data communication, this time will also be affected by the condition of the computer network and the device used. The replication technique is very good for agencies that have a very large database and require a long storage time.
Implementation Of Security Information And Event Management (Siem) In Monitoring Networks At SMA 1 Muhammadiyah Boarding School Paw, M. Reyza Putra; Aspriyono, Hari; Akbar, Abdussalam Al
Jurnal Media Computer Science Vol 3 No 2 (2024): Juli
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v3i2.6591

Abstract

Implementation of Security Information Event Management (SIEM) for Network Monitoring at SMA Muhammadiyah Boarding School can help network administrators know the activity and status of devices connected to the network whether UP or Down, can help provide information in the form of logs of services that run and log security events on each device connected to the network. This of course can make it easier for network administrators to deal with problems found on network devices connected to OSSIM AlienVault. In OSSIM AlienVault there is a web UI platform that can make it easier for network administrators to monitor the network at SMA Muhammadiyah Boarding School. Where the OSSIM AlienVault Web UI can be accessed via the IP Address Server in the browser. Based on the tests carried out, the results show that the Implementation of Security Information Event Management (SIEM) for Network Monitoring at SMA Muhammadiyah Boarding School runs well and can help network administrators in network monitoring and can provide information in the form of event logs on each device connected to the network.
Application Of Wazuh To Conduct Monitoring Network Security System (Case Study Of SMK N 1 Bengkulu City) Aripilahi, Edwin; Khairil, Khairil; Akbar, Abdussalam Al
Jurnal Media Computer Science Vol 3 No 2 (2024): Juli
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v3i2.6592

Abstract

The application of Wazuh to monitor network security systems at SMK Negeri 1 Bengkulu City can help network operators monitor security systems, computers and make it easier to control the devices being monitored, so that they can take action as soon as possible if there is a disruption to the system and network based on the monitoring results. Wazuh can monitor files in the directory folder. The information provided is in the form of adding, modifying and deleting files contained in the directory folder. Based on the tests carried out, the results showed that the application of Wazuh to monitor the network security system at SMK Negeri 1 Bengkulu City was running well and could help network administrators by providing information related to the agent device being monitored.
Qos Analysis In The Application Of HTB At Computer Laboratory Of Engineering Faculty Of Universitas Muhammadiyah Bengkulu Rahmadhan, Ihsan; Khairil, Khairil; Akbar, Abdussalam Al
Jurnal Media Computer Science Vol 3 No 2 (2024): Juli
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v3i2.6595

Abstract

Bandwidth management is needed therefore the existing bandwidth is divided according to the needs of each connected connection. One method that can stabilize the distribution of bandwidth is the Hierarchical Token Bucket (HTB) method. This study aims to adjust the amount of bandwidth to suit the needs of internet usage for each user without making one user dominate the use of bandwidth on the internet network. The research was conducted in 5 stages, namely: problem analysis, data collection, HTB design and implementation, HTB implementation and analysis of the final results of the system with HTB. Problem analysis and data collection are obtained through direct observation and observation. Design and implementation are done with the HTB method on the proxy router. The HTB method allows us to make the queue more structured, by doing multilevel groupings. The test results show that the HTB method can manage bandwidth usage for each user when using the internet simultaneously. From the analysis of the application of the HTB method in the computer laboratory of engineering faculty in Universitas Muhammadiyah Bengkulu, it shows that loyal users get bandwidth based on their limit-at and priority, which is equal to