Claim Missing Document
Check
Articles

Found 26 Documents
Search
Journal : Jurnal Jarkom

IMPLEMENTASI METODE INTERNET SEHAT PADA JARINGAN KOMPUTER WIRELESS DI MASJID AL AMIN BERBAH Hariman, Isa; Sholeh, Mohammad; Iswahyudi, Catur
Jurnal Jarkom Vol 1, No 1 (2013): Edisi Desember 2013
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT The development of computer network technology growing rapidly in line with the needs of the community information service that uses computer networks. The need for the use of the Internet in society based so that all parts of society in Indonesia has knowledge of information technology. The mosque is used as a medium for the spread of the Internet due to the expected future output of the deployment of information technology knowledge will be of good content and useful to society. By using this method as a way to surf the internet sound is good and right that will be implemented into the wireless computer networks in the mosque. Healthy internet methods are implemented on the wireless computer networks using a proxy server that will be implemented some security configuration that is OpenDNS, Squid, IPTables and Dansguardian. From the security configuration is tested one at a time by accessing the content of some categories of negative examples to test the efficacy in blocking sites or negative content from the proxy server before. From the research, the combination of multiple security configurations will be selected based on the advantages and disadvantages that will be used so the proxy server. From the entire configuration will be secure wireless computer networks in the mosque Al Amin Berbah. The implementation of the method on a healthy internet wireless computer network at the mosque will produce a safe way to surf from all negative content. Users can surf the internet without being distracted by negative content. Keywords: Healthy Internet, Proxy Server, Mosque.
IMPLEMENTASI INTRUSION DETECTION SYSTEM (IDS) PADA SERVER DEBIAN MENGGUNAKAN JEJARING SOSIAL SEBAGAI MEDIA NOTIFIKASI Budiman, Sahid Aris; Iswahyudi, Catur; Sholeh, Mohammad
Jurnal Jarkom Vol 2, No 1 (2014): EDISI DESEMBER 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTIntrusion Detection System (IDS) is a software that can detect suspicious activity in a system or network . IDS can inspect inbound and outbound traffic in a system or network, analyzing and searching for evidence of trial intrusion. Implementation of IDS on the server using social networking (facebook, twitter, and whatsapp) as notification media makes it easy for administrators identifying infiltration attempt by parties who are not responsible. Social networking on a system is built to serves to provide notifications to administrators as soon as possible when an attack occurred on the server. A message sent contains the IP address of hosts are detected by the system. Client later attacks by IDS snort stored into a MySQL database , at the same time in automatic trigger will run iptables already defined and send notifications to social networks based on the type of attack that performed by the intruder. Based on the test, the system is capable to processing output data from Snort IDS and it can also recognize all activities conducted an intruder in attempt to infiltrate into the system by using the ping flood, syn attack, port scanner, the SSH and FTP based on rules has been applied. Then do the blocking of IP addresses that are considered as intruder after that the system will provide a report to the administrator through social media and web monitoring of the presence of an intruder who trying to get into the system.Keywords: IDS, snort, social networking
ANALISIS DAN PERANCANGAN VLAN PADA DISHUBKOMINFO KABUPATEN MANGGARAI MENGGUNAKAN CISCO PACKET TRACER Pantu, Yosefina; Iswahyudi, Catur; k, Rr. Yuliana Rachmawati
Jurnal Jarkom Vol 2, No 1 (2014): EDISI DESEMBER 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT       Department of Transportation, Communication and Information of Manggarai Regency, is one of the instance of Regional Government of Manggarai, NTT, which is responsible to help the Head of Region concerning transportation, communication and information affairs. The lackness of human resources which was competent in computer networking, the high cost of VSAT IP Broadband internet service and maintenance cost of network’s backbone which is wireless based, have been becoming a problem to the Department concerning their main duties. As an impact, it is necessary to the Department to change their network’s backbone to wired network based, using VLAN. VLAN can divide network into several segments with low cost implementation. The using of VLAN Trunking Protocol (VTP) will ease the network administrator in managing VLAN.            The VLAN design in this study used hierarchical model. The logical layer for data distributing was divided into two layers, core/distribution and access layer. Routing between VLANs used “router-on-a-stick using trunk” model, so that the workstations which were owned by different VLAN can communicate each other by using one router only. By using simulation method for testing the design, it was discovered that all workstations between different VLAN have been successfully connected each other and all servers were well-functioned.   Key words : VLAN, VTP,  hierarchical, router-on-a-stick using trunk
IMPLEMENTASI METODE INTERNET SEHAT PADA JARINGAN KOMPUTER WIRELESS DI MASJID AL AMIN BERBAH Hariman, Isa; Sholeh, Mohammad; Iswahyudi, Catur
Jurnal Jarkom Vol 1, No 1 (2013): Edisi Desember 2013
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT The development of computer network technology growing rapidly in line with the needs of the community information service that uses computer networks. The need for the use of the Internet in society based so that all parts of society in Indonesia has knowledge of information technology. The mosque is used as a medium for the spread of the Internet due to the expected future output of the deployment of information technology knowledge will be of good content and useful to society. By using this method as a way to surf the internet sound is good and right that will be implemented into the wireless computer networks in the mosque. Healthy internet methods are implemented on the wireless computer networks using a proxy server that will be implemented some security configuration that is OpenDNS, Squid, IPTables and Dansguardian. From the security configuration is tested one at a time by accessing the content of some categories of negative examples to test the efficacy in blocking sites or negative content from the proxy server before. From the research, the combination of multiple security configurations will be selected based on the advantages and disadvantages that will be used so the proxy server. From the entire configuration will be secure wireless computer networks in the mosque Al Amin Berbah. The implementation of the method on a healthy internet wireless computer network at the mosque will produce a safe way to surf from all negative content. Users can surf the internet without being distracted by negative content. Keywords: Healthy Internet, Proxy Server, Mosque. 
MEMBANGUN SISTEM MANAJEMEN PERGUDANGAN MENGGUNAKAN ARSITEKTUR THREE-TIER ., Anggreawan; Hamzah, Amir; Iswahyudi, Catur
Jurnal Jarkom Vol 3, No 1 (2015): Desember 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT               Three-tier architecture is an innovation of client server architecture. In the three-tier architecture, there are services presentation or user interface logic is placed on the client machine. Issued on the business logic and the client code is placed in the middle level. Data services layer contains the database server. Each level in the three-tier models are on a separate computer. Three-tier model concept is a concept that divides functionality into layers, applications gain scalability, and security. Currently the system at PT. Ungaran Sari Garment has been computerized in handling the transaction flow of goods in and out. However, the application still has the disadvantage that the application can only be used by a single computer (stand alone) and standard office without any database and system well. With the advantages of three-tier architecture, then build warehouse management system using three-tier architecture to assist in arranging entry and exit of goods to the warehouse, making the system more efficient in terms of use. Results from this study is the implementation of the warehousing system with three-tier architecture using SQLyog as its database can be used to input data entry and exit of goods to the warehouse, checking periodically warehousing reports in accordance with the functionality of each admin. By using a three-tier architecture as not to burden-sharing functionality on the server side and the client, because can use any computer that has been given permission by the server and are interconnected by a network. On the client side is only installation any web browser Keywords : Warehouse management system, Website, Client server, Three-tier.
TEKNOLOGI 4G PADA JARINGAN GSM UNTUK KEBUTUHAN MOBILE INTERNET DI KOTA YOGYAKARTA Santoso, Bambang Wahyu; Iswahyudi, Catur; Triyono, Joko
Jurnal Jarkom Vol 3, No 1 (2015): Desember 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

AbstractThe rise of 4G LTE networks with all the benefits can promise super-fast mobile data communications. Currently  in Yogyakarta has been present 4G LTE technology that can be enjoyed by a few people, it is certainly affected by 4G device such a sim card 4G different sim cards 3G, data packets are used, a mobile device that supports 4G technology, as well as the area of coverage signal 4G uneven, to the area of signal coverage 4G in Yogyakarta city can be seen on the website of the network operator Indosat, and XL with coverage in the form of network points, but what about the location of base stations 4G on each network operator gsm, as well as the results of field testing on 4G signal quality in Yogyakarta.  Surely this is a question of its own for some parties, who want speed internet at a faster devices using 4G signal.To answer these questions do research on signal quality 4G in Yogyakarta. With this research is expected that people who want to enjoy the services of 4G technology can determine the location of the nearest 4G base stations, the maximum distance 4G signal, optimal distance to be able to enjoy 4G services. and people can also knew the distribution pattern 4G signal in Yogyakarta city. Keywords: 4G, GSM, 4G base stations, Mobile Internet, Yogyakarta.
ANALISIS DAN PERANCANGAN VLAN PADA DISHUBKOMINFO KABUPATEN MANGGARAI MENGGUNAKAN CISCO PACKET TRACER Pantu, Yosefina; Iswahyudi, Catur; Rachmawati, Rr. Yuliana
Jurnal Jarkom Vol 3, No 1 (2015): Desember 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT       Department of Transportation, Communication and Information of Manggarai Regency, is one of the instance of Regional Government of Manggarai, NTT, which is responsible to help the Head of Region concerning transportation, communication and information affairs. The lackness of human resources which was competent in computer networking, the high cost of VSAT IP Broadband internet service and maintenance cost of network’s backbone which is wireless based, have been becoming a problem to the Department concerning their main duties. As an impact, it is necessary to the Department to change their network’s backbone to wired network based, using VLAN. VLAN can divide network into several segments with low cost implementation. The using of VLAN Trunking Protocol (VTP) will ease the network administrator in managing VLAN.            The VLAN design in this study used hierarchical model. The logical layer for data distributing was divided into two layers, core/distribution and access layer. Routing between VLANs used “router-on-a-stick using trunk” model, so that the workstations which were owned by different VLAN can communicate each other by using one router only. By using simulation method for testing the design, it was discovered that all workstations between different VLAN have been successfully connected each other and all servers were well-functioned.   Key words : VLAN, VTP,  hierarchical, router-on-a-stick using trunk
PENGUJIAN CELAH KEAMANAN APLIKASI BERBASIS WEB MENGGUNAKAN TEKNIK PENETRATION TESTING DAN DAST (DYNAMIC APPLICATION SECURITY TESTING) Wicaksono, Bagus; Kusumaningsih, Rr. Yuliana Rachmawati; Iswahyudi, Catur
Jurnal Jarkom Vol 8 No 1 (2020): Juni 2020
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Globalisasi ditandai dengan kemajuan di bidang teknologi, informasi dan komunikasi. Sistem pengelolaan informasi yang transparan dan memiliki fitur keamanan tinggi menjadi suatu kebutuhan bagi perusahaan dan organisasi. Kejahatan siber semakin berkembang seiring dengan arus globalisasi di bidang teknologi yang juga kian meningkat. Kejahatan siber banyak ditemukan pada kasus penyerangan situs web untuk mendapatkan data penting pada situs web. Ancaman kejahatan siber berasal dari malware, supply chain attact, hingga ransomware. Penelitian ini bertujuan untuk mengetahui celah keamanan pada situs web, dengan metode Penetration Test dan Dynamic Application Security Testing (DAST). Celah keamanan yang diuji khususnya Broken Access Control, Cross Site Scripting (XSS), dan Sql Injection, dan kemudian dilakukan upaya perbaikan pada situs web. Hasil pegujian menunjukkan celah keamanan Broken Access Control dapat dicegah dengan membuat kode (id) yang sulit untuk ditebak, XSS dapat dicegah ketika user memasukkan inputan syntax javascript dengan mengkonversi data ke entitas karakter, dan Sql Injection dapat dicegah dengan menggunakan enscape() pada saat pencarian basisdata.
PERANCANGAN WiFi MULTIPLE SSID DENGAN VIRTUAL ACCESS POINT (VAP) MENGGUNAKAN MIKROTIK Kurniati, Devi; Iswahyudi, Catur; Raharjo, Suwanto
Jurnal Jarkom Vol 8 No 1 (2020): Juni 2020
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Gedung baru Kampus III IST AKPRIND terdiri dari 5 lantai dengan 30 ruangan yang digunakan untuk kegiatan administrasi dan perkuliahan memerlukan akses jaringan dan internet untuk layanan administrasi dan akademik. Masalah yang dihadapi ketika membangun jaringan nirkabel adalah diperlukan banyak Access Point (AP) untuk menjangkau seluruh ruangan di gedung tersebut. Untuk menghemat jumlah AP, maka digunakan Virtual Access Point (VAP). Penelitian ini bertujuan untuk mengimplementasikan VAP dalam perancangan jaringan nirkabel di gedung baru Kampus III IST AKPRIND, yang disertai pula dengan manajemen bandwidth. VAP merupakan sebuah fitur pada Router Mikrotik, yang digunakan untuk membuat lebih dari 1 SSID dengan menggunakan 1 antarmuka nirkabel fisik. Dengan begitu kita bisa memiliki beberapa SSID yang berbeda dan memiliki layanan yang berbeda pula. Hasil pengujian jaringan Multiple SSID untuk setiap user Mahasiswa yang melakukan login hotspot akan mendapatkan bandwidth sebesar 512KBps untuk AP Fisik. Sedangkan bandwidth yang diberikan untuk VAP sebesar 4MB dibagi rata sebanyak user yang terhubung ke jaringan. Hasil perbandingan kinerja AP fisik dan virtual menunjukkan bahwa kinerja jaringan fisik lebih bagus dibandingkan dengan kinerja VAP.
SIMULASI PERBANDINGAN LOAD BALANCING DENGAN METODE PCC, ECMP, DAN NTH MENGGUNAKAN GNS3 Reza Pakiding; Catur Iswahyudi; Renna Yanwastika Ariyana
Jurnal Jarkom Vol. 9 No. 1: Juni 2021
Publisher : Program Studi Informatika, Fakultas Sains dan Teknologi Informasi, Universitas AKPRIND Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Load balancing merupakan salah satu upaya untuk memaksimalkan kualitas jaringan. Dengan diterapkannya load balancing dalam suatu jaringan maka traffic akan berjalan optimal, throughput dapat maksimal, memperkecil waktu tanggap dan menghindari overload pada salah satu jalur koneksi. Penelitian ini membahas perbandingan kinerja load balancing dengan metode Per Connection Classifer (PCC), Equal Cost Multi Path (ECMP) dan Nth menggunakan aplikasi simulasi GNS3 dengan sistem oprasi MikrotikOS dalam implementasinya. Penelitian menggunakan studi kasus topologi jaringan Kampus Institut Sains dan Teknologi AKPRIND Yogyakarta. Penelitian diterapkan dengan melakukan konfigurasi pada masing-masing metode kemudian dilakukan pengujian Quality of Service dengan parameter delay, jitter, packet loss, throughput, pengujian pembagian jalur traffic dan pengujian beban CPU Load pada sisi router. Hasil penelitian berupa perbandingan kualitas jaringan berdasarkan pengujian yang digunakan dengan hasil pengujian Quality of Service parameter delay, jitter, packet loss dan throughput metode PCC mendapat nilai lebih baik diantra metode lainnya, pada pengujian CPU Load metode Nth lebih baik diantara metode lainnya dengan nilai CPU Load mencapai 32%, metode ECMP 34% dan metode PCC 61%. Pada pengujian pembagian traffic metode PCC dan Nth dapat melakukan pembagian traffic secara merata melalui kedua sumber internet sedangkan metode ECMP hanya menggunakan salah satu jalur ketika melakukan aktifitas.
Co-Authors -, Cahyana -, Suraya Agradira Dwi Wahyuda Agung purnomo Ahmad Hanafi Amir Hamzah Amran Syahrul Iriawan Putra Amrullah, Yusuf Amri Andri Harsono Andri Harsono, Andri Anggreawan - Anggreawan ., Anggreawan Aris Wahyu Murdiyanto Ariyana, Renna Yanwastika Bagus Wicaksono Bambang Wahyu Santoso Bambang Wahyu Santoso, Bambang Wahyu beny firman, beny Cyrilla Indri Parwati Dedi Setiawan Edhy Sutanta (Jurusan Teknik Informatika IST AKPRIND Yogyakarta) Eko Darmanto eko tresno prabowo Ema Utami Emy Setyaningsih Erfanti Fatkhiyah Erna Kumalasari Nurnawati Erna Kumalasari Nurnawati Fadly Isnureza Sarwadyanto Fina Febrianti Gardyas Bidari Adninda Hadi Prasetyo Suseno Hariyanto, Satriawan Dini Hary Wibowo Hendra Septian Isa Hariman Iwan Risgianto Joko Triyono Joko Triyono JULIANTO Julianto Kartika Indayani Kurniati, Devi Kusumaningsih, Rr. Yuliana Rachmawati La Ode Malik Hasan Laksono Trisnantoro Luthfia Wilaksono, Nurina Ivana M Yusuf Ali Fiqri M. Andang Novianta, M. Andang Mohammad Sholeh Mufid Wahyuaji Muhammad Andang Novianta Muhammad Andang Novianta Muhammad Puguh Pamungkas Muhammad Rosyid MUHAMMAD SHOLEH Naniek Widyastuti Naniek Widyastuti Noviana Pratiwi Noviana Pratiwi, Noviana Nurcahyo, Raden Wisnu P.Aji, Galih Tegar Pamuji, Septi Ade Pratama, Nanda Adi Prita Haryani Purnawan Purnawan Purnawan Purnawan Purnawan Ragusta, Yuda Reza Pakiding Rizki Pratama Rizkyka Angellia Rizqi Aji Nugroho Rosalia Arum Kumalasanti Rosid, Ibnu Abdul Rr Yuliana Rachmawati K Rr Yuliana Rachmawati Kusumaningsih RR. Yuliana Rachmawati Rr. Yuliana Rachmawati k, Rr. Yuliana Rachmawati Rr. Yuliana Rachmawati, Rr. Yuliana Rr.Yuliana Rachamawati, Rr.Yuliana Rusyda, Annisa Rizka Alhimna Sahid Aris Budiman, Sahid Aris Samuel Kristiyana Sholeh, Muhammad Sigit Iskandar Sigit Iskandar, Sigit Sisilia Endah Lestari, Sisilia Endah Suparni Setyowati Rahayu Suwanto Raharjo Taufik Hidayat Tomas Antonio Correia Freitas, Tomas Antonio Correia Toto Rusianto Tri Anto Tri Mulyadin Triyono, Joko Uning Lestari Uning Lestari Utami, Ema Utami Utomo, Ariyadi Dwi Wahyu Widianto Witri Anik Witri Anik, Witri Yosefina Pantu Yosefina Pantu, Yosefina Yunis Aprilianti Zulfikar .L, Fauzul Rachman