p-Index From 2021 - 2026
6.381
P-Index
Claim Missing Document
Check
Articles

Vulnerability Analysis And Proven On The neonime.co Website using OWASP Zap 4 and XSpear Muhammad Alfarizi; Muhammad Najie K; Muhammad Afif H; Ilham Firman Ashari
JTKSI (Jurnal Teknologi Komputer dan Sistem Informasi) Vol 5, No 2 (2022): JTKSI (Jurnal Teknologi Komputer dan Sistem Informasi)
Publisher : STMIK Pringsewu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56327/jtksi.v5i2.1130

Abstract

Website or what is often also called Web, can be interpreted as a collection of a page that displays a type of text information, data, images. Computer network security is one of the most important and fundamental to the system. In using the web which is very easy to do, especially in reading such as comics and so on, it is necessary to anticipate security so that web applications can be protected from harassment or hacker attacks such as Cross-Site Scripting (XSS). This experiment was conducted to determine the vulnerability of the comic web application by means of a self-test using the ZAP and XSpear tools. This test is carried out to secure the application that is used as a follow-up recommendation in securing the Smart Payment application. The results of this experiment found a vulnerability in the comic reading web, namely neonime.co. The vulnerabilities found were Cross-Domain Misconfiguration, X-Frame-Options Header Not Set, Absence of Anti-CSRF Tokens, Cookie No HTTP Only Flag, Cookie without Same Site Attribute, Cross-Domain JavaScript Source File Inclusion, Incomplete or No Cache-control Header Set, Server Leaks Information via "X-Powered-By" HTTP ResponseHeader Field(s) and Timestamp Disclosure - Unix. In addition to obtaining vulnerabilities from the comic web application, solutions are also provided to overcome vulnerabilities in the Smart Payment application.
The Evaluation of Image Messages in MP3 Audio Steganography Using Modified Low-Bit Encoding Ilham Firman Ashari
Telematika Vol 14, No 2: August (2021)
Publisher : Universitas Amikom Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35671/telematika.v14i2.1031

Abstract

Information security is an important aspect of maintaining the confidentiality of information. One type of document kept secret is images (.jpg, .png, .gif, dan .bmp). MP3 audio files are popular audio files that can be used as a medium for steganography. The method implemented in this study uses Base64 in the image and the insertion method used is using Low-Bit Encoding (LBE). In this study, the parameters of the value of LBE will be evaluated. The purpose of the evaluation is to compare the LBE parameter parameters that are the most optimal in securing the message while taking into account the quality of steganographic files. The results obtained from the study are the proposed method that supports the imperceptibility aspect seen from the image histogram and audio frequency spectrum. The fidelity aspect is seen from the PSNR and SNR values, where The optimal value on the LBE + 2 parameter is by considering the capacity of the picture message that can be inserted and audio quality. PSNR LBE + 2 values range from 50-60 dB with SNR different about 0.01% from LBE + 1. The proposed method does not support the robustness aspect because it is not resistant to attacks by bit rate manipulation and channel mode. The test results on the recovery aspect are worth 100%, meaning that the image's quality and size before and after extraction will be the same. And finally, the test results on the payload aspect, there is an increase in message capacity with LBE + 2 around 12.5% of LBE + 1, and using LBE + 3 will increase the maximum size around 25% of LBE + 1 and about 14% of LBE + 2. The insertion and extraction time for LBE + 3 is slower compared to the others.
Implementasi Cyber-Physical-Social System berdasarkan Service Oriented Architecture pada Wisata Cerdas Ilham Firman Ashari
Journal of Applied Informatics and Computing Vol 4 No 1 (2020): Juli 2020
Publisher : Politeknik Negeri Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1074.219 KB) | DOI: 10.30871/jaic.v4i1.2077

Abstract

One of the biggest attractions in the tourism industry in Bandung is nature tourism. There is still such a constraint related to get information about nature tourism in Bandung because new attractions in Bandung always appear every year. This is felt particularly for foreign tourists outside of Bandung. Tourists are still confused to find new and popular tourist attractions, which are places that are worth visiting or not. By implementing Cyber-Physical-Social System (CPSS) with a new approach that is emphasized on social aspect in smart tourism based on Service Oriented Architecture (SOA) as methodology can influence other travelers to visit tourist attractions in Bandung. The main results are tourists will get information such as location, route, images, rating, captions of tourist attractions, and the most important thing is to be able to exchange information with others. Smart tourism is more flexible because it is web based and does not depend on the operating system used, does not require database storage, does not take up storage space, and is free. Tourists can access smart tourism anytime and anywhere.
Sistem Penjadawalan Satpam Menggunakan Algoritma Genetika dan Seleksi Tournament Ilham Firman Ashari; Ardi Gaya Manalu; Rahmat Setiawan; Mugi Praseptiawan; Dita Alviuni P; Sisilia Juli A
Journal of Applied Informatics and Computing Vol 5 No 2 (2021): December 2021
Publisher : Politeknik Negeri Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30871/jaic.v5i2.3464

Abstract

Institut Teknologi Sumatera (ITERA) is one of the new state universities on the island of Sumatra. ITERA has developed and has a large area and many buildings, of course it requires a lot of security guards to maintain security and order in the campus environment. The working hours of security guards at ITERA are from morning to night. ITERA is required to make a watch or shift schedule for security guards, where currently the scheduling is still done manually and has not been systemized automatically. Genetic Algorithm can be used in the scheduling process automatically and optimally by going through several stages. The result of the research is that the automatic scheduling system was successfully built, from the security data used as many as 16 data obtained scheduling from Monday to Sunday along with its working hours.
Application of Data Mining with the K-Means Clustering Method and Davies Bouldin Index for Grouping IMDB Movies Ilham Firman Ashari; Romantika Banjarnahor; Dede Rodhatul Farida; Sicilia Putri Aisyah; Anastasia Puteri Dewi; Nuril Humaya
Journal of Applied Informatics and Computing Vol 6 No 1 (2022): July 2022
Publisher : Politeknik Negeri Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30871/jaic.v6i1.3485

Abstract

Along with the development of technology, the film industry continues to increase, this can be seen from the number of films that appear both in cinemas and tv shows. The Internet Movie Database (IMDb) is a website that provides information about films from around the world, including the people involved in the films. Information contained on IMDB such as actor/actress, director, writer, to the soundtrack used. In addition, IMDb is the most popular and trusted source of information for movies, TV, and other celebrity content. In this case, the researcher will conduct research on the film with what title is the most popular among the public by looking at some of the parameters contained in IMDB such as the number on the rating, score, certificate, and votes obtained from the audience. The data used comes from the Kaggle.com website. The data mining method used is the K-Means clustering method. To find out the optimal cluster value, the Davies Bouldin index is used. The K-Means algorithm will group the data based on the centroid. The parameters used for clustering are runtime, IMDB rating, meta score, number of votes, and gross. The results of the study obtained that the average calculation of the highest attributes was 48.74 and the number of clusters formed was 4 clusters. The results of the evaluation using the confusion matrix obtained an accuracy value of 100%.
Parking System Optimization Based on IoT using Face and Vehicle Plat Recognition via Amazon Web Service and ESP-32 CAM Ilham Firman Ashari
Computer Engineering and Applications Journal Vol 11 No 2 (2022)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (864.157 KB) | DOI: 10.18495/comengapp.v11i2.409

Abstract

Today's technology has developed rapidly. One application of technology is in the parking lot. Most parking lots in Indonesia can already recognize the vehicle plate image, but it is hoped that it can be even better by applying Internet of Things (IoT) technology that is integrated with facial recognition images. One of the parking problems is in the parking lot at the Sumatran Institute of Technology, where checking is still done manually by security officers. This of course will take time and the level of security is also not good, because when you enter there is no checking. Checks are only carried out at the time of exit and the officer who checks is not necessarily the same and memorized as the owner of the vehicle. The addition of this facial image recognition feature is expected to increase the security of the parking system. Facial image recognition can be assisted by Cloud services from Amazon Image Recognition. With this service, no training data is required. The system developed is only a prototype. The developed parking system can recognize facial images and vehicle license plates with 2 cameras using the ESP32-Cam when entering and exiting the parking lot. The use of the ESP32-cam can recognize facial images both during the day and at night. The results obtained by the system can work effectively with an increase of 21 %.
Pengembangan Aplikasi Mobile Kolepa Berbasis Android Menggunakan Metode Agile Ilham Firman Ashari; M. Fazar Zuhdi; Muhammad Tyaz Gagaman; Siraz Tri Denira
Journal of Applied Informatics and Computing Vol 6 No 1 (2022): July 2022
Publisher : Politeknik Negeri Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30871/jaic.v6i1.3932

Abstract

Kolepa Minigolf and coffe shop is an instance which run on minigolf services also food and beverages. Kolepa wanted to develope a mobile apps that can be use for Kolepa Customer to check on existing promo and book a table to play. Kolepa Mobile Apps will be integrated with Kolepa database. Based on the interview between Project Manager and owner of Kolepa, there's some feature that must be included on the Mobile Apps, which is Authenticate, Promo, Reservation, and Score Counter. In its implementation, agile methods are applied for each of the functions mentioned above. Aplication will be develope using Dart Programming Languange, which is part of Flutter Framework. Application development is divided into several sprints that are developed with predetermined deadlines. From the results of the development that has been carried out, feature testing is carried out using the blackbox method and it is found that the application has met the functional and non-functional requirements that have been set. With this application, Kolepa can simplify the bussiness they run.
Sistem Kendali Tanaman Hidroponik dengan Internet of Things di Kelompok Tani Hidroponik Tulang Bawang Barat Andika Setiawan; Meida Cahyo Untoro; Mugi Praseptiawan; Aidil Afriansyah; Ilham Firman Ashari
Jurnal Pendidikan dan Konseling (JPDK) Vol. 4 No. 4 (2022): Jurnal Pendidikan dan Konseling
Publisher : Universitas Pahlawan Tuanku Tambusai

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (359.712 KB) | DOI: 10.31004/jpdk.v4i4.6094

Abstract

Cara untuk menanam tanaman dalam skala besar tanpa memerlukan lahan yang luas dan sangat cocok untuk dibudidayakan di daerah tiap daerah dapat dikatakan sebagai sistem hidroponik. Hidroponik membutuhkan lingkungan yang terkontrol untuk menghindari penurunan kualitas tanaman hingga layunya tanaman yang dapat berpengaruh terhadap gagal panen tanaman. Penggunaan alat ukur manual yang akan menyita banyak waktu pemilik yang memiliki kesibukan lain di luar budidaya, terlebih jika skala hidroponik yang dibudidaya cukup besar. Maka dari itu diperlukan solusi untuk memantau kondisi tanaman hidroponik dan kontrol secara otomatis sehingga dapat mengurangi risiko tanaman layu dan rusak, selain itu agar diperoleh hasil budidaya yang maksimal sesuai kondisi yang diharapkan. Konasep yang dirancang adala tanaman hidroponik akan dipasangi mikrokontroler yang terhubung ke internet akan mengirim data mengenai kondisi air ke aplikasi smartphone Android secara realtime melalu protokol Internet of Things (IoT). Selain itu akan dikembangkan sistem kontrol manual dan otomatis untuk mengontrol asuhu, pH dan ketinggian air, dan nutrisi agar sesuai dengan kondisi yang optimal bagi tanaman.
Analysis and Implementation of Augmented Reality Using Markerless and A-Star Algorithm (Case Study: Gedung Kuliah Umum ITERA) Ilham Firman Ashari
Computer Engineering and Applications Journal Vol 11 No 3 (2022)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (923.286 KB) | DOI: 10.18495/comengapp.v11i3.414

Abstract

Institut Teknologi Sumatera is a public university in the province of Lampung. Institut Teknologi Sumatera (ITERA) has many buildings, including Gedung Kuliah Umum (GKU). GKU is the largest and widest lecture building in ITERA. GKU has four floors, where each floor has many rooms in it with different functions in each room. As the largest building in ITERA, GKU is often used for various events, including CPNS exams, new student admissions, or for visits from other campuses. Due to the size of this building, this allows visitors from outside ITERA to GKU to experience problems in terms of time to ask questions and difficulty finding various spaces in the GKU Building. This research uses Augmented Reality technology to help make it easier for visitors from outside ITERA to find space quickly and precisely. In its development using several tools, including the ARWaKit SDK. This framework is used on devices with the IoS operating system. In its implementation, it requires a camera on a smartphone to capture existing images and convert them into cyberspace. In the ARWayKit framework, Azure Spatial Anchors have been used which can be used to carry out the mapping process as a markerless method and to optimize the distance from the user's position to the destination location, the a-star algorithm is used. The results obtained from the Variation-2 test were 91.6%.
Analysis of Cross Site Request Forgery (CSRF) Attacks on West Lampung Regency Websites Using OWASP ZAP Tools Ilham Firman Ashari; Vina Oktarina; Ringgo Galih Sadewo; Salman Damanhuri
Jurnal Sisfokom (Sistem Informasi dan Komputer) Vol 11, No 2 (2022): JULI
Publisher : ISB Atma Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32736/sisfokom.v11i2.1393

Abstract

Technological developments in the field of increasingly advanced computers and networks have caused many organizations to use web applications to provide business services. With the increasing popularity of the internet, the number of cyber-attacks has also increased. To overcome these negative impacts, the role of network security is very necessary. The Cross Site Request Forgery (CSRF) method is a penetration technique aimed at exploiting website security vulnerabilities and there is one tool commonly used to find security vulnerabilities on websites, namely OWASP ZAP. The research has succeeded in proving security vulnerabilities on the website of the West Lampung district by conducting attack simulations. From the results of the experiment, it was found that there were 12 alerts with low risk on the website of West Lampung Regency. In 12 alerts there are 53 URL pages that are vulnerable to attack.
Co-Authors Achmad Syafriyal Adinda Sekar Tanjung Adrian Putradinata, Gusti Made Afriansyah, Aidil Agustine, Verlina Ahmad Auzan Varian Syahputra Aidil Afriansya Aidil Afriasnyah Ajrina, Fadiah Izzah Akbar, Alvijar Algifari, Muhammad Habib Alkarkhi, Makruf Anastasia Puteri Dewi Andhika Wibawa Bhagaskara Andika Setiawa Andika Setiawan Andre Febrianto Andrianto, Dodi Devrian Ardhi, Alief Moehamad Ardi Gaya Manalu Arimbi Ayuningtyas Arre Pangestu Aryani, Annisa Jufe Azwarman Azwarman Baraku, Randi Clinton, Martin Daniel Rinald Dede Rodhatul Farida Dita Alviuni P Dwi Nugroho, Eko Eka Nur'azmi Yunira Eko Dwi Nugroho Eko Dwi Nugroho Eko Dwi Nugroho Fadhillah A Fikri Halim Ch Filiana, Edinia Rosa Fil’aini, Raizummi Gunawan, Rayhan Fatih Hendri Tri Putra Idris, Mohamad Jaya Megelar Cakrawarty Laisya, Nashwa Putri Leonard Rizta Anugrah P Liwardana, Ridho Londata, Hafizh M. Daffa M. Fazar Zuhdi Majesty, Achmad Bany Marbun, Rustian Afencius Mastuti Widianingsih, Mastuti Muhammad Abdul Mubdi Bindar Muhammad Affandi Muhammad Afif H Muhammad Alfarizi Muhammad Najie K Muhammad Rizky Hikmatullah Muhammad Telaga Nur Muhammad Tyaz Gagaman Muhammad Yusuf Nashrullah, Muhammad Nazla Andintya W Nela Agustin Kurnianingsih Novri Yanda, Ilham Nur'azmi, Eka Nurhayati, Misfallah Nuril Humaya Perdana Raga Winata Praseptiawan, Mugi Prasetyawan, Purwono Radhinka Bagaskara Rahmat Setiawan Raidah Hanifah Raidah Hanifah Revangga, Dwi Arthur Ringgo Galih Sadewo Romantika Banjarnahor Salman Damanhuri Samsu Bahri Satria, Mahesa Darma Sekar A Sianturi, Elsa Elisa Yohana Sicilia Putri Aisyah Sinaga, Nydia Renli Sinaga, Rutlima Siraz Tri Denira Siregar, Abu Bakar Siddiq Sisilia Juli A Siwi, lkhsanudin Raka soleha, Ayu Sophia Nouriska Syamsyarief Baqaruzi Untoro, Meida Cahyo Utoro, Meida Cahyo Vanesa Adhelia Vebriyanto, Mario Verdiana, Miranti Verlina Agustine Vina Oktarina Wicaksono, Ihtiandiko Winda Yulita Yulita, Winda Yunira, Eka Nur'azmi Yusuf, M. Asyroful Nur Maulana