Claim Missing Document
Check
Articles

PENERAPAN BUSINESS INTELLIGENCE PADA APLIKASI DASHBOARD MONITORING PERFORMANSI MAHASISWA DAN LULUSAN BERDASARKAN STANDAR 3 BAN-PT PROGRAM STUDI SARJANA MENGGUNAKAN METODE SCRUM Fatimah, Fanny Fathya Nurul; Murahartawaty, Murahartawaty; Widjajarto, Adityas
Jurnal Rekayasa Sistem & Industri Vol 1 No 01 (2014): Jurnal Rekayasa Sistem & Industri - Juli 2014
Publisher : School of Industrial and System Engineering, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (500.168 KB)

Abstract

Business Intelligence merupakan salah satu pengembangan teknologi informasi yang digunakan sebagai alat bantu untuk meningkatkan nilai bisnis organisasi, tidak hanya untuk organisasi profit-oriented, tetapi juga organisasi non-profit seperti lembaga pendidikan. Telkom University merupakan lembaga pendidikan yang sudah memanfaatkan teknologi informasi yang digunakan untuk menunjang kebutuhan akan informasi pada berbagai proses bisnisnya, termasuk untuk melakukan monitoring mahasiswa dan lulusan, yang mana dilakukan oleh tiap program studi. Tiap program studi dapat memantau kompetensi yang dimiliki oleh mahasiswa dan lulusannya sebagai dasar pembuatan strategi perbaikan sistem pelayanan kepada mahasiswa dan lulusan. Proses monitoring performansi mahasiswa dan lulusan memerlukan data dan informasi yang diambil dari banyak bagian dengan berbagai format data. Hasil pemantauan tersebut digunakan sebagai landasan pengambilan keputusan. Untuk melakukan proses tersebut, dalam penelitian ini akan dirancang sistem monitoring melalui Business Intelligence System dalam bentuk dashboard. Dashboard dengan perspektif Business Intelligence tidak hanya mampu melakukan monitoring secara dinamis, tetapi juga menyediakan informasi hasil prediksi untuk mendukung pembuatan keputusan bagi top level management program studi. Sistem ini dikembangkan menggunakan metode scrum yang merupakan salah satu Metode Pengembangan Sistem Agile Development yang memiliki keunggulan dalam penerapan real-world progress dan lebih adaptif, revolusioner, dan fleksibel terhadap perubahan.
Mitigasi Serangan Wormhole Pada Teknologi Wireless Sensor Network Menggunakan Protokol Routing AODV Dengan Sistem Shutdown Pamudji, Tania Almira; Kurniawan, Muhammad Teguh; Widjajarto, Adityas
Jurnal Rekayasa Sistem & Industri Vol 5 No 02 (2018): Jurnal Rekayasa Sistem & Industri - Desember 2018
Publisher : School of Industrial and System Engineering, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/jrsi.v5i01.317

Abstract

Wireless sensor network (WSN) merupakan sebuah jaringan nirkabel yang terdiri dari sejumlah sensor node berukuran kecil untuk memantau kondisi lingkungan tertentu. Setiap sensor node akan saling berkomunikasi dan mengirimkan informasi ke base station. Seperti halnya router, sensor node pada WSN juga memiliki kemampuan routing. Protokol routing pada WSN salah satunya dalah AODV yang memiliki karakteristik mencari jalur routing ketika adanya permintaan dari souce node untuk mengirim pesan ke destination node. Dikarenakan sensor node yang dipasang di lingkungan dapat diakses secara fisik maka meningkatkan potensi terjadinya serangan. Serangan wormhole merupakan jenis serangan dimana penyerang memindahkan jalur routing pada WSN ke terowongan yang dibuat diantara source dan destination node. Serangan wormhole dapat menjadi pemicu timbulnya serangan lain pada WSN. Berdasarkan kondisi yang rentan terhadap adanya serangan, maka dibutuhkan adanya mitigasi serangan pada wireless sensor network menggunakan protokol routing AODV dengan sistem shutdown. Hal ini bertujuan untuk mematikan sensor node yang telah mengalami modifikasi dari penyerang sebelum informasi tersebut diproses oleh sistem dan dikirim ke user.  Dari hasil pengujian yang dilakukan diketahui bahwa pada penerapan sistem shutdown  terjadi efisiensi energi yang dikonsumsi dengan tidak adanya penurunan dalam performansi jaringan. Sehingga sistem shutdown dapat menjadi salah satu solusi efektif dalam memitigasi serangan wormhole.
Live migration using checkpoint and restore in userspace (CRIU): Usage analysis of network, memory and CPU Adityas Widjajarto; Deden Witarsyah Jacob; Muharman Lubis
Bulletin of Electrical Engineering and Informatics Vol 10, No 2: April 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i2.2742

Abstract

Currently, cloud service providers have used a variety of operational mechanisms to support the company's business processes. Therefore, the services are stored on the company's server, which presents in the form of infrastructure, platform, software, and function. There are several vulnerabilities that have been faced in the implementation such as system failure, natural disasters, human errors, or attacks from unauthorized parties. In addition, the time of unavailability of services can be minimized by doing an LM, in which many servers have been used the containers to behave like a service provider. Actually, its existence replaces the virtual machine that requires more resources although the process only can be done through docker with checkpoint and restore in userspace (CRIU). In this research, LM processes are done to the docker container using CRIU by analyzing the quality of service (QoS), memory, and CPU usage. Thus, the simulation is carried out by establishing the LM using 2 (two) different platforms through scenarios with one and three containers respectively. The performance analysis results aim to examine several indicators in comparison with the achievable result to reduce problems that occurred in the cloud service.
Mitigasi Serangan Wormhole Pada Teknologi Wireless Sensor Network Menggunakan Protokol Routing AODV Dengan Sistem Shutdown Tania Almira Pamudji; Muhammad Teguh Kurniawan; Adityas Widjajarto
JRSI (Jurnal Rekayasa Sistem dan Industri) Vol 5 No 02 (2018): Jurnal Rekayasa Sistem & Industri - Desember 2018
Publisher : School of Industrial and System Engineering, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/jrsi.v5i01.317

Abstract

Wireless sensor network (WSN) merupakan sebuah jaringan nirkabel yang terdiri dari sejumlah sensor node berukuran kecil untuk memantau kondisi lingkungan tertentu. Setiap sensor node akan saling berkomunikasi dan mengirimkan informasi ke base station. Seperti halnya router, sensor node pada WSN juga memiliki kemampuan routing. Protokol routing pada WSN salah satunya dalah AODV yang memiliki karakteristik mencari jalur routing ketika adanya permintaan dari souce node untuk mengirim pesan ke destination node. Dikarenakan sensor node yang dipasang di lingkungan dapat diakses secara fisik maka meningkatkan potensi terjadinya serangan. Serangan wormhole merupakan jenis serangan dimana penyerang memindahkan jalur routing pada WSN ke terowongan yang dibuat diantara source dan destination node. Serangan wormhole dapat menjadi pemicu timbulnya serangan lain pada WSN. Berdasarkan kondisi yang rentan terhadap adanya serangan, maka dibutuhkan adanya mitigasi serangan pada wireless sensor network menggunakan protokol routing AODV dengan sistem shutdown. Hal ini bertujuan untuk mematikan sensor node yang telah mengalami modifikasi dari penyerang sebelum informasi tersebut diproses oleh sistem dan dikirim ke user. Dari hasil pengujian yang dilakukan diketahui bahwa pada penerapan sistem shutdown terjadi efisiensi energi yang dikonsumsi dengan tidak adanya penurunan dalam performansi jaringan. Sehingga sistem shutdown dapat menjadi salah satu solusi efektif dalam memitigasi serangan wormhole.
PENERAPAN BUSINESS INTELLIGENCE PADA APLIKASI DASHBOARD MONITORING PERFORMANSI MAHASISWA DAN LULUSAN BERDASARKAN STANDAR 3 BAN-PT PROGRAM STUDI SARJANA MENGGUNAKAN METODE SCRUM Fanny Fathya Nurul Fatimah; Murahartawaty Murahartawaty; Adityas Widjajarto
JRSI (Jurnal Rekayasa Sistem dan Industri) Vol 1 No 01 (2014): Jurnal Rekayasa Sistem & Industri - Juli 2014
Publisher : School of Industrial and System Engineering, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Business Intelligence merupakan salah satu pengembangan teknologi informasi yang digunakan sebagai alat bantu untuk meningkatkan nilai bisnis organisasi, tidak hanya untuk organisasi profit-oriented, tetapi juga organisasi non-profit seperti lembaga pendidikan. Telkom University merupakan lembaga pendidikan yang sudah memanfaatkan teknologi informasi yang digunakan untuk menunjang kebutuhan akan informasi pada berbagai proses bisnisnya, termasuk untuk melakukan monitoring mahasiswa dan lulusan, yang mana dilakukan oleh tiap program studi. Tiap program studi dapat memantau kompetensi yang dimiliki oleh mahasiswa dan lulusannya sebagai dasar pembuatan strategi perbaikan sistem pelayanan kepada mahasiswa dan lulusan. Proses monitoring performansi mahasiswa dan lulusan memerlukan data dan informasi yang diambil dari banyak bagian dengan berbagai format data. Hasil pemantauan tersebut digunakan sebagai landasan pengambilan keputusan. Untuk melakukan proses tersebut, dalam penelitian ini akan dirancang sistem monitoring melalui Business Intelligence System dalam bentuk dashboard. Dashboard dengan perspektif Business Intelligence tidak hanya mampu melakukan monitoring secara dinamis, tetapi juga menyediakan informasi hasil prediksi untuk mendukung pembuatan keputusan bagi top level management program studi. Sistem ini dikembangkan menggunakan metode scrum yang merupakan salah satu Metode Pengembangan Sistem Agile Development yang memiliki keunggulan dalam penerapan real-world progress dan lebih adaptif, revolusioner, dan fleksibel terhadap perubahan.
Analisis Pengujian Kerentanan Situs Pemerintahan XYZ dengan PTES Shita Widya Ningsih; Ahmad Almaarif; Adityas Widjajarto
JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 8 No 3 (2021): JATISI (Jurnal Teknik Informatika dan Sistem Informasi)
Publisher : Lembaga Penelitian dan Pengabdian pada Masyarakat (LPPM) STMIK Global Informatika MDP

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35957/jatisi.v8i3.1224

Abstract

The rapid development of technology is aligned with the development of web-based applications and it also increases security attacks and various threat techniques that attack the web. The integrated service office at the XYZ local government has used the website to help one of its business processes. That way, a vulnerability assessment, and penetration testing are needed to find out the security gaps on the website. Vulnerability Assessment is a method to search for existing security vulnerabilities on a website and penetration testing is a method to test security vulnerabilities on a website. In this study, vulnerability assessment and penetration testing will be carried out on the integrated service site at the XYZ regional government using the PTES standard with several tools used, namely OWASP ZAP, Acunetix, and Paros on Kali Linux. The vulnerability assessment results obtained on the integrated service website have different types of vulnerabilities and levels of risk according to the tools used. In the tests carried out on the OWASP ZAP tool, the vulnerability with a high-risk level of 10% was obtained. The Acunetix tool got a high-risk level of 16.6%, and the Paros tool got a vulnerability with a high-risk level of 20%.
Vulnerability and risk assessment for operating system (OS) with framework STRIDE: comparison between VulnOS and Vulnix Adityas Widjajarto; Muharman Lubis; Vreseliana Ayuningtyas
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 3: September 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i3.pp1643-1653

Abstract

The rapid development of information technology has made security become extremely. Apart from easy access, there are also threats to vulnerabilities, with the number of cyber-attacks in 2019 showed a total of 1,494,281 around the world issued by the national cyber and crypto agency (BSSN) honeynet project. Thus, vulnerability analysis should be conducted to prepare worst case scenario by anticipating with proper strategy for responding the attacks. Actually, vulnerability is a system or design weakness that is used when an intruder executes commands, accesses unauthorized data, and carries out denial of service attacks. The study was performed using the AlienVault software as the vulnerability assessment. The results were analysed by the formula of risk estimation equal to the number of vulnerability found related to the threat. Meanwhile, threat is obtained from analysis of sample walkthroughs, as a reference for frequent exploitation. The risk estimation result indicate the 73 (seventy three) for the highest score of 5 (five) type risks identified while later on, it is used for re-analyzing based on the spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of prvilege (STRIDE) framework that indicated the network function does not accommodate the existing types of risk namely spoofing.
Optimization performance management with FCAPS and ITILv3: opportunities and obstacles Adityas Widjajarto; Muharman Lubis; M. K. Rizal Syahputra
Indonesian Journal of Electrical Engineering and Computer Science Vol 17, No 1: January 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v17.i1.pp281-290

Abstract

With the need for rapidly growing network services each year; the factors of reliability, availability and quality become extremely critical for organizations, groups, institutions and governments to have in the network services implementation. In this case, several rural governments requires the improvement of its network performance management in establishing their internal and external operation to align with the grand design by the central government in improving citizen’s satisfaction through public service. Testing was done using scenarios for output analysis and packet loss as parameters. The results of the proposed topology obtained a productivity of 541.43 Kbps and a packet loss of 0.07%. While the current topology gets a rate of 421.28 Kbps and packet loss of 0.22%. It can be concluded that the proposed topology is still better than the current topology. The optimization of performance management is based on the FCAPS method which emphasize in the performance monitoring and data analysis with the support of ITILv3 that contains documentation and policy guidance to conduct quality performance management. In addition, performance management activities will occur with processes in the design of ITIL services and existing conditions.
Implementasi dan Analisis Profil Sistem Pada Virtualisasi Paloalto Firewall Berdasarkan Metrik Sumber Daya Komputasi Ni Made Meliana Listyawati; Adityas Widjajarto; M Teguh Kurniawan
Jurnal Sistem Komputer dan Informatika (JSON) Vol 4, No 1 (2022): September 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v4i1.4780

Abstract

On the security aspect, it is necessary to know how effectively a firewall can protect network devices from DDoS attacks. The characteristics of a firewall have different functions in protecting the system from various external attacks that can attack and retrieve data. In this research, the implementation of Paloalto firewall virtualization aims to obtain the system profile function on the firewall based on the use of computing resources. Profiling of the firewall system of this experiment based on the consumption of computing resources in load testing. This experiment used a DDoS SYN flood attack on Kali Linux as an attacker and a virtualization Paloalto firewall that protects a web server on Ubuntu Server as an attack target. This research distinguished based on two test scenarios, namely based on testing the service HTTP allow and service HTTP block with Paloalto memory specifications at RAM 5.5 GB and RAM 8 GB specifications. Measurements were made based on computing resources on CPU, memory, and a session focused on before, during, and after DDoS SYN flood attacks. The pattern of usage of computing resources tends to be linear when a DDoS SYN flood attack occurs. The experimental results obtained on the highest use of computing resources during the attack were CPU usage with an average percentage of 95.8% and the second increase was in memory usage with an average percentage of 44%, and the session usage was 138682. For further research, it can use variations of DDoS attacks to get a wider profile.
Analisis Vulnerability Management Pada Container Docker Menggunakan Opensource Scanner Berdasarkan Standar Cyber Resilience Review (CRR) Milenia Oktaviana; Adityas Widjajarto; Ahmad Almaarif
Jurnal Sistem Komputer dan Informatika (JSON) Vol 4, No 1 (2022): September 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v4i1.4787

Abstract

One of the most widely used container technologies to provide IT services is Docker. The vulnerability in container technology, namely Docker, requires special management. Management of this vulnerability can be done technically with a software vulnerability scanner and standard Cyber Resilience Review (CRR) guidelines. Experiments were carried out with Aquasec and Anchore scanners that performed vulnerability scanning on two Docker Images systems. The two vulnerable systems have different versions, namely version – 1 and version – 2. The software elements in version – 2 have a higher versioning level than version – 1. Experimental data in the form of vulnerability reports are analyzed based on Cyber Resilience Review (CRR) which focuses on four stages namely Define a Strategy, Develop a Plan, Implement the Capability, Assess and Improve the Capability. So that the results of Category Vulnerability are obtained, namely 30 Closed Vulnerability, 10 Open Vulnerability, and 13 Newly Vulnerability. Continuation of this research can use aspects of Patch Management with more varied software tools.
Co-Authors Achmad Muhaimin Aziz Aditya Eka Saputra Aditya Shofwan Zulma Afrizal Hamzah Ahmad Almaarif Al Faridz, Muhammad Hanafi Mu’amar Alifurfan Wiradwipa Pranowo Amalia Intan Safura Ardhyan Zulfikar Malik Ari Apridana Avon Budiono Avon Budiono Avon Budiyono Aziz Widya Isnanta Basori, Malik Alrasyid Batunanggar, Yana J S Br Surbakti, Maya Angelia Decky Raditama Megantara Deden Witarsyah Dewantara, Rheza Dicky Naofal Rizaldi Dzulfahmi, Irfan Eliza Adira Handrini Evangelista S., Jacqueline Fachrul Hijriah Usman Fadhilah, Samia Faezal, Erlangga Fanny Fathya Nurul Fatimah Fanny Fathya Nurul Fatimah, Fanny Fathya Nurul Farmadika, Pramudya Fathia, Dhiya Fathinuddi, Muhammad Febriyani, Widia Ferdinan Ginting Manik Hadist, Putri Alviona Harahap, Adnan Nauli Hawari, Azizan Helmi Khairullah Setiana I Made Dwiki Kusuma Pradipta Ilham Akbar Siswanto Ilham Amarullah Irawan, Alfian Rifki Irmalistia Alfiani Isnaini Hayati Ivan Setiawan Jafar Haritsah Kamaly, Akhmad Dzihan Karimah, Myra Tresno Kirana Dhiatam Dhiatama Ayunda Krisfian Adji Brata Kurniawan, M Tegoeh Kurniawan, M Teguh Kurniawan, M. Teguh Leonardo Taufan Sontani Limutu, Wahyu M Teguh Kurniawan M. K. Rizal Syahputra M. Rafi M. Teguh Kurniawan Ma'arij Haritsah Manik, Yusuf H. Miftah Fajar Asy’ari Milenia Oktaviana Mochamad Teguh Kurniawan Mochammad Teguh Kurniawan Muhammad Athallariq Rabbani Muhammad Fathinuddin Muhammad Teguh Kurniawan MUHAMMAD TEGUH KURNIAWAN, MUHAMMAD TEGUH Muharman Lubis Murahartawaty Murahartawaty Nabil Egan Valentino Naufal Abrian Ismiyushar Ni Made Meliana Listyawati Nolanda Indria Nugraha, Yadi Pamudji, Tania Almira Penggalih, Arya Bimo Bagas Pulungan, Fauzan Khairy Qudamah, Ramiz Rafsyandjani, Muhammad Rizki Ramadani, Ramadani Ryan Supriadi Ramadhan Ryandi, Yuaraina Dirgantarizki Safitra, Muhammad Fakhrul Salim, Irgi Fahrezi Sanum, Fachri Fadhilah Shita Widya Ningsih Sidiq, M. Zaelani Tania Almira Pamudji Taufiqurrahman, Dzulfikar Fathi Teguh Kurniawan Tiara Sabrina Trinanda Aditya Arya Wibisono Umar Yunan Kurnia Septo Umar Yunan Kurnia Septo Hediyanto Utami, Resti Pradita Valentino, Nabil Egan Vreseliana Ayuningtyas Wardana, Wasis Wisal Altafvian Deanis Ananta Yuli Adam Prasetyo