This Author published in this journals
All Journal Jurnal Infra
Agustinus Noertjahyana
Program Studi Teknik Informatika, Universitas Kristen Petra Surabaya

Published : 12 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 12 Documents
Search

Simulasi Aplikasi untuk Mendeteksi dan Mencegah Serangan DDoS pada Jaringan Berbasis Software Defined Network Sugiyanto Goutama; Agustinus Noertjahyana; Henry Novianus Palit
Jurnal Infra Vol 10, No 1 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Software Defined Network (SDN) is one of the technological developments in computer networks. Today's computer networks generally use many network devices, where each network device has 2 functionalities, called control plane and forwarding plane. The separation of the two functions through SDN technology has the advantage of having a centralized control plane design is to make configuration and management easier. However, there is also a challenge in the form of a single point of failure that is vulnerable to Distributed Denial of Service (DDoS) attacks. Therefore, SDN requires an Intrusion Detection System (IDS) and an Intrusion Prevention System (IPS) to be able to detect and prevent DDoS attacks. This study aims to determine the level of accuracy and length of time to detect (Mean Time To Detect), as well as length of time to mitigate (Mean Time To Respond) in dealing with variations of DDoS attacks on SDN topology. This study detects in two ways, first using a signature and anomaly which will adopt the Deep Neural Network model to classify, recognize the types and patterns of DDoS attacks from a dataset with several features. The results of simulation testing with 3 types of attacks, namely ICMP Flood, SYN Flood and UDP Flood on SDN, detection with signature-IDS get MTTD and MTTR results of 7.2475 seconds and 11.74 seconds for ICMP attacks, 26.995 seconds and 11.00 seconds for SYN attacks, 20.49 seconds and 3.00 seconds on a UDP attack. While the anomaly-IDS detection does not use calculations based on MTTD and MTTR because the workings of the system can only classify per packet. So it is calculated based on the level of misclassification of the attack packet (False Negative), namely 7 packets out of 445 packets for ICMP attacks, 557 packets out of 940 packets for SYN attacks, and 2 packets out of 3120 packets for UDP attacks. Therefore, for Anomaly-IDS using the Deep Neural Network model, is still yet optimal and needs to be researched and developed further.
Implementasi dan Analisa Snort dan Suricata Sebagai IDS dan IPS Untuk Mencegah Serangan DOS dan DDOS Darryl Santoso; Agustinus Noertjahyana; Justinus Andjarwirawan
Jurnal Infra Vol 10, No 1 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

DOS and DDOS is one of the most widely used attacks by hackers. DDOS is an attack with multiple attackers to deplete the resources of the target until the target cannot handle the request. To prevent the above attacks can use a firewall, the function of the firewall is the first defense of the computer that filters incoming or outgoing packets with rules on the network. Firewalls filter data based on IP addresses, protocols, and ports, so if you use a firewall, you can't analyze further attacks. In this study, to prevent this attack using a system namely Intrusion Detection System (IDS) and Intrusion Prevention System (IPS). The function of IDS is to detect unwanted traffic on a network or device, while IPS can detect and immediately fix the problem. By using IDS and IPS attacks can be analyzed more, IDS and IPS are more reliable tools than firewalls. The test was carried out in several DOS and DDOS scenarios using the Hping3 and Slowloris tools, the test results showed that from 10 attack scenarios and not attacks, snort and suricata were balanced in issuing True Positive alerts with 3 win scenarios each, for CPU usage Suricata excelled in 7 scenarios , and in HTTP Flood attacks suricata eliminate attacks faster.
Analisis perbandingan keakuratan deteksi serangan dan efisiensi pemakaian CPU resources dari tools pendeteksi serangan SNORT dan SURICATA yang di pasang di web server Dhanar Restu Arrasy; Agustinus Noertjahyana
Jurnal Infra Vol 10, No 1 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Analyze attack detection accuracy and CPU Resource usage efficiency of Snort and Suricata attack detection tools installed on the Web Server..Snort and Suricata are IDS tools used to detect network attacks. Snort Snort is an Open Source Intrusion Prevention System (IPS) using a set of rules that help determine malicious network activity and uses those rules to find packets that match it and generate alerts for users. Suricata is a leading independent open source threat detection engine. By combining intrusion detection (IDS), intrusion prevention (IPS), network security monitoring (NSM) and PCAP processing, Suricata can quickly identify, stop, and assess the most advanced attacks.From the results of this study that at the time of flood DOS Attack Snort had an average of 93.5% while Suricata had 94.2% in the CPU section on port 80. This explains that Suricata is superior in efficiency compared to Snort during flood DOS Attack. As for the port 443, Snort has an average of 94.5% and Suricata has 95.67% in the CPU section on port 443, proving that Suricata is superior in CPU activity. For the memory section, Snort has an average of 19.9% for memory usage or is efficient compared to Suricata which has an average memory usage of 69.3% on port 80. On port 443 Snort has an average memory usage of 30.3% compared to with Suricata which has an average memory usage of 30.5%, it means that Suricata has less usage than Snort
Sistem Aplikasi Pada Multi Channel Power Socket Untuk Pengukuran Daya Pada Kompleks Ruko Dan Apartemen Yoshua Dennish Kurniawan; Resmana Lim; Agustinus Noertjahyana
Jurnal Infra Vol 10, No 1 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Along with solid human activity, especially at work time. Sometimes forget to turn off or turn on the electronic device so that the cost of electricity is vulnerable to cost overruns. This is coupled with the possibility of damage to components that make energy efficiency less. If we don't measure the use of energy on electronic devices, then we can't detect that there are problems with electronic devices. This problem will be resolved by the author by utilizing the internet network of an application and a tool for monitoring energy consumption and controlling the life of the installed load. The results of testing this tool in energy monitoring have a margin of success reaching 95.72%.
Implementasi Internet of Things pada Sistem Cathodic Protection sebagai Proteksi Korosi Besi Beton Billy Christian Johan; Agustinus Noertjahyana; Gunawan Budi Wijaya; Daniel Tjandra; Resmana Lim
Jurnal Infra Vol 10, No 1 (2022)
Publisher : Jurnal Infra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Concrete iron or reinforcement bar is steel used for reinforcement in concrete construction or known as reinforced concrete. Reinforcing bar can undergo a corrosion process caused by chemical or electrochemical reactions between steel reinforcement and its environment. One of many way to protect concrete from corrosion is by cathodic protection. There are two types of cathodic protection, namely sacrificial anodes and impressed current cathodic protection (ICCP). ICCP is more commonly used for protection in reinforced bar structures. In ICCP, negative current flows to the reinforcing bar and positive current flows to the anode. This is a method to protect the reinforcing bar from corrosion. In addition to the corrosion protection system, there is also a half-cell potential test to measure the chance of corrosion of the reinforcing bar. Measurements are made by reading the potential difference between the reference electrode and the reinforcing bar. Chances of corrosion can be known level of corrosion by reading the table of corrosion opportunities with ASTM C879-09 standard.In this research, the implementation of the internet of things will be carried out on the cathodic protection system to protect the reinforcing bar from corrosion, so that the user can monitor and control the provision of cathodic protection on the reinforcing bar.Based on the results of the tests that have been carried out, the IoT system can regulate the power supply by setting the voltage and current and can schedule the power supply to provide electric current to the reinforcing bar and can provide notifications if the electric current flowing in the concrete is more than or less than ICCP standard. The average difference between the readings between the voltage sensor and the multimeter is 21.07 mV. The reading value of the potential difference between the concrete iron and the reference electrode in the half-cell potential test method before it was carried out was -216.15 mV and after ICCP was carried out, the value became -167.974 mV. There was an increase of 58.596 mV after ICCP was performed.
Deteksi Masker Wajah dengan Metode Convolutional Neural Network Ivan Hartono; Agustinus Noertjahyana; Leo Willyanto Santoso
Jurnal Infra Vol 10, No 1 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The computer must be able to recognize the area which is a face object in the image in order to facilitate the detection of face masks used by humans. Deep learning is artificial intelligence with simple representations that have hidden layers to process data that can build complex concepts. Deep learning can be trained to detect an object and classify objects. There are many deep learning algorithms that can be used for the model recognition process, for example for object classification using MobileNet, VGGNet, DenseNet, GoogLeNet, AlexNet, and others while for object detection you can use You Only Look Once, SSD Resnet, Multi-task Cascaded Convolutional Neural Network (MTCNN), HyperFace and others. The object detection system can use two combinations of algorithms, namely the object classification method and the object detection method. The method for recognizing mask objects on human faces is CNN (Convolutional Neural Network).The CNN method is the development of the Multilayer Perceptron which is designed to process two-dimensional data. CNN method is very good in processing spatial data and classifying objects [1]. After training the model with VGGNet, the next method is to detect an object using the SSD ResNet module.
Pembuatan Aplikasi Lelang Berbasis Android Lois Fernando Audi; Liliana Liliana; Agustinus Noertjahyana
Jurnal Infra Vol 10, No 2 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Auction is a process of buying and selling to auction participants, where auction participants will make bids and be sold to bidders at the highest price. Today, conducting an online auction can be done through social media. Based on a survey conducted on CV Toro Developer, people still make auction transactions via Whatsapp. This auction transaction is considered inefficient, where the admin in the Whatsapp group must pay attention to the bid price entered by the auction participant. Therefore, this thesis will make an application so that auction transaction activities can be carried out without admin assistance. This thesis will focus on developing auction applications to facilitate auction transaction activities with chat features, auto bids, deposits, bid features that can be displayed in real-time, and notification features. The test results show that the application can carry out the auction process well from the beginning of creation until the transaction is complete. Also, other features can run well.
Pengamatan IP Cycling Pada VPN Menggunakan GRC Fingerprints dan DNSLeakTest R. Agastya Ardhitaputera Ramadhan; Justinus Andjarwirawan; Agustinus Noertjahyana
Jurnal Infra Vol 10, No 2 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

As information technology has evolved within the modern era, the needs of information rises along with it. Where every individual need information quickly and accurately, a supporting medium must support it. One of these medium is fast internet. Many are paranoid towards the idea of the government stealing their private information and using it for what they see fit. The objective of this research is to determine whether or not the stability of said VPN is of acceptable levels. The data will be taken hour-by-hour for 30(thirty) days from www.dnsleaktest.com and www.grc.com/fingerprints.htm. The results will then be forwarded to the Google Sheets website that has been programmed to receive the IP, Hostname, ISP and Country tags from the source code from said page. Commercial VPNs are private networks that allow its users to appear to be connecting from another network. This is however not without risk, for those services may not be safe. In this experiment, we have concluded that some VPNs are unstable when used at certain times.
Sistem Deteksi Reputasi Akun Seller Pada Steam Community Menggunakan Metode Klasifikasi Support Vector Machine Nalom Aholiab Sinaga; Alexander Setiawan; Agustinus Noertjahyana
Jurnal Infra Vol 10, No 2 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Playing games is an activity that is often done by many people from various ages, some just fill their free time, some make the game a job or a place to make money. The online gaming industry is currently an industry with a large value, which is $21.1 million in 2021. The Steam Community is an online game platform that provides nearly 30000 games. In this platform, you can not only play games but can make transactions with fellow Steam Community users. The transactions made include selling games, ingame accessories, steam wallets and artwork. The problem faced is, payment transactions are carried out outside the Steam platform itself, on the other hand Steam users do not know each other yet, so the seller's account reputation needs to be checked. The checks carried out are through analyzing the sentiment on the comments of the account in question. Analyzing these comments is done by using the Support Vector Machine method to classify the purpose and sentiment of the comments. The results of this research will be presented in the form of a website where users of this website-based application will enter SteamID into the system, and the system will perform sentiment analysis on comments, then the system displays the results of the analysis in the form of data presentations, in the form of the number of comments based on existing sentiments. And the system will also display all comments on the profile along with the predictions for their comments. Based on research that has been carried out using the Support Vector Machine method, the model with the best accuracy is 91% for classification of comments purposes, and 86% for sentiment classification. Based on a survey of this application, 76% of respondents claimed to be helped by this application, and 66% of respondents were willing to recommend this application to their friends.
Rancang Bangun Aplikasi Panggil Tukang Berbasis Android di Daerah Surabaya Nadia Felicia Wianda; Agustinus Noertjahyana; Lily Puspa Dewi
Jurnal Infra Vol 10, No 2 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Nowadays, many people are using android applications in their daily lives. Many kind of applications have been made to make everyday jobs and daily routines become simpler and easier. Looking for AC Service and home repairman is one of them. In Surabaya, looking for service providers is stil use with manual search which is asking to their neighboor. But the problem is, when the people just move in the new neighborhood, and just barely know anyone around, or urgently need to repair your air conditioner problem, and they just don't know whom to ask for help. Because of the problem, Writer make an application Panggil Tukang for helping people find good technicians especially people who lives in Surabaya. The features available on this application will be help the user to find the right technician. The user can get the interesting experience to find a good technicians in this application. Features such as price negotiation, payment methods, and chat will help the user to communicate with the service provider to find the best solution for them. This application simply make life much easier for people who are looking for the right technician's help. On the other hand, this application also provide help for all the technicians' service provider who are looking for people who needs their service. The application and website were built base on PHP language code and Kotlin. While the database we are using to make this application is Firebase.