Claim Missing Document
Check
Articles

Implementasi Sistem Monitoring Security Berbasis Web di Komplek Bulak Jakarta Timur Matheos Sarimole, Frencis; Akbar, Yuma; Novianto, Firza; Praja Raymond , Samuel; Awang Hariman, Aloisius
Jurnal Pendidikan Tambusai Vol. 6 No. 1 (2022): 2022
Publisher : LPPM Universitas Pahlawan Tuanku Tambusai, Riau, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31004/jptam.v6i1.3413

Abstract

Mengamankan suatu daerah menjadi tugas wajib bagi security dan juga pengurus, hal tersebut menjadi sulit apabila kurangnya personil security yang berjaga di suatu daerah, dalam hal ini penilitan dilakukan pada komplek bulak RT.02/RW.07. Solusi dari permasalah tersebut yang peniliti lakukan adalah membuat aplikasi patroli security yang melibatkan warga untuk melakukan pelaporan apabila mengalami atau mencurigai tindakan kriminal. Menggunakan metode waterfall untuk membagun aplikasi, aplikasi yang dibuat menggunakan bahasa pemrograman javascript, menggunakan framework react JS untuk frontend dan menggunakan framework express JS untuk backend aplikasi tersebut berbasis web sehingga mudah di akses. Aplikasi yang dibangun mampu membantu security yang sedang berpatroli karena pelaporan dari warga dapat langsung diterima oleh security untuk langsung datang ke tempat kejadian.
Analisis Sentimen Pengguna Twitter di Indonesia Terhadap ChatGPT Menggunakan Algoritma C4.5 dan Naïve Bayes Akbar, Yuma; Sugiharto, Tri
Jurnal Sains dan Teknologi Vol. 5 No. 1 (2023): Jurnal Sains dan Teknologi
Publisher : CV. Utility Project Solution

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstrak−Perkembangan teknologi di era sekarang terpaut pesat, terlebih beberapa akhir ini dan terbaru mengenai tentang kecerdasan buatan. Banyak beberapa raksasa teknologi mengembangkan kecerdasan buatan yang bertujuan untuk mempermudah pekerjaan manusia. Salah satunya adalah ChatGPT. ChatGPT dikembangkan oleh OpenAI, perusahaan riset kecerdasan buatan yang berbasis di San Francisco, California, Amerika Serikat, pada tahun 2020 dan diperkenalkan secara resmi kepada publik pada tahun 2021. ChatGPT dikembangkan berdasarkan model bahasa generatif terdalam sebelumnya, yaitu GPT-3. Keberadaan ChatGPT menjadi bukti kemajuan teknologi chatbot saat ini. Penelitian yang saya lakukan mengusung tema Analisis Sentimen Pengguna Twitter di Indonesia terhadap ChatGPT Menggunakan Algoritma C4.5 dan Naïve Bayes. Data penelitian bersumber dari pengguna Twitter, spesifik di Indonesia. Penelitian ini bertujuan untuk menganalisis pola penggunaan Twitter di Indonesia terhadap ChatGPT menggunakan algoritma C4.5 dan Naïve Bayes. Dengan menggunakan RapidMiner, metode C4.5 digunakan untuk mengidentifikasi pola penggunaan Twitter yang paling signifikan dalam interaksi dengan ChatGPT, sedangkan metode Naïve Bayes digunakan untuk mengklasifikasikan jenis interaksi yang paling umum terjadi antara pengguna Twitter dan ChatGPT. Perbandingan kedua algoritma mendapat hasil accuracy = 77.33%, precision = 100.00%, recall = 30.18%. Kesimpulan dari hasil tersebut adalah positif, artinya respon atau sentimen yang diambil dari sosial media twitter khususnya di Indonesia menunjukkan feedback baik terhadap ChatGPT. Kata Kunci: ChatGPT, Twitter, Analisis Sentimen, C4.5, Naïve Bayes
IMPLEMENTASI FAILOVER VPN KANTOR PUSAT DAN CABANG MENGGUNAKAN TEKNOLOGI SDWAN DENGAN STRATEGI BEST QUALITY Hidayat, Sahrul; Akbar, Yuma
Jurnal Indonesia : Manajemen Informatika dan Komunikasi Vol. 4 No. 3 (2023): September
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) STMIK Indonesia Banda Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jimik.v4i3.386

Abstract

Head office and branch VPN networks are used to connect the head office with branches spread across geographically separated areas. However, network security and availability can be affected by various factors, such as internet connection failures, excessive bandwidth usage, and other disturbances. To overcome this, researchers provide a solution for implementing Failover VPN at the head office and branches using SDWAN technology. With SDWAN, companies can choose a connection path that is more reliable and has a higher speed, thereby optimizing bandwidth usage and improving network availability. In this study, researchers tried to simulate Headquarters and Branch Office VPN Failover Using SDWAN Technology with the Best Quality Strategy at PNETLab. This study uses 2 connections, namely internet connection and MPLS. MPLS is Primary and the internet as Backup. The test is carried out using three schemes, scheme 1 when in normal conditions, scheme 2 when the packet loss on the MPLS link increases then traffic is taken over by the internet connection, and scheme 3 when the packet loss on the MPLS link returns to normal.
OPTIMALISASI KINERJA JARINGAN WAN PADA PENYEDIA JASA LAYANAN INTERNET MENGGUNAKAN TEKNOLOGI EVPN-MPLS Adhipramana, Fernanda; Akbar, Yuma
Jurnal Indonesia : Manajemen Informatika dan Komunikasi Vol. 4 No. 3 (2023): September
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) STMIK Indonesia Banda Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jimik.v4i3.387

Abstract

An efficient and reliable WAN network is the key to success for modern businesses. With the increasing complexity of the network and the challenges in monitoring BUM traffic (Broadcast, Unkown Unicast, Multicast), a more sophisticated solution is needed. This research focuses on the use of EVPN-MPLS as a superior option for L2VPN technology. Using the Network Development Life Cycle (NDLC) method, this research implements EVPN-MPLS using Juniper devices and conducts performance testing using the PNET-LAB simulation application. The results show that EVPN-MPLS outperforms in terms of latency, jitter, and BUM traffic monitoring. In a testing scenario where one of the PE routers is down, EVPN experiences a packet loss of 4%, while VPLS reaches 12-16%. In addition, the active-active multihoming feature in EVPN-MPLS also offers efficient load balancing and capacity enhancement. Although it requires significant control plane routing resources, EVPN-MPLS promises to improve WAN network performance, especially for internet service providers. This research is expected to provide insights and practical recommendations for those who want to optimize their WAN network management.
KLASIFIKASI PEMANFAATAN OPEN SOURCE RESOURCE PADA MULTI-EDGE COMPUTING DENGAN JARINGAN PRIVATE 5G YANG BERKUALITAS DAN LOW LATENCY MENGGUNAKAN TEKNOLOGI NETWORK SLICING Prasetiyo, Oka; Akbar, Yuma
Jurnal Indonesia : Manajemen Informatika dan Komunikasi Vol. 4 No. 3 (2023): September
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) STMIK Indonesia Banda Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jimik.v4i3.391

Abstract

Multi-edge computing is one of the technologies that allows data processing to be performed at the edge of the network, thereby reducing latency and speeding up overall data processing. On the other hand, 5G private networks with high quality and low latency enable fast and stable data transmission. However, in implementing multi-edge computing technology with 5G private networks, it is necessary to use the right open source resources to support its success at a lower investment cost. This thesis aims to classify the utilization of open source resources in multi-edge computing technology with quality and low latency 5G private networks using network slicing technology. The development methodology includes literature study, system development, data collection, data analysis, and system performance evaluation implemented on top of type 2 hypervisor virtualization on Virtualbox. The results of this thesis are expected to show that there are several open source resources that can be used in multi-edge computing technology with 5G private networks, such as Open5gs, Kubernetes, Virtualbox, so as to form a network with low latency and low cost.
OPTIMALISASI KINERJA JARINGAN VPN DENGAN METODE DMVPN Juliansah, Jodi; Akbar, Yuma
Jurnal Indonesia : Manajemen Informatika dan Komunikasi Vol. 4 No. 3 (2023): September
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) STMIK Indonesia Banda Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jimik.v4i3.412

Abstract

DMVPN (Dynamic Multipoint Virtual Private Network) is a VPN technology that can simplify the configuration process and improve network efficiency. The purpose of this research was conducted as a response to the obstacles experienced by companies in VPN network performance that did not meet expectations and reduced high operational and infrastructure costs related to the performance of the current VPN network. In addition, to determine the extent to which the use of DMVPN can improve the performance of VPN networks in companies. The method used is data collection through observation and interviews, and analysis of the data that has been collected. The results showed that the use of DMVPN can increase the efficiency of the VPN network in the company by reducing traffic load and speeding up the data transmission process. Therefore, DMVPN technology is highly recommended for companies that require complex VPN networks and need optimal network performance. The results of this research are expected to provide a better understanding of the potential and effectiveness of using DMVPN in optimizing the performance of VPN networks in companies. It is expected that the implementation of DMVPN can increase data transfer speed, reduce latency, and increase data security in VPN networks. In addition, it is also expected that the use of DMVPN can reduce the operational and infrastructure costs associated with VPN networks, so that companies can achieve higher efficiency
Analisis Efektivitas Keamanan Jaringan Layer 2: Port Security, VLAN Hopping, DHCP Snooping Nurfaishal, Muhammad Dzaky; Akbar, Yuma
Jurnal Indonesia : Manajemen Informatika dan Komunikasi Vol. 5 No. 3 (2024): September
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) STMIK Indonesia Banda Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jimik.v5i3.975

Abstract

In the industrial era 4.0, which is marked by the rapid progress of computer networks and the internet, network security at Layer 2 is part of the Data Link Layer in the OSI model, which is very important considering the increasing number of cyber threats. This research aims to compare the effectiveness of various security algorithms applied to Layer 2 switches, namely MAC Address Filtering with Port Security, VLAN Hopping Mitigation, and DHCP Snooping. Some of these methods have the function or purpose of creating MAC address filtering, port limitations, VLAN protection, ARP, etc. The device used to conduct this research is a Cisco Switch. This research uses an experimental approach by implementing each method in different network scenarios and comparing it with external data, measuring effectiveness based on attack detection and prevention, as well as its impact on network performance, then combining several of these methods into one scope. The results show that each method has its own advantages and disadvantages, which function to block various types of attacks such as Flooding, Snooping, and Rogue DHCP. It is highly recommended to combine all security methods into one integrated system.
Analisis Sentimen Respon Publik Terhadap Program Internet Gratis di Platform X Melalui Pendekatan Algoritma Naïve Bayes Julianto, Muhammad Rizky; Akbar, Yuma; Wahyudi, Tri
Jurnal Indonesia : Manajemen Informatika dan Komunikasi Vol. 5 No. 3 (2024): September
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) STMIK Indonesia Banda Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jimik.v5i3.981

Abstract

The free internet program was launched in response to the public's need for affordable internet access. Digital transformation relies on four main pillars, including infrastructure, government, digital society, and the economy. In addition, connectivity is also an important component. Indonesia is one of the countries where many people are not connected to the internet. We Are Social reported that there are 63.51 million people throughout the country who have not been connected to the internet until early 2023. The number is the eighth largest globally. After the acceleration of ICT infrastructure development, there is a need for a free internet program initiated by the government or certain organizations that aims to provide wider and more equitable internet access, especially to students and the general public, especially in areas that have not yet received internet access. Although free internet programs are very beneficial, it is undeniable that there are a number of negative impacts that need to be considered. It is important to be aware of and overcome its negative impact. It is necessary to Sentiment Analysis of free internet programs to find out how much positive and negative responses there are in this program with the Naive Bayes algorithm approach so that the need for free internet programs can be realized.
Manajemen Bandwidth Jaringan dengan Metode Per Connection Queue (PCQ) Pada Mikrotik di Masterpiece Family Karaoke Tebet Anwar, Imam Dzikrilloh; Akbar, Yuma
Jurnal Indonesia : Manajemen Informatika dan Komunikasi Vol. 5 No. 3 (2024): September
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) STMIK Indonesia Banda Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jimik.v5i3.986

Abstract

Masterpiece Family Karaoke Tebet frequently faces bandwidth management issues, especially during evenings and weekends due to uneven bandwidth usage. This causes network congestion and a decline in service quality, negatively impacting customer experience. To address this issue, this study applies the Per Connection Queue (PCQ) method on MikroTik devices. The PCQ method ensures fair and efficient bandwidth distribution among users and manages usage time to maintain network stability. This study involves several stages: problem identification, a literature review to explore previously applied bandwidth management methods, and data collection through direct observation at Masterpiece Family Karaoke Tebet during peak times. The PCQ implementation involves configuring MikroTik devices to distribute bandwidth fairly among users. Network performance is evaluated based on connection speed, network stability, and perceived service quality by comparing data before and after PCQ implementation. The evaluation results show that implementing the PCQ method on MikroTik devices significantly improves network performance. Connection speed increases, network stability is maintained, and perceived service quality improves. Thus, PCQ proves to be an effective solution for addressing bandwidth management issues at Masterpiece Family Karaoke Tebet.
Analisis Konfigurasi Tunnel IPv6, Auto Tunnel, dan ISATAP dalam Pembangunan Infrastruktur Jaringan Akbar, Yuma; Setiawan, Kiki; Aula, Raisah Fajri; Aimar, Muqorrobin
Jurnal Indonesia : Manajemen Informatika dan Komunikasi Vol. 5 No. 3 (2024): September
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) STMIK Indonesia Banda Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jimik.v5i3.993

Abstract

IP (Internet Protocol) is needed to be the address of a device that wants to connect to each other, whether connected locally or to the internet. As technology develops, IP addressing allocation becomes increasingly necessary. The IP address that is often used is IPv4, but IPv4 allocation is increasingly limited. For this reason, a renewable IP version was created, namely IPv6. IPv6 itself has many advantages in terms of security which is equipped with encryption, then in terms of effectiveness in configuration which can use Auto Config, as well as a larger number of allocations compared to IPv4. If IPv4 only uses 32 bits, IPv6 uses 128 bits, for this reason the number of allocations given by IPv6 is much greater. This amount should be able to cover the lack of allocation from IPv4. Therefore, IPv4 to IPv6 migration must be carried out slowly, in-order-to overcome the lack of allocation in IPv4. Fortunately, IPv6 tunneling can run in parallel with IPv4 without disrupting existing infrastructure. Where IPv4 can be used as an Underlay Network (a network that is the foundation of the virtual network above it), and IPv6 will be an Overlay Network (a virtual network that connects users as if they were connected directly, this virtual network must be built on top of the Underlay Network, in this case the IPv6 tunnel will be used as a virtual network).
Co-Authors AA Sudharmawan, AA Abdillah, Gipari Pradina Abdul Shomad Abdulloh Abror, Ikhsan Adhipramana, Fernanda Aditya Bagas Pramudhi Aditya Zakaria Hidayat Adzani, Adinda Mutiara Agung Pratama Agung Wianata Sugeng Kusuma Agung Wiranata Sugeng Kusuma Ahluna, Faza Ahmad Zulfikar Aidil Rizki Hidayat Aimar, Muqorrobin Akhsani, Ziyat Akmaludin Akmaludin Al Ammaar, Mohammad Farroos Albahy, Abdurrahman Asyam Aldi Sitohang Aldino Nur Ihsan Angga Tristhanaya Anita Rosiana Anwar, Imam Dzikrilloh Arfadhillah, Zahra Arham, Muhammad Ari Ramadhan Arief, Yoga Sofyan Arif, Sulthan Cendikia Arinal, Veri Aula, Raisah Fajri Aulia, Mutia Dwi Awang Hariman, Aloisius Azis, Iim Muhaemin Abdul Aziz Septian Amrullah Azzahra, Yasmin Aulia Bachtiar, Yuliana Bebriani, Serli Benny Sulaiman K Betty Yel, Mesra Bintoro, Bayu Bryan Pratama Cahyono, Bayu Adi Candra Milad Ridha Eislam Dadang Iskandar Mulyana` Dadang Iskandar, Dadang Damayanti, Yulia Dava Septya Arroufu Dedi Dwi Saputra Dewa Gde Adi Murthi Udayana Doddy Mulyadi Saputra Edhy Poerwandono Edhy Poerwandono Eka Satria Maheswara Fadhil Khanifan Achmad Fadillah, Fauzan Fahmi Chairulloh Faisal Akbar Farhani, Aulia Febrianti, Syafira Feni Putriani Fentri Boy Pasaribu Fernanda Adhipramana Gusniar Alfian Noor Hartinah, Suci Sugih Haura Salsabila Az-Zahra Hengky, Mario Hidayat, Aditya Zakaria Ikhwanul Kurnia Rahman Jodi Juliansah Juliansah, Jodi Julianto, Muhammad Rizky Kiki Setiawan Lestari, Dinny Amalia M Ilham Setya Aji M Jundi Hakim Mafazi, Luthfillah Marjuki Maulana Putra Hertaryawan, Ryfan Mayangsari, Descania Meilisa Miftahul Huda Mizsuari Muamar Rizky Muhamad Farisi Muhamad Fikri Nugraha Muhammad Faizal Lazuardi Mulya, Citra Pricylia Ananda Nadip, Muhamad Zaeni Nirat Nirat Nirat, Nirat Novianto, Firza NST, Silvan Nufus, Reda Hayati Nugraha, Muhamad Fikri Nur Arif Khairudin Nur Oktavian Nurfaishal, Muhammad Dzaky Nurmaylina, Vivi Oka Prasetiyo Oky Tria Saputra Oky Tria Saputra7 Permatasari, Veren Nita Piqih Akmal Poerwandono, Edhy Praja Raymond , Samuel Pramudita, Diky Prasetiyo, Oka Qibthiyah, Mariyatul Ramadhan, Muhammad Arya Regita, Anggit Nur Hannaa Rezha Mulia Revandy Richard Franido Richard Franido Rizki Maulana, Rizki Rizky Adawiyah Rofika Qolbi S, Fahmi Chairulloh Widia Safhani, Rizca Sahrul Hidayat Sahrul Hidayat Salsabila Putri Wibowo Saputra, Mochammed Erryandra Sarimole, Frencis Matheos Septiansyah, Ade Setiawan, Kiki Sibarani, Julvan Marzuki Putra Sri Lestari SRI LESTARI Sri Lestari Sugiharto, Tri Sugiyono Sugiyono Sugiyono Sumpena Sumpena Sumpena, Sumpena Surapati, Untung Sutisna Sutisna Suwandi Tegar Muhamad Hafiz Tegar Muhamad Hafiz Toriq, Fatkul Tri Wahyudi Tundo, Tundo Untung Surapati Untung Surapati Untung Wahyudi Untung Wahyudi Wahyu Saputro Wijaya, Rohmat WINDU GATA Yusril Nurhadi AS