Claim Missing Document
Check
Articles

Found 8 Documents
Search
Journal : Prosiding Snastikom

PEMANFAATAN FITUR CACTI BERBASIS TELEGRAM MESSENGER UNTUK NOTIFIKASI GANGGUAN JARINGAN DI PT. TELKOM AKSES MEDAN Prida Apriani; Tengku Mohd Diansyah syah; Risko Liza
SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI Vol. 1 No. 1 (2020): PROSIDING SNASTIKOM 2020
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (520.201 KB)

Abstract

Network monitoring helps to monitor and understand network problems that are happening so it can be handled as quickly as possible. CACTI is a network monitoring tools that monitors the network status when the network is up and down based on ping method and give a warning if a problem occurs in the network with an email form. However, the email function on CACTI has never been used by the engineer of PT Telkom Akses Medan due to the media coordination and communication that is being used on daily basic is Telegram Messenger. We need to install and analyze CACTI, designing the integration process of Telegram Messenger and handling fo notify network problems based on the operational area, to implement it with PHP and MySQL programs language by testing it with an exist device network. This final project create a CACTI function that able to notify a network problem through a notification from Telegram Messenger about the problem that occurs on the network with a dominance to deliver automatically and choosing each of the dynamic operational area.
Aplikasi Sistem Terdistribusi Pada Sistem Informasi Absensi Berbasis Mobile Di Kantor Bpdashl Wampu Sei Ular Jadi Olo Pangihutan; Tommy; Risko Liza
SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI Vol. 1 No. 1 (2021): Prosiding Snastikom 2021
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (362.946 KB)

Abstract

In the current era of the covid-19 pandemic, for employee attendance attendance is still using the attendance system with a finger print and in my opinion it is very dangerous in employee attendance at this time during the covid-19 pandemic, because the hands of employees who have been absent are left behind in the attendance machine and I think it can spread covid-19 to other employees who want to be absent, so that the use of a distributed system application on the mobile-based attendance information system at bpdashl wampu sei snake has a good impact on users, where users can avoid the spread of covid-19 with services digital attendance provided by the application that was built so that employees no longer have to queue at the attendance machine and avoid touching the attendance machine. To build a distributed system application on a mobile-based attendance information system at the office of bpdashl wampu sei snake using Adroid Studio. Therefore, the author raised the title of a distributed system application application on a mobile-based attendance information system at the BPDASHL Wampu Sei Snake office, so that the prevention of employee attendance is not contagious because there is no physical contact by reducing touch. With the design of a distributed system application on this mobile-based attendance information system, it is hoped that it can trigger other developers to innovate more in designing the next system
Sistem Kendali Lampu Taman serta Pengecekan Suhu dan Kelembapan di Sekitar Menggunakan NodeMCU ESP8266 Berbasis Internet Of Things Sultan Raza Fiqri; Abdul Jabbar Lubis; Risko Liza
SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI Vol. 1 No. 1 (2021): Prosiding Snastikom 2021
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (497.913 KB)

Abstract

Advances in technology today have provided many benefits in the use of electronic equipment that makes it easier for humans to carry out their daily activities. In the Industrial revolution 4.0, the first progress that can be felt is the internet of things or IoT. Iot has an important role in Industry 4.0, because it can connect everything to the internet network. Iot (Internet of Things) can be used in gardens to control garden lights and check temperature and humidity that can be operated remotely via the internet. This system utilizes sensors that can detect the amount of light intensity resistance that is used to turn on and off lights based on light intensity, sensors that can detect temperature and humidity that can be controlled and monitored from anywhere and anytime. In this study, the system uses a nodemcu esp8266 microcontroller which functions as a device that activates all components, such as the dht11 sensor, ldr sensor, 2 channel relay and led lights. This system uses a telegram application that functions as an application for controlling lights and checking temperature and humidity which is accessed from a smartphone connected to the nodemcu esp8266 microcontroller via a wifi network. The results of the trials carried out on all the features showed the results as expected.
Klasifikasi Sentimen Tweet Pada Twitter Terhadap Pembelajaran E-Learning Menggunakan Metode k-Nearest Neighbor Nurcholis Geofany; Tommy; Risko Liza
SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI Vol. 1 No. 1 (2021): Prosiding Snastikom 2021
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (542.546 KB)

Abstract

Indonesia is one of the most active Twitter users, so Twitter can be used as a medium to analyze e-learning topics. Studying at school is one of the things that have been affected by the current Covid-19 pandemic. On March 4, 2020, UNESCO (United Nations Educational, Scientific and Educational Organization) recommended that schools adopt a distance education system that allows teachers to reach students remotely and limits educational disruption on social networks. This study aims to answer public opinion that focuses on social media Twitter on this online/distance learning policy. Sentiment analysis is conducted to determine whether opinions on an issue have a positive, neutral, or negative trend value and can be used as a benchmark to improve a service. Sentiment analysis using the k-Nearest Neighbor method with Twitter data as much as 7800 tweet data that has been previously processed and achieves the best accuracy value of 53.03% with a comparison of training data and test data of 80:20.
Analisis Performa Owncloud Dan Pydio Pada Aplikasi Layanan Cloud Storage Vinsensius Elman Mendrofa; Tommy; Risko Liza
SNASTIKOM Vol. 1 No. 01 (2022): SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI (SNASTIKOM) 2022
Publisher : Unit Pengelola Jurnal Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (403.969 KB)

Abstract

The comparison analysis of owncloud and pydio performance refers to testing the performance of open sourcecloud storage service applications by identifying the use of resource consumption and technical use of the networkbetween the two cloud services as a benchmark for users and can be used as a basis for selecting cloud storageapplications that meet the criteria for save data. Performance comparison testing is done by uploading a file to acloud service, then resource usage will be monitored using netdata, and for technical network usage it will bemonitored using wireshark. For the results of testing the performance of owncloud and pydio services, in terms ofresource usage and consumption, owncloud is lighter than pydio. On the technical use of the network both havethe same level of criteria. However, for the user interface, pydio has an attractive appearance and is easy to use.
Model Simulasi Smarthome Berbasis Internet of Things dan Cloud Computing Menggunakan Cisco Packet Tracer Tariq Aziz; tengku moh diansyah; Risko Liza
SNASTIKOM Vol. 1 No. 01 (2022): SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI (SNASTIKOM) 2022
Publisher : Unit Pengelola Jurnal Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (549.669 KB)

Abstract

The development of technology at this time is very high where what we can see and take advantage of is growingrapidly along with the times to meet human needs. One of them is the increasing need for safe and comfortablehome technology. The application of technology in the house can be found in the smarthome concept.Smarthome is a home concept that uses a variety of IoT devices available for use at home to make it smart. Suchdevices include motion detectors, lawn sprinklers, smart doors, and many other IoT devices. Nowadays,simulation has become important in many ways, especially in various studies and studies carried out using thesimulation method as a way to solve problems. Cisco Packet Tracer 7.3 is an application that can help insimulating IoT devices. The results obtained from the smarthome simulation are the concept of house doorsecurity, air conditioning control and automatic fire extinguishing which can run well but the heating elementfor the increase in room temperature is slow.
Simulasi Pengamanan Virtual Server Menggunakan Dionaea Honeypot Dan Tunneling Sebagai Proses Pengamanan Komunikasi Data Nauval Alfarizi; Tengku Mohd Diansyah; Risko Liza
SNASTIKOM Vol. 1 No. 01 (2022): SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI (SNASTIKOM) 2022
Publisher : Unit Pengelola Jurnal Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (469.632 KB)

Abstract

Cybercrime is carried out to obtain information, where the information obtained is used as a source of data in carrying out an attack. Attacks generally lead to various scopes ranging from physical servers to virtual servers. This research was conducted by the author to be able to carry out the implementation process based on qualitative development of existing technology, namely the design of a virtual server system using Dionaea honeypot and PPTP tunneling in carrying out a form of security for data communication that can cover vulnerabilities to a device on a virtual server. The results of the research that the author conducted showed that there was a difference in each attack test. When an attack attempt is carried out into each port that is not configured on the main service on the virtual server, the results of the attack are that it can detect intruders and vice versa
Analisis Pemanfaatan Teknik Serangan DDOS pada Mikrotik Cloud dan Melakukan upaya penangannya Syahendra Surya; Tengku Mohd Diansyah; Risko liza
SNASTIKOM Vol. 2 No. 1 (2023): SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI (SNASTIKOM) 2023
Publisher : Unit Pengelola Jurnal Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (220.192 KB)

Abstract

Internet services have many benefits and are widely used, but also have disadvantages that can be utilized by hackers to carry out attacks such as DDoS. One solution to manage and control internet networks is to use MikroTik CHR (Cloud Hosted Router), a virtual router solution provided by MikroTik. CHR is designed to run on various virtualization platforms such as VMware, VirtualBox, Hyper-V, and Clouds such as Amazon Web Services, Google Cloud Platform, and Microsoft Azure.This research aims to analyze DDoS attack techniques used and implemented on the MikroTik CHR platform and the security effort strategies that can be used to protect MikroTik CHR from DDoS attacks that can cause service disruptions and financial losses and their handling. This research only focuses on DDoS attacks on MikroTik CHR and security strategies that can protect it from attacks. The results show that some effective security strategies include configuring firewalls, enabling protection features, and performing regular monitoring and software updates. In conclusion, the MikroTik CHR can be protected from DDoS attacks with proper security strategies, and it is necessary to pay attention to strict security monitoring, software updates, and an integrated and comprehensive security strategy to protect the MikroTik CHR from DDoS attacks.