p-Index From 2021 - 2026
5.029
P-Index
Claim Missing Document
Check
Articles

Implementasi Intrusion Detection System (IDS) untuk Mendeteksi serangan Metasploit Exploit Menggunakan Snort dan Wireshark Julian Lirama Junior Pandari; Wiwin Sulistyo
Jurnal Pendidikan Teknologi Informasi (JUKANTI) Vol 6 No 1 (2023): Jurnal Pendidikan Teknologi Informasi (JUKANTI) Edisi April 2023
Publisher : Program Studi Pendidikan Informatika, Universitas Citra Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37792/jukanti.v6i1.861

Abstract

Abstrak Keamanan jaringan pada saat ini memang sangat diperlukan. Seiring dengan perkembangannya serangan siber, banyak kejahatan siber yang bekerja melalui jaringan dan mengeksploitasi celah keamanan tanpa adanya akses terlebih dahulu seperti serangan Remote Exploit. Serangan Remote Exploit ini dilakukan dengan cara memanfaatkan celah pada port dan protokol yang terbuka sehingga dapat mengexploitasi sistem operasi komputer target secara jarak jauh dan dapat mencuri data-data pada komputer target. Untuk melakukan Remote Exploit membutuhkan tools Metasploit Framework dengan menggunakan exploit/multi/handler dan menggunakan payload linux/x64/meterpreter/reverse_tcp sehingga dapat mengakses sistem operasi komputer target. IDS (Intrusion Detection System) Snort adalah sebuah sistem yang digunakan untuk memantau trafik jaringan dan mendeteksi intrusi mencurigakan kemudian akan melaporkannya dalam bentuk peringatan atau alert. Dengan menggunakan Intrusion Detection System Snort bertujuan agar dapat melakukan scaning terhadap setiap serangan yang masuk ke dalam jaringan komputer dan sangat membantu dalam minimalisir kerusakan sistem yang dilakukan oleh penyerang. untuk menganalisis lalu lintas jaringan dari paket Remote Exploit digunakan Wireshark sebagai pendeteksi serangan, dan dilakukan pembuktian apakah paket tersebut merupakan virus atau bukan dengan menggunakan Virus Total. Kata kunci : Intrusion Detection System, Snort, Wireshark, Metasploit Exploit Abstract Network security at this time is indeed indispensable. As cyberattacks evolve, many cyberattacks work through networks and exploit security loopholes without prior access such as Remote Exploit attacks. This Remote Exploit attack is carried out by taking advantage of loopholes in open ports so that it can exploit the targer computer operating system remotely and can steal data on the target computer. To do Remote Exploit requires Metasploit Framework tools using exploit/multi/handler and using linux/x64/meterpreter/reverse_tcp payload so that it can access the target computer's operating system. IDS (Intrusion Detection System) Snort is a system used to monitor network traffic and detect suspicious intrusions and then report it in the form of alerts. By using the Intrusion Detection System Snort aims to be able to scan every attack that enters the computer network and is very helpful in minimizing system damage done by attackers. to multiply network traffic from Remote Exploit packets, Wireshark is used as an attack detector, and proof is carried out whether the packet is a virus or not by using Virus Total. Keywords : Intrusion Detection System, Snort, Wireshark, Metasploit Exploit/
ANALISIS WALK TEST PADA CAKUPAN AREA ACCESS POINT DI GEDUNG FTI UKSW Sesilia Kirana Vaniamosa; Wiwin Sulistyo
Jurnal Pendidikan Teknologi Informasi (JUKANTI) Vol 6 No 2 (2023): JURNAL PENDIDIKAN TEKNOLOGI INFORMASI (JUKANTI) EDISI NOPEMBER 2023
Publisher : Program Studi Pendidikan Informatika, Universitas Citra Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37792/jukanti.v6i2.942

Abstract

This research aims to obtain signal strength data or Received Signal Strength Indication (RSSI) and visualize the coverage area that can be emitted of each access point of the SWCU FTI building area, also to generate recommendation for the latest access point position. This is because the students inside the SWCU FTI building need an internet connection with an optimal signal range to access learning materials. Data collection was carried out using the WiFi Analyzer application for the Walk Test method and the Ekahau Heatmapper application for visualization. The result of measurements show that the 2nd floor has the highest average RSSI value of -47.4 dBm (very good signal strength category) and the 4th floor has the lowest average RSSI value of -63.5 dBm (good signal strength category). However, good signal strength cannot be a reference in Ekahau’s visualization because there are still red areas (bad category) in several rooms that experience obstacles or attenuation
Analisa Perbadingan QoS Menggunakan Metode Simple Queue dan Metode Queue Tree pada Hierechical Network Design di Sekolah Dasar Negeri 2 Kelet Cahyono, Ferdian Bagas; Sulistyo, Wiwin
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 7 No 4 (2023): OCTOBER-DECEMBER 2023
Publisher : Lembaga Otonom Lembaga Informasi dan Riset Indonesia (KITA INFO dan RISET)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v7i4.1003

Abstract

The development of the internet in human life has had a very positive impact on various fields of life, including the world of education. The education system supported by internet technology has created a distance learning method that can be used by teachers and students in schools. Therefore, the Internet currently plays an important role in supporting the development of the quality of education in Indonesia. The purpose of this study is to produce and then compare the performance of the Queue Tree and Simple Queue Methods using delay, packet loss, and throughput parameters according to the Quality of Service (QoS) parameters. ) SDN Kelet 2. From the results of this study it was found that the Queue Tree Method proved to have better and more stable connection stability because it uses a mangel system to mark each IP. Then the Simple Queue Method also has good connection stability, but it is still inferior to the Queue Tree method because if the client's ping time is full, there will be a packet loss which can cause a lot of wasted bandwidth.
Optimalisasi Dua Layanan Jaringan Internet Menggunakan Teknik Load Balancing dengan Metode Peer Connection Classifier (PCC) (Studi Kasus: Jaringan Internet Desa Banyuanyar Boyolali) Hafizh, Afrianton Noor; Sulistyo, Wiwin
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 8 No 1 (2024): JANUARY-MARCH 2024
Publisher : Lembaga Otonom Lembaga Informasi dan Riset Indonesia (KITA INFO dan RISET)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v8i1.1257

Abstract

Load Balancing is a technique for distributing data traffic so that the workload is distributed evenly on 2 or more networks to maximize resource usage and improve performance. There are two ISPs for internet access services to the Banyuanyar Village Office, Boyolali, both of which have different bandwidths, namely from PT. Telkom has 100Mbps bandwidth and Kominfo has 50Mbps bandwidth. So here there will be dense network traffic if the internet network is not optimized.. In this case, it can be optimized using load balancing techniques on both ISPs by using the Peer Connection Classifier technique to group traffic and divide the load on both internet connection lines so as not to overload. So it can be concluded that by adding a proxy router device, configuring load balancing, and applying a hierarchical network-based network topology, it will optimize two internet network services at Banyuanyar Village Hall, Boyolali.
Alat Keamanan Depan Rumah Berbasis Internet of Things (IoT) Menggunakan ESP32-CAM yang Terintegrasi dengan Face Detection dan Telegram Saputra, Christian Ferry Masyu; Sulistyo, Wiwin
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 8 No 1 (2024): JANUARY-MARCH 2024
Publisher : Lembaga Otonom Lembaga Informasi dan Riset Indonesia (KITA INFO dan RISET)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v8i1.1259

Abstract

Crimes that happen cannot be avoided when and how they will occur, as well as when at home. When the empty state is left away or when the occupants of the house are resting, usually many people do not realize and may not even know how to avoid mistakes when driving to maintain distance in order to avoid collisions and prevent crimes that can harm the occupants of the house both physically and materially. Based on the problems that occur, it is necessary to solve the problem in order to minimize the crime that occurs by making an Internet Of Thing-based home security tool using ESP32Cam and Telegram. The code application used in designing home security tools in this study is to use the Arduino IDE. Later the design tool in this study will use a Face Deection system that functions to detect faces which can later be very useful, which can detect faces in the home area in real-time as a warning sign through the telegram application whenever and wherever the home owner is as long as there is a gadget
ANALISIS KUALITAS SIGNAL WIRELESS MENGGUNAKAN RECEIVED SIGNAL STRENGTH INDICATOR (RSSI) DI SMP NEGERI 10 SALATIGA Maulana, Andrian; Sulistyo, Wiwin
IT Explore: Jurnal Penerapan Teknologi Informasi dan Komunikasi Vol 3 No 1 (2024): IT-Explore Februari 2024
Publisher : Fakultas Teknologi Informasi, Universitas Kristen Satya Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24246/itexplore.v3i1.2024.pp50-65

Abstract

Abstrak – Penelitian ini bertujuan untuk mengevaluasi signal wireless di SMP Negeri 10 Salatiga, dengan menggunakan Received Signal Strength Indicator (RSSI). Tujuan penelitian adalah untuk memahami distribusi kekuatan signal di sekitar lingkungan sekolah dan mengidentifikasi potensi perbaikan dalam infastruktur wireless. Metodologi melibatkan pengukuran RSSI pada lokasi strategis pengukuran nilai RSSI dilakukan dengan perhitungan otomatis menggunakan aplikasi Wi-Fi Analyzer, inSSIDer Home, dan Wi-Fi SNR. Perhitungan nilai RSSI juga dihitung dengan cara manual menggunakan rumus RSSI. Selain menghitung nilai RSSI juga ada Tahapan Interference Co-Channel dan pengukuran SNR kemudian data dianalisis untuk mengungkap pola dan variasi. Hasil penelitian menyoroti area dengan kekuatan signal rendah dan memberikan wawasan tentang efektivitas jaringan wireless. Temuan ini dapat mendukung perbaikan penempatan perangkat dan optimalisasi konektivitas. Kesimpulannya, penelitian ini memberikan kontribusi pada peningkatan pengalaman belajar berbasis teknologi informasi di SMP Negeri 10 Salatiga.
Perancangan Pengamanan Akun dengan Menggunakan Mac Address pada Metode Enkripsi DES Tambunan, Marihot Tora; Sulistyo, Wiwin
Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen Vol 8 No 1 (2018): Maret 2018
Publisher : STMIK Palangkaraya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (822.932 KB) | DOI: 10.33020/saintekom.v8i1.47

Abstract

Account security becomes very important as rapid development of internet and access. The case that was reported by Liputan6 about username and password stealing done by a hacker proves that sniffing exists in reality. One of encryption method, which can be used to secure an account’s user id and password, is DES. However, this algorithm is not always considered secure. Because of that, the researcher used mac address score for the authentication step during the log in process. It is done to cover flaw since DES encryption has been prone to be broken. The result of the examination shows that mac address is possible to be used during the authentication step. This model is also efficient to be used because the response duration is quiet quick, which is less than a second, even though the first trial would take some time and process to enter the system. This model can be used as server identifier to enable user to get login access by checking mac that has been exist in the user’s device.
Computer model for detecting tsunami wave hazard on built-up land using machine learning and sentinel 2A satellite imagery Joko Prasetyo, Sri Yulianto; Sulistyo, Wiwin; Christanto, Erwien; Hasiholan Simanjuntak, Bistok
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 2: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i2.pp1535-1546

Abstract

The aim of this research is to compile a tsunami wave hazard scale based on built-up land density extracted and classified by machine learning from Sentinel 2A satellite and digital elevation model (DEM) imageries. This research was carried out in 5 stages, namely: (i) pre-processing of Sentinel 2A and DEM images, (ii) Classification of VI data using the machine learning algorithms, (iii) Spatial prediction using the ordinary kriging method, (iv) Field testing using the confusion matrix method, (v) Preparation of decision matrix for tsunami wave hazard. The results of the study show that the most accurate classification algorithm for classifying built-up indices data is the k-nearest neighbor (k-NN) algorithm. The results of the statistical accuracy test show that the most accurate is normalized difference built-up index (NDBI) with a mean of square error (MSE) value of 0.073 and a mean of absolute error (MAE) of 0.003. DEM analysis shows that the research area is at an altitude of 0–15 meters above sea level so it is in the high vulnerability to medium vulnerability category. Field testing showed user accuracy of 91.11%, manufacturer accuracy of 92.16%, and overall average accuracy of 91%.
A machine learning-based computer model for the assessment of tsunami impact on built-up indices using 2A Sentinel imageries Joko Prasetyo, Sri Yulianto; Simanjuntak, Bistok Hasiholan; Susatyo, Yeremia Alfa; Sulistyo, Wiwin
Bulletin of Electrical Engineering and Informatics Vol 13, No 2: April 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i2.5910

Abstract

This study aims to build a computer model to detect built-up land in the identified tsunami hazard zone based on Sentinel 2A imagery using the normalized built up area index (NBI), urban index (UI), normalize difference build-up index (NDBI), a modified built-up index (MBI), index-based builtup index (IBI) algorithms, optimized with machine learning Random Forest (RF) and extreme gradient boosting (XGboost) algorithms and the spatial patterns are predicted using the ordinary kriging (OK) method. Testing of the accuracy of the classification and optimization results was performed using the Kohen Kappa and overall accuracy functions. The results of the study show that a built-up land consisting of open land and water, settlements, industry areas, and agriculture and tourism areas can be identified using the parameters of built-up indices. The accuracy testings that were performed using overall accuracy and Kohen Kappa methods show that classification and prediction are highly accurate using XGboost machine learning, namely 91%. This study produces a novelty of finding, namely a computer model to detect and predict the spatial distribution of built-up land in 4 scales, i.e., very low, low, high, and very high based on NBI, UI, NDBI, MBI, IBI data extracted from Sentinel 2A imagery.
SIEM (Security Information Event Management) Model for Malware Attack Detection Using Suricata and Evebox Hendra Setiawan; Wiwin Sulistyo
Jurnal Internasional Teknik, Teknologi dan Ilmu Pengetahuan Alam Vol 5 No 2 (2023): International Journal of Engineering, Technology and Natural Sciences
Publisher : Universitas Teknologi Yogyakarta, Yogyakarta, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46923/ijets.v5i2.241

Abstract

Malware or malicious software is software or program code specifically designed to damage software on a computer or perform malicious activities. Malware is spread over the internet and includes viruses and other forms of malware. Losses caused by malware can take the form of financial losses or disruptions to business processes. Prevention of malware attacks can be achieved by analyzing the malware to find out how it works and what its characteristics are. This information can be utilized to define an Indicator of Compromise (IOC), which is stored in a Cyber Threat Intelligence (CTI) system designed to be used as a source of information, such as the Intrusion Prevention System (IPS) Suricata. An Intrusion Detection System (IDS) can detect the presence of malware and can identify the same malware with the Signature Based Detection method. Furthermore, the database is stored by EveBox and organized to make it easier to read logs and alerts. All of these components are contained in the Security Information and Event Management (SIEM) model. The SIEM model can detect malware attacks based on their characteristics and store logs and alerts in real-time for deeper analysis by the Security Operations Center (SOC).