Claim Missing Document
Check
Articles

Found 4 Documents
Search

EKSPLORASI BUKTI DIGITAL PADA SMART ROUTER MENGGUNAKAN METODE LIVE FORENSICS Abdul Rohman Supriyono; Bambang Sugiantoro; Yudi Prayudi
Infotekmesin Vol 10 No 2 (2019): Infotekmesin: Juli 2019
Publisher : P3M Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35970/infotekmesin.v10i2.48

Abstract

Network devices as media file sharing and can be used as file servers have begun to appear, just as smart router devices can be used as file servers by adding USB Thumb drive as storage media. With the diversity of router devices, it becomes a challenge in digital forensic science when a case occurs by utilizing a smart router device related to file-sharing services. Then it is necessary to study the right method in investigating smart router devices. This paper discusses the use of the live forensics acquisition method in investigating smart router devices, against system log files related to file-sharing activities. In identifying the process of searching, recognizing, and documenting potential things as digital evidence of processing devices and digital media storage. The acquisition process uses two methods, namely the live acquisition method on the router device and physical acquisition on the device that is used as storage media on the smart router.
Analisis Perbandingan Kinerja TCP Vegas dan TCP New Reno Menggunakan Antrian Drop Tail Dony Fahrudy; Bambang Sugiantoro
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 7 No. 1 (2022): Januari 2022
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2101.254 KB) | DOI: 10.14421/jiska.2022.7.1.20-32

Abstract

TCP was developed to deal with problems that often occur in the network, such as congestion problems. Congestion can occur when the number of packets transmitted in the network approaches the network capacity which can cause network problems. This can be overcome by implementing TCP and queue management. In this research, we will test the performance of TCP Newreno and TCP Vegas using NS-2 in the Drop Tail queue. The performance parameters used are throughput, packet drop, and congestion window with additional buffer capacity. The test results for the congestion window and packet drop parameters, TCP Vegas has better performance when the buffer gets bigger when congestion occurs with the congestion window smaller than TCP New Reno and the average packet drop is 18.33 packets compared to TCP New Reno with an average of 18.33 packets. average 41.67 packets. For throughput parameters, TCP New Reno has better performance with an average of 6.77253 Mbps than TCP Vegas with an average of 4.29693 Mbps. From testing and analysis that TCP Vegas has better performance than TCP New Reno when using Drop Tail queues.
PEMANFAATAN HASIL REPORT NEXT-GENERATION FIREWALL SEBAGAI SECURITY AWARENESS Akhmad Muzakka; Bambang Sugiantoro; Yudi Prayudi
Cyber Security dan Forensik Digital Vol. 2 No. 2 (2019): Edisi November 2019
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (735.904 KB) | DOI: 10.14421/csecurity.2019.2.2.1600

Abstract

Keamanan informasi merupakan ranah multidisiplin dalam konsentrasi pengembangan dan pelaksanaan dari berbagai mekanisme yang ada untuk menjaga informasi sesuai pada tempatnya. Secara umum, unsur keamanan informasi terdiri dari ketersediaan, integritas, dan kerahasiaan informasi tersebut. Keamanan informasi erat kaitannya dengan konsep manajemen resiko karena potensi ancaman yang diberikan akan menimbulkan kerentanan bagi aset suatu organisasi. Sebagai salah satu upaya untuk mengukur tingkat kematangan dan kesiapan suatu instansi dalam bidang keamanan informasi adalah dengan menggunakan penilaian indeks keamanan informasi (KAMI). Indeks KAMI memiliki 5 area evaluasi yang terangkum dari area yang dimiliki oleh ISO/IEC 27001:2013. Kelima area tersebut adalah tata kelola, pengelolaan resiko, kerangka kerja, pengelolaan aset, dan aspek teknologi. Tujuan dari penelitian tersebut adalah untuk mengetahui adakah perbedaan dan seberapa besar perbedaan jumlah nilai Indeks KAMI ketika Bidang LTI menggunakan NGFW sebagai acuan untuk security awareness. Dari hasil pre-assesment dan post-assesment, ditemukan perbedaan jumlah nilai indeks KAMI dari 403 menjadi 444. Perbedaan yang cukup signifikan berada pada 3 area, yaitu Tata Kelola, Pengelolaan Aset, dan Teknologi dan Keamanan Informasi. Namun, peningkatan tersebut belum cukup untuk menaikkan hasil evaluasi akhir yang masih berada pada “Pemenuhan Kerangka Kerja Dasar” dengan tingkat kematangan mengalami kenaikan dari I+ menjadi Tingkat II pada area “Pengelolaan Aset” dan pada area “Teknologi dan Keamanan Informasi”. Pada kedua area yang mengalami kenaikan yang cukup signifikan dikarenakan responden merasa lebih aware terhadap keamanan yang diterapkan pada jaringan yang dikelola. Hal tersebut juga diterapkan melalui rekomendasi yang sudah diberikan sebelumnya dan dijalankan disesuaikan dengan SOP yang ada pada bidang kerjanya. Hasil dari penelitian tersebut adalah Bidang LTI mampu menggunakan NGFW yang dimiliki untuk pengamanan jaringan yang dikelola, serta ada peningkatan nilai Indeks KAMI setelah menggunakan report dari Firewall Report Center sebagai security awareness
ANALISIS KEAMANAN SISTEM INFORMASI AKADEMIK UIN SUNAN KALIJAGA Aries Firmansyah; Bambang Sugiantoro
Seminar Nasional Informatika (SEMNASIF) Vol 1, No 1 (2017): “e-Defense : Menjaga keamanan data menghadapi cyber warfare untuk memperkokoh ke
Publisher : Jurusan Teknik Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The Academic Information System is is designed to support what you want users completed, the operating system must support the network to a certain extent. Therefore the need to be analysed performance computer network on information systems academic UIN Sunan Kalijaga Yogyakarta later the analysis can be used for development in the future. Testing tissue using a performance QoS (Quality of Service) and testing attacks have DDOS.Research phase based on the quantitative method as the data collection to knowing how big performance of the academic information system to DDOS attack, scenario using big packet sent and conducted performance analysis of performance of the Academic Information System of UIN Sunan Kalijaga Yogyakarta emphasizes on monitoring of system and bandwidth parameters measurement, delay and packet loss on the network infrastructure that has been there is.The result of measurement and monitoring Quality of Service on Academic Information System of UIN Sunan Kalijaga toward the Distributed Denial of Service attack (DDoS) decreased by the highest average score of bandwidth transfer rate 2.4 KBps what happened in the 1 PC attack and 10.1 KBps what happened in 2 PC attack. According to THIPON version, delay parameters indicated the average score of delay is bigger than 450 ms what happened in 1 PC attack by score 928.3 ms and 2 PC score 880.6 ms included in bad category. Meanwhile on packet loss parameters of 1 PC attack score 50.5 % and 2 PC score 82.2 % included in bad category that is by packet loss ranges more than 25 %.