Claim Missing Document
Check
Articles

Implementasi Serangan Black Hole pada Mobile Ad-Hoc Network dengan Pergerakan Dinamis Terstruktur menggunakan Protokol Dynamic Source Routing Tasrahmiati Istiqomah; Reza Andria Siregar; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1199.433 KB)

Abstract

MANET is one of the wireless technologies that consists of several mobile nodes that are structuredwithout a fixed infrastructure. In the absence of a fixed infrastructure, it poses a challenge in terms ofsecurity. One of the MANET attacks that are often encountered is black hole attacks. A black hole attackis a data retrieval attack by sending fake reply messages to the data sending node that declares itselfas the shortest and fastest node to get to the destination node. Where before reaching the destinationnode, the data packet has been dropped. Black hole attacks have two types of attacks, including; anattack which is only done by one attacker node and a collaborative black hole attack performed bymore than one attacking node. In this study the authors use the model of manhattan mobility gridmovement and routing protocol. One of the routing protocols found in MANET is the DSR routingprotocol. the simulation of this test is done using NS-3 simulator with test scenario based on number ofnodes, number of black hole nodes and the area of simulation area. The test was conducted todetermine the effect of black hole attacks of data transmission with packet delivery ratio testingparameters and total packet loss. From the simulation, the test result shows that black hole attackworks quite significantly with total packet loss 89.6552% and the best packet delivery ratio is 53.3333%
Rancang Bangun Pengamatan pH Air Menggunakan Protokol MQTT Cahyo Karya Basuki; Dany Primanita Kartikasari; Achmad Basuki
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 1 (2019): Januari 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (529.971 KB)

Abstract

Water pH is the most important aspect in the field of fisheries, especially in fish cultivation in ponds. PH monitoring problems, currently very much talked about one of them is weather changes that make the management sometimes forget or are lazy to check. So that the role of technology is needed that can help overcome the problem, to convey water pH data to managers remotely. IoT or the Internet of Things is a technology concept whose application can be used to help overcome these problems, where the system works is to connect physical objects with internet communication. IoT requires a protocol to run data transmission that functions as data transport from sensors to users on a network. The protocol used is MQTT (Message Queuing Telemetry Transport) where the protocol is expected to work in low bandwidth and unrealiable networks. The mechanism applied to the system used is publish-subscribe. With a sensor node on Arduino microcontroller as a publisher. Then the Raspberry Pi microcomputer is a server that functions as a broker, time control middleware and data storage. Subscriber as the data requester adopts from java language as a simple interface to the user so that it is easy to read. From the implementation that has been made, it is obtained the results of system testing that matches expectations and obtains protocol kinerja protokolnce which refers to the average latency and delay values ​​below 1 ms, which are 0.31 ms and 0.71 ms with a test time of 3x24 hours.
Implementasi Perangkat Mobile Publisher Subscriber Sebagai Perantara Pengiriman Data Sensor Dari Lapangan Ke Pusat Data Sukma Alamsyah Budianto; Adhitya Bhawiyuga; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 2 (2019): Februari 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (521.984 KB)

Abstract

Sensor devices implemented in the field facing a problem when sending data on unstable network conditions to the data center. To solve these problems, we develop an application based on the Android operating system implementing publish/ subscribe communication as an intermediary for sending sensor data in the field to the data center using the MQTT protocol. To prove the application can operate as an intermediary for sending sensor data in the field to the data center, three tests are carried out. There are functional testing, scenario testing and performance testing. In functional tests, five functional requirements designed can be fulfilled by the application as an intermediary for sending sensor data to the data center. In scenario tests, from the three test scenarios performed the results of the application can be carried out without any application errors. In performance testing by calculation application performances and get the results of Subscriber Throughput is equal to 161.55 message/s, Publihser Throughput is equal to 2.13 message/s, the latency message average Subscriber apps are 1488.28 ms and the publisher message latency average app is 5208.86 ms.
Implementasi Sistem Akuisisi Data Sensor Pertanian Menggunakan Protokol Komunikasi LoRa Richad Gilang Wisduanto; Adhitya Bhawiyuga; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 3 (2019): Maret 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (495.026 KB)

Abstract

Periodic monitoring of agricultural environmental condition is needed to growth the plant will be better, so it will improve the quality and quantity of agricultural products. The way of monitor environmental conditions periodically is an acquisition data system. The system requires minimum of two nodes, namely sensor nodes and gateways. Sensor node has function to put the data from the sensor and transmit it to the gateway, while the gateway receives the data and store it. Beside that a communication protocol is needed to connect both of nodes and to transmit the data wirelessly to remote monitoring, which one of it is LoRa. LoRa is a technology which has a wide range with low battery consumption, so it is suitable for monitoring agriculture in Indonesia, which is known as an agricultural country because of the wide area of agricultural land. There are two tests had been done, that are functional testing and performance testing. In the functional testing, the system can run properly where the system can put the till save it. The performance testing was hold to see the performance of the LoRa HopeRF-RFM9x module based on packet loss and delay with the influence of distance, packet size, and interval of delivery time. The result of the performance is the HopeRF-RFM9x module can transmit the packets well for 200, 300 and 400 meters.
Studi Penggunaan Energi pada Implementasi Protokol Routing RPL dan LOADng di Wireless Sensor Network Rozali Syahputra; Reza Andria Siregar; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 4 (2019): April 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (625.767 KB)

Abstract

Wireless Sensor Networks can generally interpret as wireless networks that are distributed using embedded devices equipped with sensor nodes. The sensor node has limited resources that are equivalent to two AA type batteries. Some of the things that spend more energy on WSN are Package Control in the WSN routing. Routing over Low Power and Lossy Network (RPL) is one of the protocols used for routing WSN networks. However, in some cases, it is necessary to use other protocols as an alternative. Light On-demand Ad hoc Distance-vector Routing (LOADng) is the right lightweight protocol for RPL alternative. Both of this protocol then implemented in several topology scenarios and is also on node placement factor, radio transmission distance, and control package for each node affecting the RPL and LOADng protocol's energy consumption. From this study, the results obtained for the Package Control scheme around reducing energy consumption by an average of 19% for the RPL protocol with Imin changes 4 seconds to 8 seconds and then cutting the average energy consumption by 14% for LOADng with changes in Route Hold Time from 5 minutes to 10 minutes.
Implementasi Shared Session Dalam Klaster Server Web Menggunakan PHP dan MySQL R. Moch Makruf Puja Pradana; Mahendra Data; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 5 (2019): Mei 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (990.098 KB)

Abstract

Session is a method that used to store information on a computer server that can be used on several pages including the page itself. In using a web server cluster, it can produce a better performance than using a single server that handles a website. But there are some problems that arise in the development between the web server cluster against the use of the session itself. In a web server cluster is a represented by a single node will run independently, if the initial session formed in the web application only have one node server, then the other server nodes can't get the same session access. The solution that can be used is to save the data session into database with mySQL, and the access of data session can be shared to another web servers. Another problem was revealed is how one web server cluster can communicate with the database in storing dan requesting data sessions. With these problems, this study developed the Shared Session method that will be applied through PHP. To prove that the method can run the system according to function, two tests are applied, login and logout testing and black box testing. In testing the login and logout that is designed can be fulfilled in storing and sharing data sessions even though there is a condition of one disabled web server. In the black box testing the response time results obtained in each scenario, in the first scenario of 100 session requests produces a response time of 18.7 second to 26.2 second, in the second scenario of 200 session requests produces a response time of 1 minutes up to 1.38 minutes, in the third scenario of 300 session requests to produce a response time of 10.07 seconds to 15.25 seconds.
Deteksi Serangan ARP Spoofing berdasarkan Analisis Lalu Lintas Paket Protokol ARP Veny Charnita Br Ginting; Mahendra Data; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 5 (2019): Mei 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (508.112 KB)

Abstract

ARP(Address Resolution Protocol) is a protocol to translate an IP address into MAC address. ARP is used when a host wants to communicate with another hosts whose MAC address is unknown, it broadcast an ARP request packet for the hardware address associated with the IP address of a destination. The host with corresponding protocol address sends a unicast reply to the sender. Protocol ARP is a stateless protocol which caused ARP protocol has a vulnerability. ARP vulnerability support a network attack called ARP Spoofing attack or ARP cache poisoned attack. ARP Spoofing attack perform cache poisoning by sending spoofed ARP packet. ARP spoofing is capable of executing the other attack such as DOS attack, Man in the middle attack, host impersonating, etc. This research was conducted to detect ARP Spoofing attack using based on ARP packet traffic. ARP packet traffic will be checked by detector host. Detector host checks the header of packet, amount of packet, MAC duplication and ARP request of ARP reply packet. The information of ARP spoofing packet will be written on log file. The classification rate was 89.64% and the average time to detect the attack is 0.4 second.
Implementasi Encounter Record untuk menangani Flood Attack pada Routing Protocol Epidemic dan Routing Protocol Spray-And-Wait DTN Yefta Kristiyanto; Rakhmadhany Primananda; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 6 (2019): Juni 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (469.834 KB)

Abstract

Delay Tolerant Network (DTN) is a network architecture that can be applied in areas that have a delay But. DTN has limits on its network storage size. DTN has two routing protocols, single-copy and multi-copy routing. In multi-copy, resources become full faster because they are used to store message replicas and its becomes more vulnerable to flood attacks than single-copy routing protocol. Flood attack is an attack from a malicious node by sending a huge number of packets into the network. Encounter records are one of many security mechanism that can be used to detect flood attack on DTN. In this research, ER development was carried to handle flood attack. The time needed to detect flood attacks in Epidemic is 1.22349 seconds and in Spray-and-wait routing is 0.97765 second. The accuracy of detection using ER is more than 80% for both protocols. Difference of PDR result of using ER and without ER in Epidemic 17.209% and in Spray-and-wait is 66.7139%. The average latency in epidemic routing is 2774.35489 ms and in spray-and-wait routing is 2794.70716 ms. The result of overhead ratio in epidemic routing is 281.52343 and in Spray-and-wait routing is 8.82161.
Analisis Kinerja Protokol LoRaWAN untuk Transmisi Data pada Skenario Urban Area Fathan Muhammad; Adhitya Bhawiyuga; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 9 (2019): September 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (261.205 KB)

Abstract

Long Range Wide Area Network (LoRaWAN) is a type of network for wireless telecommunication area designed to enable remote communication with long distance communication and low bit rate. LoRaWAN can be used on communication networks that have a wide range using end devices. LoRaWAN offers a wide range of advantages to the challenge of IoT implementation, but the current implementation of LoRaWAN technology is still very limited, requiring feasibility testing and analysis to what extent LoRaWAN technology is capable of being implemented in urban areas in Indonesia. In this research, an analysis of the performance of the LoRaWAN protocol for data transmission with urban area scenarios in Malang City is carried out. The method used in this study is to simulates LoRaWAN protocol in Network Simulator 3 (NS-3) application by changing the parameters to determine the effect on the the number of end devices, radius of the gateway range, and data sending period to the parameters throughput and packet loss. From the results of research proved that for the use of protocol LoRaWAN in urban areas, the more end devices used, the greater the throughput value and the greater the value of packet loss obtained. In addition, the wider the area needed, the throughput and packet loss obtained are constant. And then, the larger the period of data transmission, the smaller the throughput value is obtained and the smaller the value of packet loss obtained.
Implementasi Sistem Deteksi dan Mitigasi Serangan Distributed Denial of Service (DDoS) menggunakan SVM Classifier pada Arsitektur Software-Defined Network (SDN) Jodi Chris Jordan Sihombing; Dany Primanita Kartikasari; Adhitya Bhawiyuga
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 10 (2019): Oktober 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (396.257 KB)

Abstract

Software-defined network (SDN) provides a promising architecture for future networks and can benefit from programmability on the controller to manage all behavior on the network. Apart from the advantages SDN has, there are challenges to SDN network security. Distributed Denial of Service (DDoS) is one of the attacks that can attack components that exist on the SDN architecture. In this study the detection and mitigation system of DDoS attacks was built to minimize DDoS attacks on SDN architecture using SVM Classifier. SVM is applied to the machine learning model to classify normal traffic and DDoS attack traffic based on features taken from flow entries. From the test results the system has been able to detect DDoS attacks with an average accuracy of 96.83% and an average detection time of 67.80 ms. In addition, the system can also reduce the number of DDoS attack packets sent to the victim host.