Claim Missing Document
Check
Articles

Hybrid Zero Trust Container Based Model for Proactive Service Continuity under Intelligent DDoS Attacks in Cloud Environment Danang Danang; Eko Siswanto; Nuris Dwi Setiawan; Priyo Wibowo
International Journal of Computer Technology and Science Vol. 2 No. 3 (2025): International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v2i3.291

Abstract

Growth rapid computing cloud, especially on academic, government, and service platforms. public, has trigger improvement frequency and complexity Distributed Denial of Service (DDoS) attacks. Intelligent DDoS attacks AI based capable copy pattern Then cross user valid, so that difficult detected and mitigated. The majority approach mitigation moment This nature reactive, no scalable, and tends to sacrifice availability service for authorized users. Research​ This aiming develop architecture proactive and adaptive defense​ For ensure continuity service during attack ongoing. Security model proposed hybrid​ integrating Zero Trust Architecture (ZTA), adaptive bandwidth control, and isolation service container -based. Architecture consists of from three layer Main: (1) ZTA Policy Engine which performs verification identity and assessment behavior through tokens and policies intelligent; (2) Adaptive Bandwidth Load Balancer which automatically dynamic separate and arrange Then cross based on reputation and level trust ; and (3) Containerized Service Cluster which groups request to in different containers For user trusted and not known . Components addition such as blockchain -based smart contracts are used For recording request and verification access , as well as lightweight AI module used for profiling then cross in real-time. Simulation results show that this model succeed increase availability service for user trusted during attack , press false positive rate , as well as optimize allocation source power. Integration of zero trust policies with intelligence Then cross and segmentation service in real-time forming framework effective and scalable defense​ to modern DDoS threats . In conclusion , the study This contributes a robust , adaptive , and modular architectural model for maintain continuity cloud services in condition network at risk .
Rancang Bangun Sistem Real-Time Monitoring Suhu dan Kelembaban Menggunakan ESP32 supriyanto supriyanto; Nuris Dwi Setiawan
Elkom: Jurnal Elektronika dan Komputer Vol. 18 No. 1 (2025): Juli : Jurnal Elektronika dan Komputer
Publisher : STEKOM PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/elkom.v18i1.3064

Abstract

Pemantauan suhu dan kelembaban secara real-time merupakan kebutuhan penting dalam berbagai bidang, seperti kesehatan, pertanian, industri, dan pengelolaan lingkungan, guna menjaga stabilitas kondisi ruangan dan mencegah kerusakan pada peralatan elektronik. Penelitian ini bertujuan untuk merancang dan membangun sistem monitoring suhu dan kelembaban berbasis mikrokontroler ESP32 dengan sensor DHT22. Sistem dirancang untuk menampilkan data secara langsung melalui layar OLED dan aplikasi Blynk sehingga memungkinkan pemantauan jarak jauh secara real-time. Penelitian ini menggunakan metode eksperimen dengan pengujian pada dua skenario, yaitu ruang tertutup dan area terbuka, dengan titik kendali kelembaban relatif (RH) sebesar 65%. Hasil pengujian menunjukkan bahwa sistem mampu bekerja secara efektif dalam kondisi ruang tertutup, di mana kelembaban meningkat dari 54,5% menjadi 65% RH dalam waktu 10 menit dan kemudian dapat dipertahankan stabil melalui mekanisme kendali otomatis. Namun, pada area terbuka, sistem tidak menunjukkan peningkatan kelembaban yang signifikan karena adanya sirkulasi udara bebas yang mempercepat dispersi uap air. Dengan demikian, dapat disimpulkan bahwa sistem monitoring berbasis ESP32 ini efektif digunakan pada ruang dengan kondisi lingkungan yang terkontrol, serta memiliki potensi untuk dikembangkan lebih lanjut pada aplikasi rumah pintar (smart home) dan sistem industri berbasis Internet of Things (IoT).
BLACK BOX APPROACH TO MONITORING CONTAINER MICROSERVICES IN FOG COMPUTING Danang Danang; Nuris Dwi Setiawan; Indra Ava Adianta
Journal of Technology Informatics and Engineering Vol. 1 No. 1 (2022): April: Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i1.141

Abstract

In recent years IoT has developed very rapidly. IoT devices are used to monitor and control physical objects to transform the physical world into intelligent spaces with computing and communication capabilities. Compared to cloud computing, fog computing is used to support latency-sensitive applications at the edge of the network which allows client requests to be processed faster. This study aims to propose a monitoring framework for containerized black box microservices in a fog computing environment to evaluate CPU overhead, as well as to determine the operating status, service characteristics, and dependencies of each container. This study proposes a monitoring framework to integrate computing resource usage and run-time information from service interactions using a black box approach that seeks to integrate service-level information and computing resource information into the same framework. The proposed framework is limited to observing information monitoring after the server receives a request. This study uses JMeter to simulate user actions, which send requests to the server, and this research assumes the user knows the IP address of the server. For container monitoring methods in fog computing, all are indirect monitoring methods. The results of this study indicate that the proposed framework can provide operational data for visualization that can help system administrators evaluate the status of running containers using a black box approach. System administrators do not need to understand and modify target microservices to gather service characteristics from containerized microservices. Regarding future research, it is suggested to expand the exploration of modified system information, and that part of the container management tool code can be pre-tried so that the framework proposed in this study can provide real-time quantitative indexes for the load balancing algorithm to help optimize the load balancing algorithm.
IMPACT OF EMBEDDED CLS ON EYE TRACKING REPLICATION Nuris Dwi Setiawan; Bagus Sudirman; Sigit Umar Anggono
Journal of Technology Informatics and Engineering Vol. 1 No. 3 (2022): December: Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i3.148

Abstract

Using different programming languages when software advancement is a familiar method in current software advancement. Nevertheless, using various languages that can hinder developer capacity is not widely known. This research simulated an unplanned controlled study examining the adoption of various languages in the situation of a directory programming task. Participants in this study were given programming tasks written in Java and one of three SQL-like embedded languages. Simple “SQL” over authority, “Java” program only, and a more Java-like hybrid embedded language. Furthermore, to transcribe the responses to the online quest and the participators' “task” solutions, the participators' eye movements were also recorded with an eye tracker. “Eye Tracker” or in this study call as “Eye-Trc” is the methodology of the study of software development that has developed nowadays and grants more in-depth info about how developers accomplish programming tasks. This Eye-Trc method is used as a data collection method in this study. Eye-Trc data was get by thirty-one participators (university background and Industrial Background) for different programming tasks. To analyze the impact of inter-group inconstant and professional experience and in-group “task” variables on the dependent variable Time in completion, this study used a mixed model ANOVA. The outcome of this study indicates that an important impact on productivity was not found, this is different from the initial research because of the language used. However, the same effect was found from the participators' expertise in programming activity indicating that more competent programmers were easy to full fill “polyglot programming tasks” more efficiently. In addition, it was raised that participators viewed the specimen code with the same proportion (time) for bringing “task” reckless of skills or language alternative provided. dominant-stage exploration management also remains mostly consistent over the experiences or language alternatives. Overall, it can be concluded that the programming stage of the linguist doesn’t have an important impact. The top-stage strategies that participators used came to be identical reckless of the language alternative presented to them. As a suggestion for future research, the impact of various characteristics of polyglot programming languages should be studied in depth for the conclusions reached to remain correct across various polyglot programming contexts.
PERANCANGAN APLIKASI JALUR PENDAKIAN DAN MONITORING PENDAKI GUNUNG UNGARAN BERBASIS GLOBAL POSITIONING SYSTEM (GPS) Khoirur Rozikin; Nuris Dwi Setiawan
Teknik: Jurnal Ilmu Teknik dan Informatika Vol. 1 No. 1 (2021): Mei : Jurnal Ilmu Teknik dan Informatika
Publisher : LPPM Sekolah Tinggi Ilmu Ekonomi - Studi Ekonomi Modern

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/teknik.v1i1.26

Abstract

Ungaran Mountain has a height of 2050 meters above sea level, this mountain is suitable for beginner climbers who want to know more about climbing hobbies, Ungaran climbers themselves only take about 3-5 hours, depending on the speed of walking, the climbing route is also quite light and very suitable for heating before starting to climb higher mountains. Thus many novice climbers who want to try to climb and conquer Mount Ungaran, armed with minimal experience of mountain climbing, the risks they face are even greater, ranging from getting lost, being hypothermic to death while climbing. To make it easier for Ungaran mountain climbers who are dominated by novice climbers in this study, the Ungaran Mountaineering Track and Monitoring Application Based on the Global Positioning System (GPS) on the Android System "which was built to make it easier for Ungaran mountain climbers to access information provided by Ungaran mountain climbers. needed to climb Mount Ungaran, and it is also useful for the team at base camp to monitor climbers who climb..
Pengembangan Perangkat Pembelajaran Fisika Berbasis Multimedia Pada Materi Impuls Dan Momentum Daniel Rutdjiono; Nuris Dwi Setiawan
Teknik: Jurnal Ilmu Teknik dan Informatika Vol. 1 No. 1 (2021): Mei : Jurnal Ilmu Teknik dan Informatika
Publisher : LPPM Sekolah Tinggi Ilmu Ekonomi - Studi Ekonomi Modern

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/teknik.v1i1.28

Abstract

This study aims to design and develop an effective learning media and become a media to assist in studying Physics in depth at SMK Mataram Semarang, especially in the Impulse and Momentum material. Physics becomes a boring subject for students, because many students think that Physics is a lesson that is difficult to understand, less interesting and feels monotonous. This has an impact on decreasing students' interest and value in studying Physics.The research was conducted using the Research and Development (R&D) method with six stages, namely Research and Information Collecting (Research and Information Gathering), Planning (planning), Develop Premliminary Form of Product (Product Design Making), Premliminary Field Testing (Product Design Validation) , Main Product Revision (Design Revision), Main Field Testing (Product Testing of Products in the Field by Prospective Users). Determination of the feasibility level of multimedia-based learning media based on design validation by experts and product trials to students using a research instrument in the form of a questionnaire. The development of multimedia-based learning devices can develop devices that have been used so far, from conventional devices to become more interesting learning media. The application of multimedia-based learning media can help support the teaching and learning process to make it easier to explain or deliver material to students. In addition, it can help students to understand more deeply so that students' scores can be increased more than without using learning media.
PENGEMBANGAN MEDIA PEMBELAJARAN INTERAKTIF BERBASIS WEB PADA MATA PELAJARAN SEJARAH DI KELAS X MPLB SMK KANISIUS UNGARAN Khoirur Rozikin; Buitas Ribka Letkamang; Candra Supriadi; Nuris Dwi Setiawan; Unang Achlison
Elkom: Jurnal Elektronika dan Komputer Vol. 17 No. 1 (2024): Juli : Jurnal Elektronika dan Komputer
Publisher : STEKOM PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/elkom.v17i1.1933

Abstract

One effective way in the world of education, especially in teaching and learning activities, is to keep up with current developments by utilizing existing technology. At Kanisius Ungaran Vocational School in Class X MPLB there is no web-based interactive learning media for the History subject. In this regard, there is a need to develop web-based interactive learning media so that teaching and learning activities are more interesting and enjoyable, especially in the subject of History. The benefit of this research is that it can apply the knowledge possessed by researchers in developing web-based interactive learning media in the History subject in class X MPLB Kanisius Vocational School Ungaran. Apart from that, this research is also expected to increase learning creativity and innovation, as for the practical benefits of this research, it can make it easier for teachers and students in teaching and learning activities in the subject of History
Perancangan Aplikasi Tutorial Turnitin Untuk Melacak Plagiasi Menggunakan Metode Prototype Haris Jamaludin; Sulartopo Sulartopo; Nuris Dwi Setiawan
Elkom: Jurnal Elektronika dan Komputer Vol. 17 No. 1 (2024): Juli : Jurnal Elektronika dan Komputer
Publisher : STEKOM PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/elkom.v17i1.2049

Abstract

This study focuses on creating a Turnitin tutorial application to track plagiarism using the prototype method approach. The purpose of this application is to make it easier for users to understand and utilize Turnitin as a reliable plagiarism detection tool in academic writing. The prototype method was chosen because it allows for rapid iteration and improvement based on user feedback, which is very important to improve the quality of the application. The development stages include creating an initial prototype, testing functions, and collecting feedback for design refinement. This study aims for the application to be developed to provide clear guidance and effective solutions in identifying and preventing plagiarism, while deepening users' understanding of the use of Turnitin. Thus, this application is expected to strengthen academic integrity and support ethical writing practices through integrated plagiarism detection technology.
Pemanfaatan Teknologi Internet of Things untuk Monitoring Kualitas Air Sungai di Wilayah Perkotaan Danang Danang; Nuris Dwi Setiawan; Eko Siswanto
Journal of New Trends in Sciences Vol. 2 No. 1 (2024): Februari: Journal of New Trends in Sciences
Publisher : CV. Aksara Global Akademia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59031/jnts.v2i1.784

Abstract

The rapid urbanization and industrialization of cities have significantly contributed to the rising pollution levels, especially in urban rivers, where water quality is often compromised. Monitoring water quality in real-time is essential for mitigating the adverse effects of water contamination. This research aims to design and implement an Internet of Things (IoT)-based system for real-time monitoring of water quality in urban rivers, focusing on the continuous collection and analysis of environmental data. The system utilizes a range of sensors to measure critical water quality parameters, including pH, temperature, dissolved oxygen (DO), turbidity, and various contaminants, all of which transmit data wirelessly to a central server for further processing. The study evaluates the accuracy, reliability, and efficiency of the IoT system in detecting water pollution and its ability to deliver real-time insights. Findings demonstrate that the IoT system offers a higher level of precision and faster detection compared to conventional monitoring methods, making it an effective tool for real-time pollution detection and decision-making. Additionally, the integration of the IoT system with a user-friendly visualization platform enhances the accessibility of the data for stakeholders, enabling them to monitor the water quality effectively. The study suggests that IoT-based water quality monitoring systems present a sustainable long-term solution for urban water management, offering cost and time savings. Moreover, the research highlights the importance of cross-sector collaboration to support the development and deployment of IoT technologies and recommends further advancements in sensor technologies to monitor additional water quality parameters.  
Rancang Bangun Sistem Keamanan Ruang Persandian Menggunakan RFID dan Sensor PIR Berbasis IOT Eni Muhadi; Sulartopo Sulartopo; Danang Danang; Dani Sasmoko; Nuris Dwi Setiawan
Router : Jurnal Teknik Informatika dan Terapan Vol. 2 No. 1 (2024): Maret : Router: Jurnal Teknik Informatika dan Terapan
Publisher : Asosiasi Profesi Telekomunikasi dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/router.v2i1.47

Abstract

This Space Security System is a system that utilizes the existing Internet Network to monitor a room remotely or from a different location. With the aim of making it easier to limit employee access rights and monitor the presence of people in the room.So the author made a room security system tool using the Internet of Things (IOT) which was implemented at the Demak Regency Communication and Information Service. The way this system works is only employees who have access rights who can enter the room by attaching an RFID card to the RFID Reader sensor, and the way the PIR sensor works is to monitor human presence, when there is infrared or human emission it will send data to the web if it is in the room has people and the red LED lights up and the buzzer sounds, while the push button button is when the push button button is pressed the solenoid will open. By making this design, it will help improve room security at the Demak Regency Communication and Information Service, especially the Encryption Room