Claim Missing Document
Check
Articles

Found 13 Documents
Search

Analysis and Implementation of Signature Based Method and Structure File Based Method for File Carving Anjar Afrizal; Niken Dwi Wahyu Cahyani; Erwid Musthofa Jadied
Indonesia Journal on Computing (Indo-JC) Vol. 6 No. 1 (2021): April, 2021
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34818/INDOJC.2021.6.1.457

Abstract

File Carving is a data recovery technique based on file structure and content without relying on filesystem information or metadata. The problem in carving files is its high false positive value especially when the file is fragmented (either linear fragmented or non-linear fragmented). The aim of this study is to implement and analyze the performance of two file carving method (Signature Based and File Structure Based) as a solution to the problem of the carving process. By focusing on JPEG, GIF and PNG files, two datasets are used, namely: CFReDS Project (NIST Project) and Basic Data Carving Test (Nick Mikus Project). The analysis is based on the recovery performance (carving recall, supported recall, carving precision), execution time, and memory usage. From the recovery performance parameter, the File Structure Based method gets a higher overall value than the Signature Based method. However, based on the execution time performance parameter, the Signature Based method has better execution time and use fewer resources compared to the File Structure Based method.
Internet of Things (IoT) Based Free Fall Motion Instructions in Physics Subjects for Class X Students Muhammad Nabil Fauzan; Novian Anggis Suwastika; Erwid Musthofa Jadied
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 6, No 2 (2022): April 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v6i2.3774

Abstract

Physics subjects are one of the most difficult materials for students to understand. According to the research that has been done, props are one of the answers to make it easier for students to understand physics lessons. Since most physical materials are directly related to everyday life, props serve as a practical medium to facilitate the learning process. Learning physics concepts is easier to understand by using props which we simulate based on real events. One of the materials in physics class is free-fall motion. In this material, when an object falls from a height and has no initial velocity, its falling velocity is calculated. In this study, we apply the Internet of Things (IoT) to the props of free fall material and by adding Ambrose's concepts namely practice and feedback, so that students can better understand the material of free-fall motion. By implementing IoT, the system can read, record, and evaluate the experimental activities performed by users, and users who already have an account can access it online through the website. The system was evaluated based on system functionality and accuracy generated by the system. Based on the test results, it was found that all functions included in the system were 100% working. Based on the three tests performed, the system achieved an average accuracy of 80%.
Implementasi Teknik Penghapusan Data Dengan Metode Dod 5220.22m Pada Sistem Operasi Android Habib Reza Khalifa; Fazmah Arif Yulianto; Erwid Musthofa Jadied
eProceedings of Engineering Vol 3, No 1 (2016): April, 2016
Publisher : eProceedings of Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Keamanan suatu data baik itu milik perorangann ataupun data penting perusahaan perlu dijaga agar tidak sampai jatuh ke tangan yang salah. Dalam menjaga keamanan tersebut, salah satu caranya yaitu dengan melakukan penghapusan data penting tersebut dari media penyimpanan. Namun diperlukan cara penghapusan yang benar -benar aman dalam melakukan penghapusan tersebut, agar data yang telah dihapus tidak dapat dipulihkan kembali. Dari hal tersebut, diperlukan sebuah metode yang dapat membuat penghapusan data tersebut benar-benar aman dan tidak mudah untuk dipulihkan dengan berbagai tools recovery. Dalam pengujian pada tugas akhir ini akan diambil beberapa aplikasi sampel yang telah dipilih sebelumnya untuk dianalisa kekurangannya untuk kemudian diperbaiki beberapa kekurangannya oleh aplikasi yang dibuat, baru kemudian dibandingkan dibandingkan hasil keamanan data antara aplikasi yang dibuat dengan aplikasi sampel. Dari hasil analisa kekurangan aplikasi sampel didapatkan bahwa aplikasi sampel yang diambil saat melakukan penghapusan tidak menggubah ataupun menghapus nama file dari data yang dihapus, untuk itu pada pembuatan aplikasi selain ditujukan untuk melakukan penghapusan data juga ditambahkan fungsi untuk melakukan pengubahan nama file. Aplikasi yang dibuat menggunakan metode DoD 5220.22-M dalam implementasinya dan memiliki beberapa kelebihan dibandingkan dengan aplikasi andro shredder dan juga remo file eraser. Dari segi keamanan data, aplikasi yang dibuat memiliki kelebihan yaitu aplikasi ini mengubah nama file asli kedalam bentuk acak, sehingga nama file asli dari data yang dihapus tidak dapat diketahui. Kemudian dari segi efisiensi waktu, aplikasi yang dibuat juga memiliki waktu penghapusan yang cukup cepat, sehingga cukup baik jika digunakan untuk melakukan penghapusan data. Namun aplikasi yang dibuat belum mampu menghapus file dengan sempurna dan masih ada file yang dapat dipulihkan kembali. Kata kunci : Anti-forensics, DoD 5220.22M, SDcard, Recovery
Implementasi Dynamic Switch Migration pada Controller Terdistribusi di Software Defined Network. Rizal Mochamad Nazar; Maman Abdurohman; Erwid Musthofa Jadied
eProceedings of Engineering Vol 5, No 3 (2018): Desember 2018
Publisher : eProceedings of Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstrak Software Defined Network merupakan teknologi yang dapat mengelola jaringan skala besar dengan memisahkan control plane dan data plane. Pengaturan jaringan dilakukan secara terpusat logically centralized oleh controller. ketika sebuah controller mengalami kelebihan load dan terjadi Single Point of Failure maka kinerja jaringan akan terganggu. Software Defined Network dapat mengatasi masalah tersebut dengan mengimplementasikan arsitektur Multiple Distributed Controller menggunakan metode Dynamic Switch Migration. Arsitektur Multiple Distributed Controller dalam penelitian ini menggunakan dua buah controller dengan peran Master dan Slave. Melalui simulasi menggunakan arsitektur Multiple Distributed Controller telah diuji kemampuan mekanisme Dynamic Switch Migration dalam menangani masalah kelebihan load pada controller dengan memindahkan sebagian switch dari controller master ke controller slave dan masalah Single Point of Failure dengan memindahkan seluruh switch controller master ke Controller slave. Kata kunci: Software Defined Network, Dynamic Switch Migration,Multiple Distributed Controller, kelebihan load, controller slave, controller master Abstract Software Defined Network is a technology that can manage large-scale networks by separating control plane and data plane. Network settings are centrally logically centralized by the controller. when a controller is overloaded and a Single Point of Failure occurs, network performance will be disrupted. Software Defined Network can solve this problem by implementing the Multiple Distributed Controller architecture using the Dynamic Switch Migration method. The Multiple Distributed Controller architecture in this study uses two controllers with Master and Slave roles. Through simulation using the Multiple Distributed Controller architecture, the ability of the Dynamic Switch Migration mechanism to handle the problem of overloading the controller by moving a part of the switch to the slave controller and Single Point of Failure by moving all switches to the Slave Controller. Keywords: Software Defined Network, Dynamic Switch Migration,Multiple Distributed Controller, overloaded, controller slave, controller master
Analisis Perbandingan Algoritma Trilateral Dan Trilateral Termodifikasi Untuk Skema Positioning Pada Jaringan Nirkabel Calvin M.T Manurung; Aji Gautama Putrada; Erwid Musthofa Jadied
eProceedings of Engineering Vol 6, No 1 (2019): April 2019
Publisher : eProceedings of Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstrak Teknologi wireless pada saat sekarang ini telah banyak digunakan, hal itu dikarena teknologi wireless dapat dimanfaatkan untuk banyak hal salah satunya untuk menentukan positioning dari unknown node atau target yang akan dicari posisinya.. Untuk dapat menentukan estimasi posisi dari unknown node, perkiraan jarak antara Wi-Fi sebagai access point atau anchor node dan terhadap unknown node harus dihitung berdasarkan nilai RSSI yang didapatkan. Nilai perkiraan jarak tersebut kemudian akan dijadikan acuan untuk menentukan estimasi posisi dari unknown node menggunakan algoritma positioning system, yang mana algoritma yang sering digunakan adalah algoritma trilateral. Algoritma trilateral menggunakan 3 anchor node sebagai acuan untuk menentukan estimasi posisi dimana hal itu membutuhkan cost lebih dalam penerapannya. Oleh karena itu pada penelitian ini akan dilakukan simulasi pada matlab menggunakan algoritma trilateral termodifikasi, dimana algoritma ini hanya menggunakan 2 anchor node sebagai acuan dalam penentuan estimasi posisi dari unknown node. Berdasarkan hasil pengujian yang telah dilakukan disimpulkan bahwa algoritma trilateral lebih baik dalam akurasi penentuan estimasi unknown node dengan rata – rata error position sejauh 6.4m. Akan tetapi algoritma trilateral termodifikasi lebih baik dalam hal akurasi dari penentuan estimasi unknown node dengan rata – rata jarak antar node estimasi sejauh x = 3.4m dan y = 3.5m . Kata Kunci : Wireless, Algoritma Trilateral, Algoritma Trilateral Termodikasi, RSSI, Anchor Node, Unknown Node Abstract Wireless technology is now widely used, because wireless technology can be used for many things, one of which is to determine the positioning of the unknown node or target to be searched for. To be able to determine the position estimate of the unknown node, the estimated distance between Wi-Fi as an access point or anchor node and the unknown node must be calculated based on the RSSI value obtained. The approximate value of the distance will then be used as a reference to determine the position estimation of unknown nodes using the positioning system algorithm, where the algorithm that is often used is the trilateral algorithm. Trilateral algorithm uses 3 anchor nodes as a reference to determine the estimated position where it requires more cost in its application. Therefore in this study a simulation will be performed on matlab using a modified trilateral algorithm, where this algorithm only uses 2 anchor nodes as a reference in determining the estimated position of the unknown node. Based on the results of tests that have been carried out, it can be concluded that the trilateral algorithm is better in the accuracy of determining the estimation of unknown nodes with an average error position of 6.4m. However, the modified trilateral algorithm is better in terms of accuracy than the determination of unknown node estimates with the average distance between estimated nodes as far as x = 3.4m and y = 3.5m. Keyword : Wireless, Trilateral Algorithm, Trilateral Modified Algorithm, RSSI, Anchor Node, Unknown Node
Analisis Performansi Metode Load Balancing Pada Broker Protokol Mqtt Menggunakan Algoritma Least Connection Sepriano Sepriano; Vera Suryani; Erwid Musthofa Jadied
eProceedings of Engineering Vol 8, No 2 (2021): April 2021
Publisher : eProceedings of Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstraksi IoT di dukung oleh banyak protokol salah satunya adalah Massage Queueing Telemetry Transport (MQTT). MQTT adalah protokol komunikasi yang membutuhkan resource dan bandwidth yang kecil. Protokol MQTT menggunakan broker yang bertugas untuk menghubungkan publisher dan subscriber. Ketika broker mengalami kegagalan, publisher dan subscriber tidak dapat melakukan proses komunikasi dan harus menunggu untuk broker di perbaiki. Permasalahan ini dapat diminimalisir dengan mengimplementasikan metode load balancing. Load balancing merupakan teknik mendistribusikan beban traffic pada dua atau lebih server agar terjadi pemerataan traffic dan menghidari overload terhadap kemungkinan yang terjadi di server. Least connection merupakan salah satu algoritma dari load balancing dimana algoritma ini bekerja berdasarkan koneksi yang dilayani oleh server. Algoritma least connection bekerja perhitungan yang lebih kompleks dengan membandingkan jumlah koneksi pada setiap server. Hasil pengujian yang dilakukan algoritma least connection mendapatkan nilai parameter throughput yang tinggi dan error rate yang lebih rendah.
ANALYSIS OF THE EFFECT OF VSM ON THE MEMORY ACQUISITION PROCESS USING THE DYNAMIC ANALYSIS METHOD Sinta Nur Maulina; Niken Dwi Wahyu Cahyani; Erwid Musthofa Jadied
JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Vol 8, No 2 (2023)
Publisher : STKIP PGRI Tulungagung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29100/jipi.v8i2.3745

Abstract

At first, forensics was restricted to studying data that was stored on a system's hard disk. However, as storage capacity and data encryption increased, applying conventional digital forensic procedures became more challenging. As a result, memory forensics techniques are developed, or are frequently referred to as live forensics, because the process is quicker and more sophisticated. Volatile memory forensics, often known as live forensics, are necessary for this condition. Live forensics has flaws, specifically that some programs can fail when the computer is in active VSM (virtual secure mode). This results in the retrievable evidence being lost. Therefore, determining the cause is essential. The software-based memory acquisition tools Autopsy, Isobuster, DumpIt, and Magnet RAM Capturer are just a few examples. According to the findings of the experiments, the tools that have crashed include DumpIt v1.3.2.20110401. A dynamic code analysis using WindBg as a tool was utilized to study the impact of VSM on the memory acquisition tool. This study's goal is to identify the instances of crashes in various forensic instruments, which will be highly useful for forensic experts performing investigations.
An Impact Analysis of Damage Level caused by Malware with Dynamic Analysis Approach Christopher Arden Anugerah; Erwid Musthofa Jadied; Niken Cahyani
International Journal on Information and Communication Technology (IJoICT) Vol. 10 No. 1 (2024): Vol. 10 No.1 June 2024
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21108/ijoict.v10i1.940

Abstract

Malware, short for malicious software, is software or code specifically designed to damage, disrupt computer systems, or gain unauthorized access to sensitive information. Based on type classification, one of the well-known types of malware is ransomware. Usually, ransomware will encrypt the files on a computer system and then demand a ransom from the owner of the computer system so that the owner can regain access to the encrypted files. Sometimes in some cases, ransomware is able to delete files without input from the computer system owner. This research includes the analysis process of three ransomware samples that are known for successfully causing losses to many computer systems throughout the world, namely WannaCry, Locky, and Jigsaw, using a dynamic approach and the use of tools to track the processes carried out by the ransomware. The purpose of this research is to determine which of the three samples has the highest to lowest level of damage based on metrics based on file access capabilities and file modification capabilities for various types of files such as system files, boot-related files, program files, etc. The findings of this research indicate that WannaCry has the highest impact followed by Locky and then Jigsaw.
Analysis Technique Data hiding using HPA DCO on SATA Hard Drive Ilhami, Muhammad Reyfasha; Cahyani , Niken Dwi; Jadied, Erwid Musthofa
Sinkron : jurnal dan penelitian teknik informatika Vol. 8 No. 4 (2024): Article Research Volume 8 Issue 4, October 2024
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v8i4.14042

Abstract

Data hiding techniques in the Host Protected Area (HPA) and Device Configuration Overlay (DCO) areas of SATA Hard Disk Drives have become a frequently used anti-forensic activity to hide data and evidence. The area is inaccessible to standard operating systems and software, making it capable of hiding data. This technique utilizes the ability of the SATA Hard Disk Drive to reconfigure the storage size so as to hide evidence. When anti-forensic data hiding Host Protected Area (HPA) and Device Configuration Overlay (DCO) activities occur, it is necessary to conduct a digital forensic investigation to find clues that are useful in solving crimes. Therefore, in this research, an assessment of data hiding techniques using Host Protected Area (HPA) and Device Configuration Overlay (DCO) on SATA Hard Disk Drives is carried out. The implementation of the HPA DCO data hiding technique on a SATA Hard Disk Drive by identifying the HPA DCO area on the SATA HDD and investigating the acquisition results on the SATA HDD is the subject of this research. It is expected that the results will provide a comprehensive overview of HPA DCO data hiding techniques on a SATA HDD as well as recommendations on how to identify and investigate SATA HDDs that have HPA DCO. This effort aims to evaluate the HPA DCO data hiding technique in various cases and provide insight into the potential use of this technique in hiding data or evidence.
Analysis of Ransomware Attacks in Windows Operating System Using the Approach of Memory Analysis Lidanta, Muhammad Ichsan Rabani; Suryani, Vera; Jadied, Erwid Musthofa
JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Vol 10, No 3 (2025)
Publisher : STKIP PGRI Tulungagung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29100/jipi.v10i3.6317

Abstract

Ransomware is a growing and evolving problem in digital security. The significant losses caused by ransomware can target individuals as well as companies and organizations due to its increasingly complex and escalating threats. To address this issue, a memory analysis approach is needed to gain a better understanding of its characteristics and behavior. This research proposes a memory analysis approach as a means to detect and analyze ransomware. The memory analysis approach involves capturing the memory running on an infected operating system. This approach can also assist in detection and analyzing ransomware samples that may go undetected by traditional security tools. The result shows the memory analysis approach is capable of detecting WannaCry infections through the analysis of running processes and DLL files. However, this method was not successful in detecting other ransomware infections such as Jigsaw and Locky. These results indicate that the specific characteristics of WannaCry make it identifiable through this approach, while other types of ransomwares may require different detection techniques.