Claim Missing Document
Check
Articles

Perancangan dan Analisis Intrusion Prevention System Berbasis SNORT dan IPTABLES dengan Integrasi Honeypot pada Arsitektur Software Defined Network Barends, Julian Kevin; Dewanta, Favian; Karna, Nyoman Bogi Aditya
MULTINETICS Vol. 7 No. 2 (2021): MULTINETICS Nopember (2021)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v7i2.4276

Abstract

Software Defined Network is a network architecture that allows the network to be controlled centrally by separating the Control Plane and Data Plane making it easier from the operator's side to manage the network consistently, therefore SDN is believed to be able to replace the existing network which tends to be rigid. But despite the capabilities of the SDN, SDN security is still a major concern. In project, the design of an Snort and IPTables based IPS system that is integrated with the Honeypot system in the Software Defined Network network architecture will be carried out. IPS will detect attacks based on the applied rules and if there is an attack then IPS will give an alert to the Controller which then the Controller will check the database and divert the attack traffic to the Honeypot. The results shows that the accuracy rate is 99.87%, the average detection speed for Port Scanning, Ping of Death, ICMP Flood and TCP SYN Flood attacks are 1.207 s, 1.045 s, 1.047 s, and 1.101 s. While the QoS measurement shows that after the attack is transferred, there is an increase in the Throughput value and a decrease in the Packet Loss value.
Intelligent Interface for Knowledge Based System Nyoman Bogi Aditya Karna; Iping Supriana; Ulfa Maulidevi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 4: December 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i4.413

Abstract

Every Knowledge Based System has their own knowledge formalism depends on the problem to be solved, goal to be achieved, and proposed solution. This means every knowledge contained in the system will differ from one system to another. This was also meant that this knowledge cannot be used by other system, which in return makes every system must start with a learning phase from the start. One of the solutions to overcome this problem is by providing a unified model that can accept all type of knowledge which guarantees automatic interaction between Knowledge Based System. Interaction in this paper is defined as knowledge sharing, integration, and transfer from one system to another. This research provides the model and conducts the test on interaction capability. This research contributes for accelerating a new Knowledge Based System establishment because it does not need a knowledge initialization.
Security system with RFID control using E-KTP and internet of things Andi Ainun Najib; Rendy Munadi; Nyoman Bogi Aditya Karna
Bulletin of Electrical Engineering and Informatics Vol 10, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i3.2834

Abstract

Crimes against property without using violence, in this case, are theft and burglary is the type of crime that is most common every year. However, home security needs a security system that is more efficient and practical. To overcome this, an internet of things (IoT) is needed. This research evaluated the performance prototype by reading distance from the radio frequency identification (RFID) reader using E-KTP and quality of service performance (i.e throughput and delay) from application android. This research design smart door lock using RFID sensor, passive infrared sensor (PIR), solenoid as door locks, buzzer, led, E-KTP as RFID tags and also android application to controlling and monitoring made with android studio is connected to NodeMCU V3 ESP8266 as storage data and connect with firebase realtime database instead of conventional keys. This research focuses on performance prototype and quality of service from features application is work well. Related to previous works, our evaluation shows that the performance prototype can read identity card (E-KTP) with a maximum distance is 4 cm, and performance quality of service for an application show that throughput and delay with a perfect index according to standardization telecommunications and internet protocol harmonization over network (TIPHON) depending on what features are being evaluated.
ANALISIS PERBANDINGAN KINERJA TRANSPORT PROTOCOL PADA WIRELESS LAN DENGAN MENGGUNAKAN METODE DCF DAN DCF I Gusti Ngurah Dwi Mulyartha; Nurain Silalahi; Nyoman Bogi A. K.
TEKTRIKA Vol 8 No 2 (2003)
Publisher : Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/tektrika.v8i2.225

Abstract

EEE 802.11 adalah protokol standar yang digunakan pada wireless LAN dan memiliki Medium Access Control (MAC) layer yang mendukung pengiriman data tak sinkron (asynchronous) untuk jaringan wireless baik pada infrastructure network dan ad hoc network. MAC menggunakan dua metode akses yaitu Point Coordination Function (PCF) dan Distributed Coordination Function (DCF), dimana DCF dikembangkan menjadi DCF+. Penelitian ini mensimulasikan ad hoc Network menggunakan perangkat bantu Borland Delphi dan dari hasil simulasi dianalisa performansi dari MAC dengan membandingkan parameter Throughput, Delay, Goodput dan Fairness antara metode DCF dan DCF+.
INTERKONEKSI IPv6 DENGAN IPv4 MENGGUNAKAN DSTM (DUAL STACK TRANSITION MECHANISM) Dody Setiawan; R. Rumani M. R. Rumani M.; Nyoman Bogi A. K.
TEKTRIKA Vol 9 No 1 (2004)
Publisher : Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/tektrika.v9i1.235

Abstract

Dual Stack Transition Mechanism (DSTM) menyediakan metoda yang memungkinkan host IPv4 dapat berkomunikasi dengan host IPv6 dengan menggunakan IPv4-over-IPv6 Tunnel. Penelitian ini akan mempelajari mekanisme kerja, implementasi DSTM, serta pengujian kinerjanya. Hasil analisis menunjukkan peningkatan waktu tempuh paket pada proses pengiriman data melalui jaringan IPv6 ke IPv4 dan sebaliknya akibat proses enkapsulasi ataupun dekapsulasi datagram IP.Kata kunci: IPv4, IPv6, DSTM, Tunneling, IPv6 Tunnel Broker, Delay FTP, ping dan Iperf
Perancangan dan Implementasi Produk S-LUCY(Smart Light Ultimate Control By Website) Untuk Smart Switch Menggunakan Sensor PIR dan Sensor LDR Alifianti Mustika; Nyoman Bogi; Arif Indra Irawan
E-JOINT (Electronica and Electrical Journal Of Innovation Technology) Vol 3, No 1: E-JOINT, Juni 2022
Publisher : Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35970/e-joint.v1i3.1361

Abstract

Teknologi yang  efisien diharapkan mampu menjadi sistem kendali dan keamanan yang dapat meminimalisir terjadinya hal-hal yang tidak diinginkan pada rumah pribadi maka muncul ide untuk menggunakan alat S-LUCY Smart Switch yang merupakan alat yang berguna untuk mempermudah user untuk mengatur nyala atau matinya lampu secara otomatis dan manual. Penambahan sensor PIR dan sensor LDR yang ada bertujuan untuk mendeteksi keadaan lingkungan agar lampu bisa menyala otomatis sesuai dengan masukan dari sensor. Alat S-LUCY smart switch  ini mempunyai konsep Internet of Things (IoT), Dengan system ini, penggunaan lampu lebih efisien karena lampu akan menyala pada saat yang ditentukan. Dari hasil pengukuran, didapat bahwa smart switch bekerja secara efisien dengan pengujian fungsionalitas didapatkan bahwa lampu dapat menyala dalam beberapa kondisi, pengujian power supply didapatkan tegangan output cukup stabil dengan error 1,00% tanpa beban dan 0,20% dengan beban, pengujian sensor dilakukan pada sensor PIR yang menyatakan sensor dapat mendeteksi gerakan manusia dengan jarak kurang lebih sama dengan spesifikasi sensor yaitu 0-5 meter dan sensor LDR dengan perbandingan menggunakan lux meter menghasilkan error sebesar 2,10%, pengujian sistem manual dan otomatis yang sesuai dengan keadaan lingkungan, dan pengujian subjektif didapatkan rata-rata penggunaan smart switch sudah efisien
Purwarupa Sistem Otomasi Perawatan Tanaman Cabai Pada Smart Greenbox Berbasis Iot Ikram Andika Ukar; Nyoman Karna; I Putu Yowan Nugraha Suparta
Circuit: Jurnal Ilmiah Pendidikan Teknik Elektro Vol 6, No 2 (2022)
Publisher : PTE FTK UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22373/crc.v6i2.13874

Abstract

Recently, urban communities are interesting gardening as their hobby which can be done at home on narrow land. However, this hobby is faced with several problems, which most of them are workers and busy thus they could not care, monitor and control their plants. The presence of Internet of Things (IoT) technology is a major breakthrough for the problems that exist in society. With IoT, it is easier for people to remotely monitor and control their gardens anytime and anywhere. However, this study develops a prototype of an IoT-based plant watering automation system for chili plants in Greenbox. The design of the prototype is a Cartesian robot with X and Y axes. The prototype performs automatically success depending on the input value of soil moisture or soil pH from the sensor. The result of this research showed that the robot is success automatically watering or giving liquid fertilizer to the Smart Greenbox. The automation carried out by this robot of watering or cultivating based on input from the sensor results. The accuracy obtained from the prototype reached 95.53% for the X axis and 99.15% for the Y axis. The application of this prototype automation system was considered efficient in the using. Finally, the quality of the received data transmission shows good results.
Pengaruh Return On Asset, Sales Growth, Dan Financial Lease Terhadap Tax Avoidance (Studi Pada Perusahaan Manufaktur Sub Sektor Otomotif Yang Terdaftar Di BEI) Dewa Ayu Putu Rahyuni; Nyoman Karna
Journal of Economic, Bussines and Accounting (COSTING) Vol 6 No 2 (2023): COSTING : Journal of Economic, Bussines and Accounting
Publisher : Institut Penelitian Matematika, Komputer, Keperawatan, Pendidikan dan Ekonomi (IPM2KPE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31539/costing.v6i2.5180

Abstract

As the largest source of state revenue, government always seek to optimize tax revenue. However, on the other hand, taxpayers also trying to do tax planning to minimize their tax obligation. As example, several manufacturing companies applied tax planning schemes in the form of tax avoidance so as not to violate tax laws but able to minimize their tax. This research aims to analyse the factors that affect the tax avoidance including return on asset, sales growth, and financial lease in automotive manufacturing sub-sector listed in Indonesia Stock Exchange in 2010-2016 period. For the research method, this research uses quantitative method approach and the sampling technique used is purposive sampling technique. The sample in this research uses 30 manufacturing companies within 7 years period to obtain as many as 84 data. For data analysis, this research uses panel data regression approach using EViews 9.0 software. The study shows that return on asset, sales growth and financial lease have the influence to do tax avoidance practice of 25.774% and the other 74.226% is influenced by other variable outside this study. The analysis result shows that return on asset, sales growth and financial lease simultaneously influenced manufacturing companies to do tax avoidance. Partially, return on asset affects the manufacturing companies to do tax avoidance, while sales growth and financial lease does not. Keywords: Return On Asset, Sales Growth, Financial Lease, Tax Avoidance
Implementasi Dan Analisis Keamanan Jaringan Virtual Terhadap Serangan Dos Dan Ddos Dengan Menggunakan Hips Snort Riyo Surya Putra; Ratna Mayasari; Nyoman Bogi Aditya Karna
eProceedings of Engineering Vol 5, No 3 (2018): Desember 2018
Publisher : eProceedings of Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstrak Web server adalah perangkat yang memberikan layanan berbasis paket data kepada klien melalui protokol HyperText Transfer Protocol (HTTP). Protokol ini memberikan layanan berbagi informasi melalui World Wide Web (WWW) dimana klien akan meminta informasi dari suatu website dan web server akan memberikan informasi yang diminta. Berdasarkan data pengukuran yang dikeluarkan oleh McAfee Labs, selama tahun 2016 36% dari serangan di jaringan menyerang Web Server. Salah satu serangan yang digunakan adalah Denial of Service (DOS) yaitu serangan dengan satu Attacker dan Distributed Denial of Service (DDOS) yaitu serangan dengan lebih dari satu Attacker yang bertujuan untuk membuat layanan Server terganggu bahkan dapat merusak Hardware dari Server tersebut. Oleh karenanya banyak metode ditawarkan untuk menjaga layanan suatu web server agar tetap stabil, salah satunya adalah Host Intrusion Prevention System (HIPS). Kata kunci : Web Server, HIPS, DOS, DDOS, Snort dan TCP SYN Flood. Abstract Web server is a device that provides services based on packet data to the client via the HyperText Transfer Protocol (HTTP) protocol. This protocol provides information sharing services through the World Wide Web (WWW) where the client will request information from the website and the web server will provide the requested information. Based on measurement data released by McAfee Labs, during 2016 36% of attacks on the network invade Web Server. One of the attacks is a Denial of Service (DOS) attacking with one Attacker and Distributed Denial of Service (DDOS) attacking with more than one Attacker which aims to make Server services remain compromised and can even damage the Hardware from the Server. Because of the many ways offered to keep the web server stable, one of them is Host Intrusion Prevention System (HIPS). Keywords: Web Server, HIPS, DOS, DDOS, Snort and TCP SYN Flood
Layanan Pengembalian Buku Mandiri 24 Jam Pada Open Library Telkom University Yang Berbasis Rfid Muhammad Rizky Ramzani; Nyoman Bogi Aditya Karna; Ratna Mayasari
eProceedings of Engineering Vol 5, No 3 (2018): Desember 2018
Publisher : eProceedings of Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstrak RFID (Radio Frequency Indentification) adalah teknologi wireless yang digunakan untuk mentransformasi dunia komersial. Sebagai teknologi pengganti barcode, RFID dapat melakukan banyak hal. Diantaranya sistem RFID menawarkan peningkatan efisiensi dalam pengendalian diantaranya inventaris, dan logistik. Pada kasus ini penggunaan RFID digunakan untuk meningkatkan efisiensi peminjaman dan pengembalian buku khususnya layanan mandiri yang akan dimplementasikan pada Open Library Telkom University. Dimana saat ini Open Library Telkom University masih menggunakan sistem tradisional dan Beroperasi pada jam oprasional. Dengan timbulnya permasalahan yang di hadapi mahasiswa Telkom University tersebut penulis ingin merancang Layanan Pengembalian Buku Mandiri 24 Jam agar memudahkan mahasiswa untuk mengembalikan buku pinjamannya dengan tepat waktu, fleksibel dalam waktu pengembalian, dan minim tenaga kerja yang dibutuhkan. Dengan adanya layanan ini mahasiswa dapat mengembalikan buku pinjamannya kapan saja dan tanpa khawatir untuk membayar denda akibat keterlambatan pengembalian buku. Oleh sebab itu dibuat lah sebuah perancangan Box Layanan Pengembalian Buku Mandiri 24 Jam. Dimana dalam perancangan Box Layanan Pengembalian Buku Mandiri 24 Jam ini terdapat beberapa perangkat didalamnya seperti RFID reader, Arduino Uno, Database localhost, dan PC Desktop. Kata Kunci : Perpustakaan, RFID reader, Arduino Uno, Database Localhost, PC Desktop. Abstract RFID (Radio Frequency Identification) is a wireless technology used to transform the commercial world. As a barcode replacement technology, RFID can do many things. Among the RFID systems offer increased efficiency in control of the inventory, and logistics .In this case the use of RFID is used to improve the efficiency of borrowing and return of books, especially self-service that will be implemented in Open Library Telkom University. Where now Open Library Telkom University still use a traditional system and Operated on operational hour.With the emergence of problems faced by Telkom University students as an authors want to design 24 Hours Self Service Book Return to facilitate students to return the book loan on time, flexible in the time of return, and minimal labour required. With this service the student can return the loan book anytime and without worry about the compensation to return the book if it is late. Therefore it is a must to make a design of 24 hours Self Service Book Return Service.Where in the design of 24 hours Self Service Book Return Box there are several devices in it such as RFID reader, Arduino Uno, Database localHost, and PC Desktop. Keywords : Library, RFID reader, Arduino Uno, Database Localhost, PC Desktop.
Co-Authors Achmad Mustofa Luthfi Aditya Erawan Aghnia Shahibah Fadhlillah Ahmad Tri Hanuranto Ahmad, Fazruli Aini Aldina Ajisaka, Tito Aldi Putra Pangestu Alfariji, Rafli Noveri Alifianti Mustika Alifianti Mustika Tri Widodo Almyra Rosedyana Andi Ainun Najib Aprillia, Rizky Arfianto Fahmi Arief Fadillah Arif Indra Irawan Asep Mulyana Awany, Nizar Rizky Banurea, Jonathan Maxwel Perolihen Barends, Julian Kevin Boy Fernando Cita, I Wayan Risko Surya Danu Dwi Sanjoyo Deriel Laska Lubna Dewa Ayu Putu Rahyuni Dharu Arseno Dimas Surya Putra Dimas, I Gusti Ngurah Bagus Dody Setiawan Donny Rizky Pratama Elga Nurlaela Faizal, Muhammad Nur Farhan Bayu Rianto Favian Dewanta Firdiansyah, Muhammad Fajar Gede Agung Ary Wisudiawan Hasnah Faradina Nur Ilham Herlantika, I Kadek Andika Herman, Dhea Dearly I Gede Adysurya I Gusti Ngurah Dwi Mulyartha I Kadek Andrean Pramana Putra I Putu Yowan Nugraha Suparta Ibnu Ali Nur Safa Ikram Andika Ukar Iping Supriana Irwanda Kurniawan Kris Sujatmoko Krisna Rangga Pradhana Kusuma, Fani Candra Leanna Vidya M Fahmi Fahreza Noer M, Fajri Ismail Mario Putra Millendra Shandy Pratama Mochammad Rachmandani Muhamad Ihsan S Muhammad Ary Murti Muhammad Furqan Ramadani Muhammad Rasyad Mustafa Muhammad Rizki Utomo Muhammad Rizky Ramzani Nabil Hamdi Assidiqie Nadya Dwi Aulia Ni Putu Nurwita Pratami Wijaya Nimas Fatihah Nindithia Putri Windryani Nur Iftita Nurain Silalahi Nurkhaliz, Muh Nurwulan Fitriyanti Pandu Wira Sukma Pinky Devi Dama Istianti Putra, I Nyoman Ganeshan Ananda Putra, Made Adi Paramartha R. Rumani M. R. Rumani M. Raditiana Patmasari Rahman, Muhammad Firza Anfasa Ratna Mayasari Ratna Sari Rendy Munadi Richie A.W., ayan Ridha Muldina Negara Rika Yuliant Risfianda, Muhammad Risqi Riyo Surya Putra Rizqy Ilmi Naufal Salihima, Sulhan Syahli Samoedra, Kyanda Fardhan Samudra Dzikri Gifari Prasetyo Shafitri Nurhanifa Sitepu, Rio Ananta Sofia Naning Hertiana Sofia Naning Hertina Soo Young Shin Sri Astuti Sussi Taqwiim, Muhammad Ahsani Tia Rahmawati* Tiara Tiara Trisatya Krisnawan Ulfa Maulidevi Wijaya, Nigo Wisnu Wildan Maulana Yabes Handi Nugroho