Claim Missing Document
Check
Articles

Deteksi dan Pencegahan Web Defacing Judi Online dengan Wazuh SIEM dan Snort IDS Berbasis Signature Reza Pahlevi, Mohammad Rizky; Umam, Chaerul; Handoko, L. Budi
Jurnal Algoritma Vol 22 No 1 (2025): Jurnal Algoritma
Publisher : Institut Teknologi Garut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33364/algoritma/v.22-1.2220

Abstract

Web defacing attacks, where websites are replaced with unwanted content, such as online gambling advertisements, pose a serious threat to the integrity and reputation of websites, especially those belonging to government agencies. This research aims to detect and prevent web defacing attacks containing online gambling content by combining Wazuh Security Information and Event Management (SIEM) and Snort signature-based Intrusion Detection System (IDS). Wazuh is used to monitor and collect activity logs in real-time when suspicious activity is detected. Meanwhile, Snort IDS acts as a signature-based intrusion detection system that can recognize web defacing attack patterns through predefined rules for online gambling content. This research was conducted by building a web defacing attack simulation environment on the server, then testing the response and effectiveness of Wazuh and Snort in detecting and preventing attacks. The test results show that the combination of Wazuh SIEM and Snort IDS can detect and prevent web defacing attacks with a very high accuracy rate, namely 100% of attacks can be detected by Wazuh File Integrity Monitoring and 76% for Snort IDS. The implementation of this system is expected to help improve website security, especially those managed by public institutions, from web defacing threats.
Development of a Website-Based Facilities and Infrastructure Rental System using the Rapid Application Development Method Valentino Aldo; L. Budi Handoko
INOVTEK Polbeng - Seri Informatika Vol. 10 No. 2 (2025): July
Publisher : P3M Politeknik Negeri Bengkalis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35314/wcqyg231

Abstract

To improve the efficiency and transparency of the management of facilities and infrastructure at the Semarang City Youth and Sports Office, a web-based rental system was developed with the RAD approach. Evaluation using the time measurement technique showed that the booking process time was reduced from 10 minutes to 3 minutes, and payment validation, which previously took up to 1 hour, now takes place automatically in seconds. The system was built using Express.js based on Node.js for an efficient and structured backend, React.js for an interactive and responsive frontend, and MySQL as the main database. The system design uses visual aids such as use case diagrams, activity diagrams, and entity relationship diagrams. Testing was carried out using black box testing using the equivalence partitioning technique. As a result, the system meets all functional requirements and increases operational efficiency by up to 70% through payment gateway integration. Further development, it is recommended to add reporting and analysis features to support decision making.
Vulnerability Analysis on Semarang City Road Section Information System Website Using VAPT Method Hanif Setia Nusantara; L. Budi Handoko; Maulana Ikhsan; Chaerul Umam
INOVTEK Polbeng - Seri Informatika Vol. 10 No. 2 (2025): July
Publisher : P3M Politeknik Negeri Bengkalis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35314/gdaky847

Abstract

Web-based public service applications in the digital governance era are increasingly vulnerable to cyber threats. This study analyzes the vulnerability of the Semarang City Road Information System website quantitatively using the Vulnerability Assessment and Penetration Testing (VAPT) method to evaluate its effectiveness in identifying security gaps. This system is part of an e-government service providing road infrastructure information but, like other technology-based systems, is susceptible to exploitation. The VAPT method used includes two main stages: Vulnerability Assessment to identify weaknesses and Penetration Testing to simulate attacks. The study identified 5 potential vulnerabilities: SQL Injection, Credit Card Number Disclosure, Insecure Direct Object Reference (IDOR), Cross-Site Scripting (XSS), and Error Message on Page. However, 80% of these were false positives, effectively filtered by Alibaba Cloud’s Web Application Firewall (WAF). The IDOR vulnerability was confirmed as valid, allowing unauthorized access to sensitive data through manipulation of the ID parameter in the URL. The original contribution of this research is the specific recommendation for implementing Indirect Object References mechanisms such as ID encryption, as well as emphasizing the need for comprehensive routine testing to improve security and prevent potential data misuse.
DIGITAL SIGNATURE PADA CITRA MENGGUNAKAN RSA DAN VIGENERE CIPHER BERBASIS MD5 Handoko, Lekso Budi; Umam, Chaerul; Setiadi, De Rosal Ignatius Moses; Rachmawanto, Eko Hari
Simetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer Vol 10, No 1 (2019): JURNAL SIMETRIS VOLUME 10 NO 1 TAHUN 2019
Publisher : Fakultas Teknik Universitas Muria Kudus

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24176/simet.v10i1.2212

Abstract

Salah satu teknik yang populer untuk mengamankan data dengan tingkat keamanan yang tinggi yaitu kriptografi. Berbagai penelitian telah dilakukan dengan menggabungkan kunci simteris dan kunci asimteris untuk mendapatkan keamanan ganda. Dalam makalah ini, tanda tangan digital diterapkan melalui Rivest Shamir Adleman (RSA) sebagai algoritma kunci asimteris yang akan digabung dengan algoritma kunci simteris Vigenere Cipher. RSA yang tahan terhadap serangan karena menggunakan proses eksponensial dan kuadrat besar dapat menutupi kelemahan Vigenere Cipher, sedangkan Vigenere Cipher dapat mencegah kemunculan huruf yang sama dalam cipher yang mempunyai pola tertentu. Vigenere cipher mudah diimplementasikan dan menggunakan operasi substitusi. Untuk mengkompresi nilai numerik yang dihasilkan secara acak, digunakan fungsi hash yaitu Message Digest 5 (MD5). percobaan dalam makalah ini telah memberikan kontribusi dalam peningkatan kualitas enkripsi dimana citra digital dioperasikan dengan MD5 yang kemudian hasilnya akan diubah menjadi RSA. Fungsi hash awal yaitu 32 karakter diubah menjadi 16 karakter yang akan menjadi inputan untuk proses RSA dan Vigenere Cipher. Pada citra berwarna yang digunakan sebagai media operasi, akan dilakukan pengecekan apakah citra tersebut sudah melalui proses digital signature
Implementation Of Extreme Gradient Boosting Algorithm For Predicting The Red Onion Prices Saputri, Pungky Nabella; Alzami, Farrikh; Saputra, Filmada Ocky; Andono, Pulung Nurtantio; Megantara, Rama Aria; Handoko, L Budi; Umam, Chaerul; Wahyudi, Firman
Moneter: Jurnal Keuangan dan Perbankan Vol. 11 No. 1 (2023): APRIL
Publisher : Universitas Ibn Khladun Bogor

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (656.456 KB) | DOI: 10.32832/moneter.v11i1.55

Abstract

Red Onion or the Latin name Allium Cepa is included in the group of vegetable plants that are needed by the public for food needs. Red Onions are one of the seasonal crops so their availability can change in the market which causes price instability due to a lack of supply of production by several factors: 1) not yet it's harvest time, 2) crop attacked disease pests and fungi, and 3) weather factor. Therefore, a study is needed to predict red onion prices, so that it can be used as information for the government to stabilize red onion prices. The method used in this study is CRISP-DM and the Extreme Gradient Boosting algorithm to predict the price of red onions by taking data samples from Tegal and Pati Cities. The results of this study are that the Extreme Gradient Boosting algorithm is able to produce Tegal District Root Mean Square Error (RMSE) values of 5107.97% and Mean Absolute Percentage Error (MAPE) values of 0.17%. For prediction results with Pati Regency data samples, it produces a Root Mean Square Error (RMSE) value of 6049.74% and a Mean Absolute Percentage Error (MAPE) of 0.17%.
PREDIKSI EMAIL PHISING MENGGUNAKAN SUPPORT VECTOR MACHINE Umam, Chaerul; Handoko, L. Budi
Semnas Ristek (Seminar Nasional Riset dan Inovasi Teknologi) Vol 8, No 01 (2024): SEMNAS RISTEK 2024
Publisher : Universitas Indraprasta PGRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30998/semnasristek.v8i01.7138

Abstract

Email phising merupakan salah satu bentuk kejahatan di internet yang dapat merugikan banyak orang. Ketika seseorang sudah terkena phising maka data data orang tersebut dapat hilang dan digunakan oleh orang yang tidak bertanggung jawab. Pada penelitian ini, akan melakukan proses klasiifkasi email phising dengan menggunakan bantuan machine learning yaitu algoritma SVM. Dataset yang digunakan pada penelitian ini yaiitu merupakan dataset yang berisi body email yang terdiri dari total 18650 data yang terdiri dari 11322 data safe email dan 7328 data phising email. Dari data tersebut, akan dibagi menjadi 70% data pelatihan dan 30% data pengujian. Setelah dilakukan proses pengujian pada penelitian ini, algoritma SVM yang digunakan mendapatkan akurasi pengujian sebesar 84.56%.
KOMBINASI AUTOKEY CIPHER DAN TRANSPOSISI KOLOM DALAM MODEL SUPER ENKRIPSI Handoko, L. Budi; Umam, Chaerul
Semnas Ristek (Seminar Nasional Riset dan Inovasi Teknologi) Vol 8, No 01 (2024): SEMNAS RISTEK 2024
Publisher : Universitas Indraprasta PGRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30998/semnasristek.v8i01.7132

Abstract

Kriptografi modern dibangun berdasarkan banyak konsep yang diperkenalkan dalam kriptografi klasik. Penelitian ini mengevaluasi efektivitas penggunaan metode Autokey Cipher dan Transformasi Kolom dalam melindungi keamanan data sensitive. Tranposisi kolom merupakan jenis trabnsposisi cipher yang mudah dan sederhana. Dengan menerapkan metode enkripsi Autokey Cipher menggunakan kunci 'FIKUNGGUL' dan transformasi kolom dengan kunci 'JAYA', teks asli 'UDINUSSMG' berhasil diubah menjadi teks sandi yang kompleks dan sulit diprediksi. Hasil penelitian menunjukkan bahwa penggunaan kedua teknik kriptografi ini secara signifikan meningkatkan tingkat keamanan data terhadap serangan brute force dan akses tidak sah. Proses enkripsi dan dekripsi yang kompleks dari kedua metode kriptografi tersebut berhasil mencegah penyerang untuk dengan mudah mendapatkan akses ke informasi yang dilindungi, serta memberikan lapisan keamanan tambahan yang efektif.
Implementasi Website BumDes Manggala Karsa Desa Karangsari, Kec. Pejawaran, Kab. Banjarnegara Setiono, Oki; Salam, Abdus; Ghozi, Wildanil; Handoko, L. Budi
Jurnal Pengabdian kepada Masyarakat Nusantara Vol. 4 No. 4 (2023): Jurnal Pengabdian kepada Masyarakat Nusantara (JPkMN)
Publisher : Lembaga Dongan Dosen

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Desa Karangsari, Pejawaran, Banjarnegara belum memiliki website untuk BUMDes yang digunakan sebagai sarana informasi kegiatan dan promosi hasil produk UMKM desa. Kegiatan BUMDes belum terdokumentasi dengan baik, layanan kepada masyarakat untuk kegiatan BUMDes belum menggunakan teknologi informasi serta informasi produk dan jasa yang dikelola BUMDes belum tersebar dengan maksimal.Tujuan yang hendak dicapai adalah pendampingan pengembangan website BUMDes desa Karangsari, Kec. Pejawaran, Kab. Banjarnegara untuk meningkatkan kinerja dan layanan BUMDes kepada masyarakat. Hasil yang dicapai berupa website BUMDes untuk layanan publik dan mengenalkan unit usaha serta penjualan produk UMKM desa
IMPLEMENTATION OF LSTM (LONG SHORT TERM MEMORY) ALGORITHM TO PREDICT WEATHER IN CENTRAL JAVA Irwan, Rhedy; Andono, Pulung Nurtantio; Al Zami, Farrikh; Ocky Saputra, Filmada; Megantara, Rama Aria; Handoko, L. Budi; Umam, Chaerul
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 6 (2023): JUTIF Volume 4, Number 6, Desember 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.6.1118

Abstract

Agro-indutrial agricultural production such as red onions in Indonesia has a very important share in driving Indonesia's economic growth, especially in Central Java province which contributed 28.15% of the total national red onion production in 2021. Weather conditions have a major influence on the red onion planting process until the red onions are ready to be harvested. In this study, the objective is to predict various types of weather such as rainfall, air temperature, and air humidity in seven districts in Central Java, namely Brebes, Temanggung, Demak, Boyolali, Kendal, Pati, and Tegal. To do this, the use of the LSTM (Long Short Term Memory) algorithm with its ability to store memory longer than RNN will be reliable for predicting various types of weather in the future. This research was developed with the CRISP-DM (Cross Industry Process Model for Data Mining) method which has a goal-oriented approach, this method is a mature and widely accepted method in Data Mining with various applications in Machine Learning. With the final results from 39 models by using the evaluation of the average value of train MSE 0.013, test RMSE 0.11, test MSE of 0.02, test RMSE 0.12 and succeed to predict 5 days or months ahead from the last data that is provided.
Securing Medical Images Using Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) for Image Steganography Pramudya, Elkaf Rahmawan; Handoko, L. Budi; Harjo, Budi; Sani, Ramadhan Rakhmat; Sari, Christy Atika; Shidik, Guruh Fajar; Andono, Pulung Nurtantio; Sarker, Md. Kamruzzaman
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 2 (2025): JUTIF Volume 6, Number 2, April 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.2.4426

Abstract

Steganography is a technique for embedding secret information into digital media, such as medical images, without significantly affecting their visual quality. The primary challenge in medical image steganography is preserving the quality of the cover image while ensuring robustness against distortions such as compression or data manipulation attacks, which may impact diagnostic accuracy. This study proposes an enhanced steganographic method based on Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) to improve the security and robustness of medical image embedding. DWT decomposes the medical image into four frequency sub-bands (LL, LH, HL, HH), while SVD is applied to embed the secret image while maintaining essential medical features. Experimental results show that the proposed method achieves a PSNR value of up to 78 dB and an SSIM value approaching 1, indicating that the stego image quality is nearly identical to the original cover image. Compared to previous DCT-SVD and IWT-SVD-based approaches, the DWT-SVD method offers superior robustness and imperceptibility, particularly in preserving image quality in complex-textured medical images. This method contributes to enhancing data security in telemedicine and AI-based medical imaging applications by ensuring that sensitive medical data remains protected while preserving image integrity for diagnostic use.
Co-Authors ., Muslih Abdus Salam, Abdus Abdussalam Abdussalam Abu Salam Abu Salam Acun Kardianawati Ade Surya Ramadhan Adelia Syifa Anindita Aisyah, Ade Nurul Aisyatul Karima Aisyatul Karima Ajib Susanto Al zami, Farrikh Alzami, Farrikh Andi Danang Krismawan Ardytha Luthfiarta Ari Saputro Ari Saputro, Ari ARIANTO, EKO Ariya Pramana Putra Ariyanto, Noval Budi Harjo Budi, Setyo Cahaya Jatmoko Chaerul Umam Chaerul Umam Chaerul Umam Chaerul Umam Chaerul Umam Christy Atika Sari De Rosal Ignatius Moses Setiadi Eko Hari Rachmawanto Elkaf Rahmawan Pramudya Erwin Yudi Hidayat Erwin Yudi Hidayat Etika Kartikadarma Fauzi Adi Rafrastara Fikri Firdaus Tananto Fikri Firdaus Tananto Filmada Ocky Saputra Firman Wahyudi, Firman Ghulam Maulana Rizqi Guruh Fajar Shidik Hafiidh Akbar Sya'bani Hanif Setia Nusantara Hanny Haryanto Hasan Aminda Syafrudin Hendy Kurniawan Herfiani, Kheisya Talitha Irfannandhy, Rony Irwan, Rhedy Isinkaye, Folasade Olubusola Izza Khaerani Ja'far, Luthfi Junta Zeniarja Karima, Nida Aulia Khafiizh Hastuti Khafiizh Hastuti Lucky Arif Rahman Hakim Maulana Ikhsan Megantara, Rama Aria Mira Nabila Mira Nabila Muhammad Jamhari Muslih Muslih Muslih Muslih Nurhindarto, Aris Ocky Saputra, Filmada Oki Setiono Pulung Nurtantio Andono Raihan Yusuf Rama Aria Megantara Ramadhan Rakhmat Sani Reza Pahlevi, Mohammad Rizky Rizqy, Aditya Rofiani, Rofiani Saputra, Filmada Ocky Saputri, Pungky Nabella Sarker, Md. Kamruzzaman Sendi Novianto Silla, Hercio Venceslau Soeleman, M Arief Sya'bani, Hafiidh Akbar Umi Rosyidah Valentino Aldo Wellia Shinta Sari Wildanil Ghozi