Claim Missing Document
Check
Articles

Found 19 Documents
Search

Implementasi Intrusion Prevention System (IPS) Menggunakan Suricata Untuk Serangan SQL Injection Faula Tanang Anugrah; Syariful Ikhwan; Jafaruddin Gusti A.G
Techné : Jurnal Ilmiah Elektroteknika Vol. 21 No. 2 (2022)
Publisher : Fakultas Teknik Elektronika dan Komputer Universitas Kristen Satya Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31358/techne.v21i2.320

Abstract

Intrusion Prevention System (IPS) merupakan salah satu tool pengamanan pada jaringan. Pada penelitian ini Suricata sebagai IPS untuk melindungi webserver dari serangan SQL Injection menggunakan SQLMap dengan melihat efektifitas rules dan parameter response time. Penelitian ini dilakukan di dalam sebuah Laboratorium fakultas dengan menggunakan topologi jaringan LAN yang di setting static. Suricata sebagai tool IPS terinstal pada PC yang berfungsi sebagai router sekaligus server IPS. Normal user dan attacker menggunakan sistem operasi Windows 10 sedangkan webserver dan server IPS menggunakan sistem operasi Ubuntu 20.04. Pengujian sistem keamanan dilakukan dengan menggunakan dua skenario yaitu skenario pertama ketika suricata non aktif dan skenario kedua ketika suricata aktif. Pengujian response time untuk semua skenario dilakukan sebanyak 30 kali selama serangan SQL Injection berlangsung. Hasil dari pengujian tersebut menunjukkan nilai rata-rata saat Suricata aktif 4,260633 milliseconds sedangkan ketika Suricata non-aktif 3,100033 milliseconds. Suricata pada penelitian ini berhasil berperan sebagai IPS yang bekerja setiap terjadinya serangan SQL Injection akan dideteksi oleh Suricata dengan melakukan pengecekan kecocokan paket terhadap signature rules. Rules yang dinilai efektif untuk menghadapi serangan sql Injection adalah rules yang menggunakan beberapa kode ASCII sebagai kata kuncinya. Server IPS ketika suricata aktif membutuhkan waktu yang lebih lama untuk menanggapi suatu paket.
Implementasi Intrusion Prevention System (IPS) Pada Software Defined Network (SDN) Menggunakan RYU Controller Bongga Arifwidodo; Bima Setiyadi; Syariful Ikhwan
Jurnal ICT: Information Communication & Technology Vol. 22 No. 1 (2022): JICT-IKMI, Juli 2022
Publisher : LPPM STMIK IKMI Cirebon

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

SDN is a technology that separates the control plane and the data plane. The control plane is used to configure network devices using the SDN controller, while the data plane is used to forward information packets. The controller is the main control for the network and is centralized, if this part is successfully attacked then the entire network can be taken over. If SDN resources are attacked with Denial of Service, SYN Flooding will consume network resources, causing the SDN controller to be unable to serve SDN network user requests. One of the efforts to overcome this problem is to use an IPS security system because it can prevent DoS attacks by using the snort application to block attacks in real time. The tests carried out tested the performance of QoS parameters with a DoS SYN Flood attack. The results of this study are the implementation of the use of IPS proved to be effective in detecting and blocking Denial of Service attacks so as to improve the quality of the security system on the SDN network. The QoS throughput value before the attack had an average of 22.536 Gb/s, during an attack it was 14,163 Gb/s, while blocking was 14.926 Gb/s, inversely proportional to the very small latency of 0.1ms in each condition. CPU usage performance during SYN Flood attacks and IPS system blocking is almost 100%, in line with high CPU usage conditions of 18% when the IPS system is active to block attacks.
Pengimplementasian Learning Management System (LMS) untuk Membantu Pembelajaran Daring di SMA IT Al-Irsyad Al-Islamiyyah Purwokerto irmayatul hikmah; Raditya Artha Rochmanto; Muhammad Yusro; Nurlaili Nurlaili; Indah Permatasari; Syariful Ikhwan
Indonesian Journal of Community Service and Innovation (IJCOSIN) Vol 2 No 1 (2022): Januari 2022
Publisher : LPPM IT Telkom Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (429.375 KB) | DOI: 10.20895/ijcosin.v2i1.378

Abstract

Perkembangan Information and Communication Technology (ICT) membuat proses belajar mengajar dapat dilaksanakan di mana saja dan kapan saja dengan menggunakan Learning Management System (LMS). Penggunaan LMS di Indonesia saat ini masih didominasi di tingkat perguruan tinggi termasuk di Purwokerto. Salah satu lembaga pendidikan tingkat menengah di Purwokerto yang belum dapat menerapkan LMS adalah SMA IT Al Irsyad Al Islamiyah Purwokerto. Hambatan yang ditemui di SMA ini adalah masalah teknis untuk pemasangan aplikasi dan banyak staf pengajar yang belum mengetahui tentang penggunaan LMS. Salah satu media LMS saat ini yang banyak digunakan adalah moddle yang diharapkan dapat diterapkan di sekolah ini. Melalui program pengabdian masyarakat, telah diberikan pendampingan teknis mulai dari instalasi hingga penerapan moddle dan pelatihan mengenai penggunaan fitur-fitur di moddle. Berdasarkan hasil survey didapatkan bahwa rata-rata tingkat keefektifan penggunaan LMS ini adalah 8,03 (skala 10) dengan poin keefektifan tertinggi sebesar 8,61 untuk variasi aktivitas LMS untuk membantu dalam menyampaikan pembelajaran kepada siswa sementara itu poin terendah sebesar 7,50 berkaitan dengan kemudahan dalam tahapan membuat aktivitas pada LMS.
Analisis Jaringan VPN Menggunakan PPTP dan L2TP Syariful Ikhwan; Ahya Amalina
JURNAL INFOTEL Vol 9 No 3 (2017): August 2017
Publisher : LPPM INSTITUT TEKNOLOGI TELKOM PURWOKERTO

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20895/infotel.v9i3.274

Abstract

VPN adalah teknologi yang membuat jaringan private (pribadi) dengan menggunakan jaringan publik agar proses pertukaran data menjadi aman. Teknologi VPN biasanya diterapkan untuk koneksi antara kantor pusat dan kantor cabang. Dinhubkominfo Kabupaten Banyumas sebagai tempat penelitian memiliki beberapa kantor cabang (SKPD). Data yang dipertukarkan antar kantor cabang pada Dinhubkominfo terdiri dari beberapa jenis, namun pada penelitian ini hanya difokuskan pada pertukaran layanan FTP. Teknologi vpn yang saat ini digunakan pada jaringan Dinhubkominfo adalah PPTP. Akan tetapi, penggunaan teknologi tersebut belum tersebut masih belum diketahui tingkat performansi jaringan dibandingkan dengan penggunaan teknologi vpn yang lain. Pada penelitian ini akan dibandingkan penggunaan dua teknologi vpn yang berbeda yaitu antara PPTP dan L2TP, dimana parameter yang digunakan adalah throughput, delay, jitter, dan packet loss. Proses pengambilan data dilakukan dengan menambahkan beban trafik sebesar 512 kbps, 1024 kbps, dan 2048 kbps. Dari hasil penelitian diperoleh data bahwa, rata-rata nilai Delay pada L2TP lebih besar hingga 41% dibanding saat menggunakan PPTP, rata-rata Throughput PPTP naik hingga 34% dibandingkan L2TP, Rata-rata Jitter pada PPTP lebih besar hingga 44% dibandingkan L2TP, sedangkan packet loss yang terjadi pada masing-masing layanan vpn adalah 0
Implementasi Intrusion Prevention System (IPS) Untuk Menganalisis Triad CIA Terhadap Serangan Keamanan Jaringan Pada Web Server Amilia Anggraeni; Jafaruddin Gusti Amri Ginting; Syariful Ikhwan
JURNAL INFOTEL Vol 14 No 4 (2022): November 2022
Publisher : LPPM INSTITUT TEKNOLOGI TELKOM PURWOKERTO

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20895/infotel.v14i4.813

Abstract

Computer networks are built to achieve the main goal of communicating with each other . During the transmission process, it is expected that information can be conveyed quickly, efficiently and safely. Network security serves to avoid damage or even data loss caused by attacker activities during the communication process. Security aspects that need to be maintained in data information are Confidentiality, Integrity and Availability. Intrusion Prevention System is a solution that can maintain network security from various attacks. The Intrusion Prevention System will act as a protector on the network by detecting and preventing suspicious traffic on nodes in a network. The Intrusion Prevention System in its implementation has several tools which are used in this study, namely Snort and IPTables. Testing is done by performing attacks on the Web Server. The attacks carried out are Port Scanning, DDoS attacks and Brute Force. The results of this study are based on the CIA Triad with the three attacks having different characteristics in terms of cause and effect. On the defense side, Port Scanning and Brute Force can be easily prevented by IPS, but in DDoS attacks there are differences in results between drop and reject rule. In a DDoS attack with an action drop rule, it can recover the web server in 160 seconds while the action reject rule can be restored at 145 seconds which normally can be recovered in a DDoS attack in 165 seconds. The IPS server can also reduce resources when there is a DDoS attack by 9.2% .
ANALYSIS PERFORMANCE IN SOFTWARE DEFINED NETWORK (SDN) USING ARUBA VAN CONTROLLER Rifqi Fauzan; Syariful Ikhwan; Jafaruddin Gusti Amri Ginting
Jurnal Informatika: Jurnal Pengembangan IT Vol 5, No 3 (2020): JPIT, September 2020
Publisher : Politeknik Harapan Bersama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/jpit.v5i3.1937

Abstract

SDN technology is a new architecture in the network that separates the control plan from the data plan. Aruba VAN Controller provides centralized control in a network architecture that runs on the OpenFlow protocol. This study conducted an SDN network simulation using the Aruba VAN Controller by applying the Narmox Spear application to simplify network configuration. IP addressing with DHCP server, for testing scenarios using UDP protocol packet delivery with packets sent at 1000 Bytes, the number of packets sent is 100 packets/s, then given background traffic variations of 50 Mbps, 100 Mbps, 150 Mbps and 200 Mbps to networks that have two different link bandwidth values as a comparison for analyzing the results of testing the QoS parameters, which are 100 Mbps and 200 Mbps. The test results are obtained when background traffic exceeds the link bandwidth capacity, the resulting throughput will be smaller on the destination side by 485.64 Kb/s, delay increases by 240.21 ms, then for jitter by 2.48 ms, resulting in overload resulting in packet loss of 37.41%. However, when background traffic increases and does not exceed the specified link bandwidth capacity, the overall QoS parameter value is generated in the good category, namely throughput of 774.42 Kb/s, delay of 0.41 ms, jitter of 0.37 ms and packet loss of 0.00%. Keyword - SDN, Aruba VAN Controller, OpenFlow, DHCP, UDP, QoS
Anlisis QoS Open IMS Core berbasis Network Function Virtualization pada Protokol TCP Nizam Khoirunnidzom; Dadiek Pranindito; Syariful Ikhwan
Jurnal Informatika: Jurnal Pengembangan IT Vol 4, No 1 (2019): JPIT, Januari 2019
Publisher : Politeknik Harapan Bersama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/jpit.v4i1.1254

Abstract

IP Multimedia Subsystem (IMS) is an NGN technology to convergence support of wireline and wireless networks with QoS guarantees. Therefore IMS is widely used by telecommunications operators. Increasing customers make operators overwhelmed by having to replace or add new devices to increase IMS capacity, which is less profitable for operators on the operational costs. The concept of Network Function Virtualization (NFV) is solve the problem. The concept changed of hardware-dedicated to software-dedicated in a virtual environment allows the NFV to be more flexible in increasing device capacity and can reduce dependence on hardware purchases. In this research IMS implemented using Open IMS Core and NFV infrastructure software using OpenStack. analysis based on QoS file transfer services and web servers by measuring parameters throughput, delay, jitter, and packet loss. Based on the measurement of QoS parameters obtained by traffic load of 0 Mbps, 10 Mbps, 20 Mbps, 30Mbps. The throughput average values on file transfer service are 0.2906 Mbit / s and 16.4366 Mbit / s on web server services. The delay average value on file transfer service is 25.5077 ms and 0.7708 ms on the web server service. The resulting jitter value is less than 1 ms. Percentage of packet loss is less than 1%.
Analisis Performansi Algoritma LEACH-C pada Wireless Sensor Network Aini, Latifah Zain Nur; Ikhwan, Syariful; Amri Ginting, Jafaruddin Gusti
Arcitech: Journal of Computer Science and Artificial Intelligence Vol. 3 No. 1 (2023): June 2023
Publisher : Institut Agama Islam Negeri (IAIN) Curup

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29240/arcitech.v3i1.7301

Abstract

Wireless Sensor Network (WSN) is a wireless network infrastructure that requires sensor nodes to process information and communicate. Small sensor nodes generally use batteries as their energy source, causing sensor nodes to have limited power, therefore energy efficiency is needed to extend network life. The solution to overcome these problems is by using the clustering method. In this study the cluster-based routing algorithm used is LEACH-C which can function to allocate overall energy consumption between sensor nodes. In this study, LEACH-C divides the network into several clusters, each of which has a cluster head (CH). cluster head is performed at the base station based on the average energy size of all nodes. The research simulation uses a scenario of changing nodes 50, 100, and 150. The simulation results show that the number of nodes affects the value of energy consumption, the number of data packets received, and the number of packet losses.
Comparison of the Work Process Methods for Scale Invariant Feature Transform and Sum of Squared Difference in Image Mosaic Widodo, Anteng; Ikhwan, Syariful; Santiko, Irfan
Journal of Multimedia Trend and Technology Vol. 3 No. 2 (2024): Journal of Multimedia Trend and Technology
Publisher : Universitas Amikom Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35671/jmtt.v3i2.72

Abstract

Mosaic image is an image made from a collection of many other small images placed side by side, so that from a distance it looks like one big image. The use of this mosaic image varies, for example in digital image processing, in the context of image analysis, mosaic can also mean the process of combining several images with overlap to create one large image, for example in geographic mapping using satellite imagery. Then as a pattern creation in the field of design, mosaic images are used to create complex or abstract patterns, which can be used in decoration, architecture, or product design. Mosaic image is a combination of several images to get a wider view. One of the problems in mosaic image is in the image matching process, the right image matching can produce a better mosaic image. This study will compare the image matching method with RANSAC and SSD. The mosaic image of both methods was tested using objective fidelity criteria. The results showed the RANSAC method with an MSE value of 121.5820 and a PSNR value of 27.2821 dB, while the SSD method with an MSE value of 140.8373 and a PSNR value of 26.6436 db. The RANSAC algorithm is good for use in cases of mosaic images with feature-based methods, while SSD is good for use in cases of mosaic images with direct methods.