Claim Missing Document
Check
Articles

Found 9 Documents
Search
Journal : CESS (Journal of Computer Engineering, System and Science)

Perancangan dan Implementasi Virtual Private Network (VPN) menggunakan Protokol SSTP (Secure Socket Tunneling Protocol) Mikrotik di Fakultas MIPA Universitas Tanjungpura Ikhwan Ruslianto
CESS (Journal of Computer Engineering, System and Science) Vol 4, No 1 (2019): Januari 2019
Publisher : Universitas Negeri Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1147.313 KB) | DOI: 10.24114/cess.v4i1.11792

Abstract

Internet sudah menjadi bagian yang tidak terpisahkan dari aktivitas manusia sehari-hari. Dengan internet segala informasi bisa didapatkan dalam waktu yang cepat, dari berbagai penjuru dunia dapat saling berkomunikasi dan bertukar informasi. Akan tetapi dengan adanya internet, keterbukaan informasi menjadi hal yang biasa, walaupun terkadang ada informasi yang masih bersifat rahasia (confidentiality). Informasi dapat berupa apa saja, tidak terkecuali informasi dan data yang berkaitan dengan institusi pendidikan, Fakultas Matematika dan Ilmu Pengetahuan Alam Universitas Tanjungpura salah satunya. Di Fakultas MIPA sendiri ada beberapa informasi-informasi informasi yang hanya boleh diakses oleh kalangan tertentu saja. Misalnya ada beberapa aplikasi yang hanya dapat dibuka di lingkungan FMIPA saja maka dibuatlah mekanisme Virtual Private Network menggunakan protokol SSTP (Secure Socket Tunneling Protocol) agar Server dan aplikasi yang ada di lingkungan FMIPA dapat diakses menggunakan internet diluar lingkungan FMIPA. Konfigurasi SSTP dapat dilakukan menggunakan perangkat router mikrotik yang dihubungkan menggunakan perantara Virtual Private Server (VPS) yang ada di internet, kemudian diintegrasikan pada router mikrotik, sehingga kedua kondisi tersebut dapat saling berinteraksi seolah-olah pengguna berada dilingkungan FMIPA Untan
Application of Arnold Cat Map and Logistic Map Methods for Securing Citizens' Data Image Thomas Adi Putra; Ikhwan Ruslianto; Syamsul Bahri
CESS (Journal of Computer Engineering, System and Science) Vol 7, No 2 (2022): July 2022
Publisher : Universitas Negeri Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24114/cess.v7i2.36302

Abstract

Keamanan data merupakan salah satu isu yang sangat penting terutama untuk data yang bersifat pribadi baik dalam bentuk tulisan maupun citra. Penerapan kriptografi dapat digunakan untuk mengamankan data agar tidak dapat dimengerti oleh sembarang orang. Pada penelitian ini dilakukan pengamanan data berupa citra KTP dan citra KK menggunakan metode Arnold cat map dan logistic map. Pada pengujian analisa sensitivitas kunci, diperoleh bahwa perubahan kunci dekripsi sebesar 0,0001 dari kunci enkripsi menghasilkan citra yang sangat berbeda dengan citra asal. Pada pengujian analisis diferensial diperoleh nilai rata-rata NPCR dan UACI untuk citra KTP sebesar 99,60745% dan 39,50400% sedangkan nilai rata-rata NPCR dan UACI untuk citra KK sebesar 99,60671% dan 35,55296%. Pada pengujian koefisien korelasi, diperoleh nilai rata-rata koefisien korelasi untuk citra KTP sebesar -0,00082 untuk citra KK sebesar -0,00112 yang berarti citra hasil enkripsi memiliki korelasi yang sangat lemah dengan citra asal. Berdasarkan hasil pengujian, diketahui bahwa penerapan metode Arnold cat map dan logistic map dapat digunakan untuk mengamankan citra data penduduk.
Internet of Things Based Monitoring and Control System for Indoor Lettuce Cultivation on Soil Media Caecilia Cantica Gita Mileniae Ahen; Ikhwan Ruslianto; Uray Ristian
CESS (Journal of Computer Engineering, System and Science) Vol 7, No 2 (2022): July 2022
Publisher : Universitas Negeri Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24114/cess.v7i2.36303

Abstract

Budidaya selada perlu memperhatikan kondisi lingkungan agar pertumbuhannya optimal. Melakukan budidaya di ruangan terkontrol bertujuan agar pertumbuhan tanaman selada selalu stabil tanpa perlu mengkhawatirkan faktor alam. Penelitian ini menggunakan NodeMCU ESP32 sebagai pengendali sistem untuk melakukan pemantauan dan pengontrolan budidaya selada berbasis Internet of Things (IoT). Sensor pH air analog digunakan untuk memantau pH air, sensor capacitive soil moisture untuk memantau kelembapan tanah, dan sensor DHT11 untuk memantau suhu dan kelembapan udara. Pengontrolan kondisi ruang budidaya dapat dilakukan menggunakan sistem berdasarkan parameter pH, kelembapan tanah, kelembapan udara, suhu udara, dan intensitas cahaya yang ideal untuk pertumbuhan tanaman selada. Pengguna juga dapat melakukan pengontrolan secara manual. Hasil pengamatan selama 14 hari menunjukkan bahwa tanaman selada yang dibudidayakan berbasis sistem mengalami pertumbuhan yang subur sebesar 60% dan pertumbuhan sedang sebesar 40%. Tanaman selada yang dibudidayakan secara manual hanya mengalami pertumbuhan yang subur sebesar 10%, pertumbuhan sedang sebesar 10%, pertumbuhan kurang sebesar 30% dan sudah tidak mengalami pertumbuhan lagi karena layu atau mati sebesar 50%. Faktor yang memberikan pengaruh signifikan terhadap kesuburan budidaya tanaman selada adalah intensitas cahaya dan kelembapan tanah.
Determine the Eligibility Level of Village Fund Direct Cash Assistance Recipients using Fuzzy Mamdani Method Hansen Alexander Rustan; Ikhwan Ruslianto; Irma Nirmala
CESS (Journal of Computer Engineering, System and Science) Vol 7, No 2 (2022): July 2022
Publisher : Universitas Negeri Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24114/cess.v7i2.36136

Abstract

Pemerintah pertama kali mengumumkan 2 kasus pasien positif Coronavirus Disease 2019 (Covid-19) pada 2 Maret 2020. Hampir semua aspek kehidupan masyarakat terkena dampaknya, khususnya sektor ekonomi. Salah satu upaya pemerintah dalam memulihkan perekonomian Indonesia yaitu melalui pemberian Bantuan Langsung Tunai Dana Desa (BLT-DD). Permasalahan yang dihadapi dalam pemberian BLT-DD ini yaitu tidak tepatnya pemberian BLT-DD, keterlambatan penyaluran BLT-DD karena perbedaan kebijakan, dan kurangnya keterbukaan informasi. Penelitian ini bertujuan untuk membangun sebuah sistem yang dapat memberi dukungan keputusan yang tepat untuk menilai kelayakan calon penerima BLT-DD. Metode yang digunakan dalam penelitian ini yaitu menggunakan perhitungan metode Fuzzy Mamdani. Metode ini digunakan karena memiliki akurasi yang tinggi serta menghasilkan nilai keluaran yang dapat digunakan untuk menentukan urutan kelayakan calon penerima BLT-DD. Sistem yang akan dibuat akan menghasilkan keluaran berupa keputusan dan nilai kelayakan masing-masing calon penerima BLT-DD, yang kemudian diurutkan berdasarkan tingkat kelayakannya. Hasil penelitian yang telah dilakukan yaitu didapatkan akurasi tertinggi sebesar 89,87% dengan jumlah minimal kesesuaian kriteria keluarga miskin bernilai “Tinggi” terbaik sebanyak 8 kriteria.  
Implementation of IPS (Intrusion Prevention System) Fail2ban on Server for DDoS and Brute Force Attacks Fazar Dawamsyach; Ikhwan Ruslianto; Uray Ristian
CESS (Journal of Computer Engineering, System and Science) Vol 8, No 1 (2023): January 2023
Publisher : Universitas Negeri Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24114/cess.v8i1.40259

Abstract

Server security is an important thing that must be considered so that the server can work well and serve users. Attacks on servers can threaten server performance and data security in it. According to the National Cyber and Crypto Agency 2020 report, ports 22 and 80 were the top ports with the most attacks. One of the attacks on port 22 is brute force and an attack on port 80 is Distributed Denial of Service (DDoS). To solve this problem, a study was conducted to implement fail2ban IPS (Intrusion Prevention System) to increase server security. The attacks tested focused on brute force attacks on port 22 and DDoS attacks on port 80 using the TCP protocol. The fail2ban system is equipped with a website interface and notifications via telegram. The test results show that DDoS attacks have more impact on CPU performance with the highest increase in CPU being 92%, while brute force attacks have more impact on server memory performance with the highest increase in memory by 100%. The increase in server performance results in slowed server performance. The system managed to prevent DDoS attacks with an average speed of 0.5 seconds while brute force attacks were 6.1 seconds. The system managed to prevent DDoS attacks with a total of 88 attacks and brute force attacks with a total of 864 attacks.
Implementation of Intrusion Prevention System (IPS) as a Website-Based Server Security System and Mobile Application Rayco William; Ikhwan Ruslianto; Uray Ristian
CESS (Journal of Computer Engineering, System and Science) Vol 8, No 1 (2023): January 2023
Publisher : Universitas Negeri Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24114/cess.v8i1.40258

Abstract

Server is a center for providing services and storing data in a computer network. A server is managed by server administrator who has a duty of monitoring security server. While on duty, there are deficiencies in detecting attacks, the slow information about the attacks, and how to handle attacks on the server. In this research, a server security system was created by implementing an Intrusion Prevention System (IPS) based on website and mobile applications. Attack detection focuses on ICMP and TCP port attacks with the latency time when the system responds to an attack is 99,89 ms (very good). The attack handling system was successfully carried out using Iptables against the attacker's IP that detected by the Suricata system through the website and mobile applications, to be given action which is divided into Drop, Reject and Accept. Administrators can quickly take the necessary precautions after receiving an automatic notification when the server is under attack via Telegram with an average speed is 3.41second. The ping attack, port scanning and ping of death (DoS) attacks resulted in an increase in the performance load on the local server with the initial conditions of CPU performance ranging from 10-19%, increasing when a ping attack occurred to 21,6%, memory 41,7%, and disk 19,6%. Port scanning increased by 85,9% CPU, memory 41,9%, and disk 20,3%. Ping of death increased CPU 90,4%, memory 42,9%, and disk 20,8%. Based on the tests that have been done, an excessive increase is found in the ping of death attack which results in server performance increasing to 90,4%, if the attack occurs for a long time then the server condition will be hang (damaged).
Internet of Things based Control and Monitoring System for Koi Fish Cultivation Kevin William; Ikhwan Ruslianto; Irma Nirmala
CESS (Journal of Computer Engineering, System and Science) Vol 8, No 1 (2023): January 2023
Publisher : Universitas Negeri Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24114/cess.v8i1.40886

Abstract

Water quality is an important factor for fish koi cultivation. Poor water quality such as inappropriate temperature, pH, and turbidity can disrupt metabolic processes, inhibit growth and cause death in koi fish. Apart from that, feeding and checking water quality are still done manually. Because of this, we need a system that can monitor and control the feeding, temperature, and water quality according to the living environment of koi fish. In this study the system was built on an Android-based mobile application using the flutter framework. In addition, the system has a notification to provide information on changes in sensor readings in real time to users. The notifications are changes in temperature, pH, turbidity, water level, feed level and changes in control device modes. Testing the water temperature readings obtained a relative error value of 0,66%, water turbidity readings obtained an error value of 8,79%, water pH readings obtained a relative error value of 2,45%, water level readings obtained an error relative value of 1,57% and feed availability readings obtained an error value of 3,1%.
Aeroponic Media Potato Plant Monitoring and Control System Internet of Things Based Mella Geovanie; Ikhwan Ruslianto; Uray Ristian
CESS (Journal of Computer Engineering, System and Science) Vol 8, No 1 (2023): January 2023
Publisher : Universitas Negeri Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24114/cess.v8i1.42432

Abstract

Aeroponics is a farming method without soil media that works by spraying water and a nutrient solution in the form of a mist on plant roots. The use of the aeroponic method itself requires monitoring and controlling air temperature, air humidity, water temperature, and nutrient levels. Incorrect settings can cause plants to experience drought, root rot, and a lack of nutritional elements, which can cause plant death. Therefore, we need a system that can monitor and control air temperature, air humidity, water temperature, and nutrient content. This research builds an Internet of Things-based system that can assist in providing information regarding the values of air temperature, air humidity, water temperature, and nutrient content displayed on the website application. The system can also perform manual and automatic control functions. In the test results, the sensor value reading system has an accuracy of 98.56% for air temperature, 96.89% for accuracy of air humidity readings, 99.64% for accuracy of water temperature readings, 97.02% for accuracy of nutrient solution readings, and 99.86% for accuracy of water level readings. The test results from observing potato plants for 21 days showed an increase in growth in the highest plant height with an average of 4.36 cm and the lowest plant height growth with an average of 0.96 cm.
Implementation of Penetration Testing on the Website Using the Penetration Testing Execution Standard (PTES) Method Kurniawan, Bagus; Ruslianto, Ikhwan; Bahri, Syamsul
CESS (Journal of Computer Engineering, System and Science) Vol 8, No 2 (2023): July 2023
Publisher : Universitas Negeri Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24114/cess.v8i2.47096

Abstract

Indonesia merupakan salah satu negara yang memiliki tingkat kejahatan siber yang sangat tinggi di dunia. Masalah tersebut timbul akibat sumber daya manusia yang kurang memadai dan kurangnya perawatan berkala pada sistem digital di Indonesia. Salah satu perawatan yang dapat dilakukan adalah Penetration Testing sebagai evaluasi sistem digital agar lebih baik dan terhindar dari serangan siber. Metode yang dapat membantu dalam melakukan Penetration Testing adalah dengan metode Penetration Testing Execution Standard (PTES). Hasil yang didapatkan dari penelitian ini bahwa website https://k*****.go.id memiliki tiga belas kerentanan. Sehingga dari tiga belas kerentanan yang didapatkan dilakukan dengan tiga jenis serangan yang berbeda yaitu Clickjacking, SQL Injection, dan Cross Site Scripting (XSS). Ketiga jenis serangan tersebut hanya serangan Clickjacking yang berhasil dilakukan pada website https://k*****.go.id. Diperoleh kesimpulan bahwa website memiliki risiko kerentanan dan terjadinya serangan bernilai sedang dilihat berdasarkan OWASP ZAP Risk Rating Methodology.Indonesia is a country that has a very high cybercrime rate in the world. This problem arises due to inadequate human resources and a lack of regular maintenance of digital systems in Indonesia. One of the treatments that can be done is Penetration Testing as an evaluation of digital systems to make them better and avoid cyber attacks. A method that can assist in carrying out Penetration Testing is the Penetration Testing Execution Standard (PTES) method. The results obtained from this research are that the website https://k*****.go.id has thirteen vulnerabilities. So that the thirteen vulnerabilities found were carried out with three different types of attacks, namely Clickjacking, SQL Injection, and Cross Site Scripting (XSS). The only three types of attacks are clickjacking attacks that were successfully carried out on the https://k*****.go.id website. It is concluded that the website has a risk of vulnerability and the occurrence of attacks is worth being seen based on the OWASP ZAP Risk Rating Methodology.