p-Index From 2021 - 2026
18.298
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering ComEngApp : Computer Engineering and Applications Journal JURNAL SISTEM INFORMASI BISNIS JTEV (Jurnal Teknik Elektro dan Vokasional Techno.Com: Jurnal Teknologi Informasi Jurnal Buana Informatika TELKOMNIKA (Telecommunication Computing Electronics and Control) Jurnal Informatika Jurnal Sarjana Teknik Informatika Jurnal Ilmiah Teknik Elektro Komputer dan Informatika (JITEKI) Prosiding Seminar Nasional Sains Dan Teknologi Fakultas Teknik Jurnal Teknik Elektro PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic CommIT (Communication & Information Technology) Jurnal Ilmiah Kursor Jurnal Informatika Jurnal Teknologi Informasi dan Ilmu Komputer Telematika Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika Scientific Journal of Informatics Seminar Nasional Informatika (SEMNASIF) ELINVO (Electronics, Informatics, and Vocational Education) Annual Research Seminar INFORMAL: Informatics Journal Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika Register: Jurnal Ilmiah Teknologi Sistem Informasi Proceeding of the Electrical Engineering Computer Science and Informatics Edu Komputika Journal Format : Jurnal Imiah Teknik Informatika Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) International Journal of Artificial Intelligence Research RABIT: Jurnal Teknologi dan Sistem Informasi Univrab SISFOTENIKA Journal of Information Technology and Computer Science (JOINTECS) JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING INTENSIF: Jurnal Ilmiah Penelitian dan Penerapan Teknologi Sistem Informasi JIKO (Jurnal Informatika dan Komputer) AKSIOLOGIYA : Jurnal Pengabdian Kepada Masyarakat JURNAL MEDIA INFORMATIKA BUDIDARMA JIEET (Journal of Information Engineering and Educational Technology) Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control CogITo Smart Journal IT JOURNAL RESEARCH AND DEVELOPMENT Insect (Informatics and Security) : Jurnal Teknik Informatika JITK (Jurnal Ilmu Pengetahuan dan Komputer) JOURNAL OF APPLIED INFORMATICS AND COMPUTING JURNAL REKAYASA TEKNOLOGI INFORMASI Abdimas Dewantara PROCESSOR Jurnal Ilmiah Sistem Informasi, Teknologi Informasi dan Sistem Komputer JURNAL TEKNIK INFORMATIKA DAN SISTEM INFORMASI JURNAL INSTEK (Informatika Sains dan Teknologi) ILKOM Jurnal Ilmiah Compiler Jiko (Jurnal Informatika dan komputer) MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer JSiI (Jurnal Sistem Informasi) CYBERNETICS Digital Zone: Jurnal Teknologi Informasi dan Komunikasi IJID (International Journal on Informatics for Development) J-SAKTI (Jurnal Sains Komputer dan Informatika) JURIKOM (Jurnal Riset Komputer) Komputasi: Jurnal Ilmiah Ilmu Komputer dan Matematika JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Abdimas Umtas : Jurnal Pengabdian kepada Masyarakat EDUMATIC: Jurnal Pendidikan Informatika Building of Informatics, Technology and Science Jurnal Mantik NUKHBATUL 'ULUM : Jurnal Bidang Kajian Islam Jutisi: Jurnal Ilmiah Teknik Informatika dan Sistem Informasi JISKa (Jurnal Informatika Sunan Kalijaga) Buletin Ilmiah Sarjana Teknik Elektro Indonesian Journal of Business Intelligence (IJUBI) Mobile and Forensics Aviation Electronics, Information Technology, Telecommunications, Electricals, Controls (AVITEC) Jurnal Pengabdian Masyarakat Bumi Raflesia Cyber Security dan Forensik Digital (CSFD) Jurnal Abdi Insani JOURNAL OF INFORMATION SYSTEM RESEARCH (JOSH) Journal of Computer System and Informatics (JoSYC) International Journal of Advances in Data and Information Systems Journal of Innovation Information Technology and Application (JINITA) Journal of Education Informatic Technology and Science Jurnal Bumigora Information Technology (BITe) Infotech: Journal of Technology Information Jurnal Teknologi Informatika dan Komputer SKANIKA: Sistem Komputer dan Teknik Informatika Jurnal Pengabdian kepada Masyarakat Nusantara Jurnal REKSA: Rekayasa Keuangan, Syariah dan Audit Jurnal Teknik Informatika (JUTIF) Jurnal FASILKOM (teknologi inFormASi dan ILmu KOMputer) Jurnal Computer Science and Information Technology (CoSciTech) Phasti: Jurnal Teknik Informatika Politeknik Hasnur Jurnal Pengabdian Masyarakat Indonesia Euler : Jurnal Ilmiah Matematika, Sains dan Teknologi EDUTECH : Jurnal Inovasi Pendidikan Berbantuan Teknologi J-SAKTI (Jurnal Sains Komputer dan Informatika) Decode: Jurnal Pendidikan Teknologi Informasi Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen Jurnal Informatika Teknologi dan Sains (Jinteks) Techno Lambda: Jurnal Ilmiah Pendidikan MIPA dan Aplikasinya Engineering Science Letter Journal of Novel Engineering Science and Technology Jurnal Informatika: Jurnal Pengembangan IT Jurnal Software Engineering and Computational Intelligence Mohuyula : Jurnal Pengabdian Kepada Masyarakat Scientific Journal of Informatics Khazanah Informatika : Jurnal Ilmu Komputer dan Informatika JOCHAC
Claim Missing Document
Check
Articles

Mobile Forensic Investigation of Fake News Cases on Instagram Applications with Digital Forensics Research Workshop Framework Riadi, Imam; Herman, Herman; Rafiq, Irhash Ainur
International Journal of Artificial Intelligence Research Vol 6, No 2 (2022): Desember 2022
Publisher : Universitas Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (387.119 KB) | DOI: 10.29099/ijair.v6i2.311

Abstract

The number of digital crimes or cybercrimes today continues to increase every year, and lately a lot of it happens on social media like Instagram. The social behavior of today's people who communicate more through social media encourages the perpetrators of these digital crimes. Instagram is a social media that is often found content that contains elements of pornography, hoax news, hate speech, etc. This research is aimed at processing digital evidence of cases of the spread of hoax news on the Instagram application. This research follows the framework of the Digital Forensics Research Workshop (DFRWS) with six stages, namely identification, preservation, collection, examination, analysis, and presentation. The process of obtaining digital evidence is assisted by the application of Axiom Magnet and Cellebrite UFED. Digital evidence sought from the smartphone device of the suspected hoax news disseminator seized following the case scenario consists of 8 variables in the form of accounts, emails, images, videos, URLs, times, IP address, and location. The results of this research with the help of the application of Magnet Axiom digital proof obtained 87.5% and the Cellebrite UFED application of 68.75%. The results of this study show that Magnet Axiom has better performance than MOBILedit Forensics.
Analisis Forensik Solid State Drive (SSD) Menggunakan Framework Rapid Response Nasrulloh, Imam Mahfudl; Sunardi, Sunardi; Riadi, Imam
Jurnal Teknologi Informasi dan Ilmu Komputer Vol 6 No 5: Oktober 2019
Publisher : Fakultas Ilmu Komputer, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (4256.88 KB) | DOI: 10.25126/jtiik.2019651516

Abstract

Teknologi komputer pada empat tahun terahir ini mengalami perkembangan yang pesat. Bersamaan dengan itu juga berdampak negatif salah satunya adalah berupa kejahatan komputer. Kejahatan komputer akan meninggalkan jejak aktivitas kejahatan, maka perlu dilakukan analisa dengan ilmu dan metode forensik untuk mendapatkan barang bukti. Bagaimana jika terjadi kejahatan komputer pada media penyimpanan komputer berjenis non-volatile memory dan dilakukan secara live forensik. Pada penelitian ini dilakukan proses forensik pada Solid State Drive (SSD) dengan framework Grr Rapid Response pada kasus kehilangan data (lost data) suatu organisasi. Langkah kerja forensik mengimplementasikan dari National Institute of Standards Technology (NIST). Framework Grr Rapid Response digunakan untuk memberikan tanggapan terhadap insiden forensik digital yang difokuskan pada lingkungan forensik jarak jauh, framework ini berbasis arsitektur client server. Hasil penelitian ini menunjukkan langkah kerja forensik NIST dapat diimplementasikan pada proses pengambilan bukti digital dengan metode akuisisi secara live forensik,  kemampuan tool forensik pada proses eksaminasi Grr Rapid Response pada Workstation (Client Grr) dengan media simpan SSD, bukti digital dapat ditemukan dan dikembalikan. Bukti digital yang dapat dikembalikan berupa file dokumen, dan hasil validasi pada bukti digital tersebut memiliki nilai hash yang sama dari dua algoritma validasi bukti digital yang diimplementasikan, MD5 dan SHA-1. Sehingga hasil integritas dari dokumen tersebut menunjukkan bahwa bukti digital tersebut identik. AbstractComputer technology in the last four years has experienced rapid development. At the same time, it also has a negative impact, one of which is a computer crime. Computer crime will leave traces of criminal activity, so it is necessary to analyze with forensic science and methods to obtain evidence. What if there is a computer crime on a computer storage medium of a type of non-volatile memory and carried out live forensics In this study a forensic process on Solid State Drive (SSD) was carried out with the Grr Rapid Response framework for lost data in an organization. The forensic work step is implemented from the National Institute of Standards Technology (NIST). The Grr Rapid Response Framework is used to provide responses to incidents of digital forensics focused on remote forensic environments, this framework is based on a client server architecture. The results of this study indicate that NIST's forensic work steps can be implemented in the process of taking digital evidence with live forensic acquisition methods, the ability of forensic tools in the Grr Rapid Response examination process on Workstations (Client Grr) with SSD storage media, digital evidence can be found and returned. Digital evidence that can be returned is a document file, and the results of the validation of digital evidence have the same hash value from the two digital proof validation algorithms implemented, MD5 and SHA-1. So the results of the integrity of the document so that the digital evidence is identical.
Eksplorasi ABAC dan XACML untuk Design Access Control pada Resource Digital Natsir, Fauzan; Riadi, Imam; Prayudi, Yudi
Jurnal Teknologi Informasi dan Ilmu Komputer Vol 6 No 5: Oktober 2019
Publisher : Fakultas Ilmu Komputer, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (3793.821 KB) | DOI: 10.25126/jtiik.2019651679

Abstract

Resource digital memerlukan sebuah mekanisme untuk mengatur policy terhadap kontrol untuk mendapatkan hak akes ke dalam suatu sistem. Akses kontrol lebih fleksibel dibanding dengan pendekatan otorisasi, autentikasi ataupun verifikasi yang sangat sederhana. Mekanisme access control policy dengan pendekatan atribut diyakini sebagai solusi adaptif yaitu ABAC (Attribute Based Access Control) dengan implementasi model XACML (Extensible Access Control Modelling Language). Desain policy ABAC ini disajikan dengan atribut-atribut dari salah satu studi kasus resource digital dengan sistem e-Library. e-Library merupakan salah satu resource digital dimana proses autentikasinya belum dimodelkan dengan atrubut subjek yang ada. Penelitian ini diawali dari identifikasi atribut dari rule, pemodelan ABAC resource digital, implementasi XACML, simulasi sistem dan analisis sistem. Hasil dari pengujian akses kontrol menggunakan ALFA (Axiomatics Language for Authorization) untuk pemberian kinerja akses kontrol terhadap resource digital. Hasil analisis dengan pendekatan ABAC dengan model XACML ini menyajikan suatu keamanan sistem dengan model akses kontrol berbasis atribut dari policy statement untuk menjadi solusi model akses kontrol yang dibuat sebelumnya dan mendukung model akses kontrol yang relevan untuk resource digitalAbstractDigital resources require a mechanism to regulate policy against controls to get access rights to a system. Access control is more flexible than the very simple approach of authorization, authentication or verification. The access control policy with the attribute approach is believed to be an adaptive solution, namely ABAC (Attribute Based Access Control) with the implementation of the XACML (Extensible Access Control Modeling Language) model. This ABAC policy design is presented with attributes from one of the digital resource case studies with the e-Library system. e-Library is one of the digital resources where the authentication process has not been modeled with the existing subject matter. This study begins with the identification of the attributes of the rule, digital ABAC resource modeling, XACML implementation, system simulation and system analysis. The results of testing access control using ALFA (Axiomatics Language for Authorization) to provide performance control access to digital resources. The results of the analysis using the ABAC approach with the XACML model present a system security with attribute-based access control models from policy statements to be a solution to the previously created access control model and support the access control model relevant for digital resources
Forensik Internet Of Things pada Device Level berbasis Embedded System Haryanto, Eri; Riadi, Imam
Jurnal Teknologi Informasi dan Ilmu Komputer Vol 6 No 6: Desember 2019
Publisher : Fakultas Ilmu Komputer, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (4014.539 KB) | DOI: 10.25126/jtiik.2019661828

Abstract

Perangkat Internet of Things (IoT) merupakan perangkat cerdas yang memiliki interkoneksi dengan jaringan internet global. Investigasi kasus yang menyangkut perangkat IoT akan menjadi tantangan tersendiri bagi investigator forensik. Keberagaman jenis perangkat dan teknologi akan memunculkan tantangan baru bagi investigator forensik. Dalam penelitian ini dititikberatkan forensik di level internal device perangkat IoT. Belum banyak bahkan belum penulis temukan penelitian sejenis yang fokus dalam analisis forensik perangkat IoT pada level device. Penelitian yang sudah dilakukan sebelumnya lebih banyak pada level jaringan dan level cloud server perangkat IoT. Pada penelitian ini dibangun environment perangkat IoT berupa prototype smart home sebagai media penelitian dan kajian tentang forensik level device. Pada penelitian ini digunakan analisis model forensik yang meliputi collection, examination, analysis, dan reporting dalam investigasi forensik untuk menemukan bukti digital. Penelitian ini berhasil mengungkap benar-benar ada serangan berupa injeksi malware terhadap perangkat IoT yang memiliki sistem operasi Raspbian, Fedberry dan Ubuntu Mate. Pengungkapan fakta kasus mengalami kesulitan pada perangkat IoT yang memiliki sistem operasi Kali Linux. Ditemukan 1 IP Address komputer penyerang yang diduga kuat menanamkan malware dan mengganggu sistem kerja perangkat IoT.AbstractThe Internet of Things (IoT) is an smart device that has interconnection with global internet networks. Investigating cases involving IoT devices will be a challenge for forensic investigators. The diversity of types of equipment and technology will create new challenges for forensic investigators. In this study focused on forensics at the IoT device's internal device level, there have not been many similar research that focuses on forensic analysis of IoT devices at the device level. Previous research has been done more at the network level and cloud level of IoT device's. In this study an IoT environment was built  a smart home prototype as a object for research and studies on forensic level devices. This study, using forensic model analysis which includes collection, examination, analysis, and reporting in finding digital evidence. This study successfully revealed that there was really an attack in the form of malware injection against IoT devices that have Raspbian, Fedberry and Ubuntu Mate operating systems. Disclosure of the fact that the case has difficulties with IoT devices that have the Kali Linux operating system. Found 1 IP Address of an attacker's computer that is allegedly strongly infusing malware and interfering with the work system of IoT devices.
Perbandingan Tool Forensik Data Recovery Berbasis Android menggunakan Metode NIST Riadi, Imam; Sunardi, Sunardi; Sahiruddin, Sahiruddin
Jurnal Teknologi Informasi dan Ilmu Komputer Vol 7 No 1: Februari 2020
Publisher : Fakultas Ilmu Komputer, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Perkembangan smartphone tidak hanya memberikan dampak positif tetapi dapat berdampak negatif  ketika dimanfaatkan untuk melakukan tindakan kejahatan. Saat ini terdapat banyak kasus penghapusan barang bukti kejahatan untuk menghilangkan jejak pelaku. Barang bukti yang telah dihapus menjadi problem bagi pihak berwajib untuk membuktikan kejahatan pelaku dalam persidangan. Peneltian ini bertujuan membandingakan kinerja tool forensik  dalam mengembalikan data yang telah dihapus berupa data kontak, log panggilan, dan pesan yang  digunakan sebagai barang bukti dalam persidangan. Penelitian ini menggunakan dua smartphone serta dua tool forensik Wondershare dr. Fone for Android dan Oxygen Forensics Suite 2014, dan menggunakan metode NIST yang memiliki kerangka kerja dan proses forensik terstruktur yang menjamin investigator mengikuti langkah penelitian agar hasilnya dapat dipertanggung jawabkan. Hasil penelitian ini bahwa Wondershare pada smartphone 1 berhasil mengembalikan data terhapus dengan persentase keberhasilan 31%, sementara Oxygen mencapai keberhasilan 67%.  Pada smartphone 2 Wondershare berhasil mengembalikan data terhapus dengan persentase keberhasilan mencapai 35% dan Oxygen memiliki persentase keberhasilan 69%. Dari hasil yang diperoleh dapat disimpulkan bahwa Oxygen Forensics Suite 2014 memiliki kinerja yang baik daripada Wondershare dr. Fone for Android dalam mengembalikan data yang telah dihapus, dan bukti digital yang diperoleh dengan Oxygen dapat digunakan untuk menyelesaikan kasus kejahatan di persidangan. AbstractThe development of smartphones not only has a positive impact but can have a negative impact when it is used to commit a crime. At present, there are many cases of elimination of evidence of the crime to eliminate traces of perpetrators. Evidence that has been removed becomes a problem for the authorities to prove the crime of the perpetrators in the trial. This research aims to compare the performance of the forensic tool in returning deleted data in the form of contact data, call logs, and messages used as evidence in the trial. This research uses two smartphones as well as two Wondershare forensic tools from dr. Fone for Android and Oxygen Forensics Suite 2014, and use the NIST method which has a structured framework and forensic process that ensures investigators follow the steps of the research so that the results can be justified. The results of this research that Wondershare on smartphone 1 managed to restore deleted data with a success percentage of 31%, while Oxygen achieved 67% success. On Wondershare 2 smartphones, the data returned was deleted with a success rate of 35% and Oxygen having a success rate of 69%. From the results obtained it can be concluded that the Oxygen Forensics Suite 2014 has a good performance than Wondershare dr. Fone for Android in returning data that has been deleted, and digital evidence obtained with Oxygen can be used to resolve criminal cases in court.
Analisis Keamanan Website Open Journal System Menggunakan Metode Vulnerability Assessment Riadi, Imam; Yudhana, Anton; W, Yunanri
Jurnal Teknologi Informasi dan Ilmu Komputer Vol 7 No 4: Agustus 2020
Publisher : Fakultas Ilmu Komputer, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25126/jtiik.2020701928

Abstract

Open Journal System (OJS) merupakan perangkat lunak yang berfungsi sebagai sarana publikasi ilmiah dan digunakan diseluruh dunia. OJS yang tidak dipantau beresiko diserang oleh hacker.  Kerentanan yang di timbulkan oleh hacker akan berakibat buruk terhadap performa dari sebuah OJS.  Permasalahan yang dihadapi pada sistem OJS meliputi network, port discover, proses audit exploit sistem OJS. Proses audit sistem pada OJS mencakup SQL Injection, melewati firewall pembobolan password. Parameter input yang digunakan adalah IP address dan port open access. Metode yang digunakan adalah vulnerability assessment. Yang terdiri dari beberapa tahapan seperti information gathering atau footprinting, scanning vulnerability, reporting. Kegiatan ini bertujuan untuk mengidentifikasi celah keamanan pada website open journal system (OJS). Penelitian ini menggunakan open web application security project (OWASP). Pengujian yang telah dilakukan berhasil mengidentifikasi 70 kerentanan high, 1929 medium, 4050 low pada OJS, Total nilai vulnerability pada OJS yang di uji coba sebesar 6049. Hasil pengujian yang dilakukan menunjukkan bahwa pada OJS versi 2.4.7 memiliki banyak celah kerentanan atau vulnerability, tidak di rekomendasi untuk digunakan. Gunakanlah versi terbaru yang dikeluarkan oleh pihak OJS Public knowledge  project (PKP). AbstractThe Open Journal System (OJS) is A software that functions as a means of scientific publication and is used throughout the world. OJS that is not monitored is at risk of being attacked by hackers. Vulnerabilities caused by hackers will adversely affect the performance of an OJS. The problems faced by the OJS system include the network, port discover, OJS system audit exploit process. The system audit process on the OJS includes SQL Injection, bypassing the firewall breaking passwords. The input parameters used are the IP address and open access port. The method used is a vulnerability assessment. Which consists of several stages such as information gathering or footprinting, scanning vulnerability, reporting. This activity aims to identify security holes on the open journal system (OJS) website. This study uses an open web application security project (OWASP). Tests that have been carried out successfully identified 70 vulnerabilities high, 1929 medium, 4050 low in OJS, the total value of vulnerability in OJS which was tested was 6049. The results of tests conducted showed that in OJS version 2.4.7 had many vulnerabilities or vulnerabilities, not on recommendations for use. Use the latest version issued by the OJS Public Knowledge Project (PKP).
Identifikasi Emosi Manusia Berdasarkan Ucapan Menggunakan Metode Ekstraksi Ciri LPC dan Metode Euclidean Distance Helmiyah, Siti; Riadi, Imam; Umar, Rusydi; Hanif, Abdullah; Yudhana, Anton; Fadlil, Abdul
Jurnal Teknologi Informasi dan Ilmu Komputer Vol 7 No 6: Desember 2020
Publisher : Fakultas Ilmu Komputer, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25126/jtiik.2020722693

Abstract

Ucapan merupakan sinyal yang memiliki kompleksitas tinggi terdiri dari berbagai informasi. Informasi yang dapat ditangkap dari ucapan dapat berupa pesan terhadap lawan bicara, pembicara, bahasa, bahkan emosi pembicara itu sendiri tanpa disadari oleh si pembicara. Speech Processing adalah cabang dari pemrosesan sinyal digital yang bertujuan untuk terwujudnya interaksi yang natural antar manusia dan mesin. Karakteristik emosional adalah fitur yang terdapat dalam ucapan yang membawa ciri-ciri dari emosi pembicara. Linear Predictive Coding (LPC) adalah sebuah metode untuk mengekstraksi ciri dalam pemrosesan sinyal. Penelitian ini, menggunakan LPC sebagai ekstraksi ciri dan Metode Euclidean Distance untuk identifikasi emosi berdasarkan ciri yang didapatkan dari LPC.  Penelitian ini menggunakan data emosi marah, sedih, bahagia, netral dan bosan. Data yang digunakan diambil dari Berlin Emo DB, dengan menggunakan tiga kalimat berbeda dan aktor yang berbeda juga. Penelitian ini menghasilkan akurasi pada emosi sedih 58,33%, emosi netral 50%, emosi marah 41,67%, emosi bahagia 8,33% dan untuk emosi bosan tidak dapat dikenali. Penggunaan Metode LPC sebagai ekstraksi ciri memberikan hasil yang kurang baik pada penelitian ini karena akurasi rata-rata hanya sebesar 31,67% untuk identifikasi semua emosi. Data suara yang digunakan dengan kalimat, aktor, umur dan aksen yang berbeda dapat mempengaruhi dalam pengenalan emosi, maka dari itu ekstraksi ciri dalam pengenalan pola ucapan emosi manusia sangat penting. Hasil akurasi pada penelitian ini masih sangat kecil dan dapat ditingkatkan dengan menggunakan ekstraksi ciri yang lain seperti prosidis, spektral, dan kualitas suara, penggunaan parameter max, min, mean, median, kurtosis dan skewenes. Selain itu penggunaan metode klasifikasi juga dapat mempengaruhi hasil pengenalan emosi. AbstractSpeech is a signal that has a high complexity consisting of various information. Information that can be captured from speech can be in the form of messages to interlocutor, the speaker, the language, even the speaker's emotions themselves without the speaker realizing it. Speech Processing is a branch of digital signal processing aimed at the realization of natural interactions between humans and machines. Emotional characteristics are features contained in the speech that carry the characteristics of the speaker's emotions. Linear Predictive Coding (LPC) is a method for extracting features in signal processing. This research uses LPC as a feature extraction and Euclidean Distance Method to identify emotions based on features obtained from LPC. This study uses data on emotions of anger, sadness, happiness, neutrality, and boredom. The data used was taken from Berlin Emo DB, using three different sentences and different actors. This research resulted in inaccuracy in sad emotions 58.33%, neutral emotions 50%, angry emotions 41.67%, happy emotions 8.33% and bored emotions could not be recognized. The use of the LPC method as feature extraction gave unfavorable results in this study because the average accuracy was only 31.67% for the identification of all emotions. Voice data used with different sentences, actors, ages, and accents can influence the recognition of emotions, therefore the extraction of features in the recognition of speech patterns of human emotions is very important. Accuracy results in this study are still very small and can be improved by using other feature extractions such as provides, spectral, and sound quality, using parameters max, min, mean, median, kurtosis, and skewness. Besides the use of classification methods can also affect the results of emotional recognition. 
Steganalisis Blind dengan Metode Convolutional Neural Network (CNN) Yedroudj- Net terhadap Tools Steganografi Hidayasari, Nurmi; Riadi, Imam; Prayudi, Yudi
Jurnal Teknologi Informasi dan Ilmu Komputer Vol 7 No 4: Agustus 2020
Publisher : Fakultas Ilmu Komputer, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25126/jtiik.2020703326

Abstract

Steganalisis digunakan untuk mendeteksi ada atau tidaknya file steganografi. Salah satu kategori steganalisis adalah blind steganalisis, yaitu cara untuk mendeteksi file rahasia tanpa mengetahui metode steganografi apa yang digunakan. Sebuah penelitian mengusulkan bahwa metode Convolutional Neural Networks (CNN) dapat mendeteksi file steganografi menggunakan metode terbaru dengan nilai probabilitas kesalahan rendah dibandingkan metode lain, yaitu CNN Yedroudj-net. Sebagai metode steganalisis Machine Learning terbaru, diperlukan eksperimen untuk mengetahui apakah Yedroudj-net dapat menjadi steganalisis untuk keluaran dari tools steganografi yang biasa digunakan. Mengetahui kinerja CNN Yedroudj-net sangat penting, untuk mengukur tingkat kemampuannya dalam hal steganalisis dari beberapa tools. Apalagi sejauh ini, kinerja Machine Learning masih diragukan dalam blind steganalisis. Ditambah beberapa penelitian sebelumnya hanya berfokus pada metode tertentu untuk membuktikan kinerja teknik yang diusulkan, termasuk Yedroudj-net. Penelitian ini akan menggunakan lima alat yang cukup baik dalam hal steganografi, yaitu Hide In Picture (HIP), OpenStego, SilentEye, Steg dan S-Tools, yang tidak diketahui secara pasti metode steganografi apa yang digunakan pada alat tersebut. Metode Yedroudj-net akan diimplementasikan dalam file steganografi dari output lima alat. Kemudian perbandingan dengan tools steganalisis lain, yaitu StegSpy. Hasil penelitian menunjukkan bahwa Yedroudj-net bisa mendeteksi keberadaan file steganografi. Namun, jika dibandingkan dengan StegSpy hasil gambar yang tidak terdeteksi lebih tinggi.AbstractSteganalysis is used to detect the presence or absence of steganograpy files. One category of steganalysis is blind steganalysis, which is a way to detect secret files without knowing what steganography method is used. A study proposes that the Convolutional Neural Networks (CNN) method can detect steganographic files using the latest method with a low error probability value compared to other methods, namely CNN Yedroudj-net. As the latest Machine Learning steganalysis method, an experiment is needed to find out whether Yedroudj-net can be a steganalysis for the output of commonly used steganography tools. Knowing the performance of CNN Yedroudj-net is very important, to measure the level of ability in terms of steganalysis from several tools. Especially so far, Machine Learning performance is still doubtful in blind steganalysis. Plus some previous research only focused on certain methods to prove the performance of the proposed technique, including Yedroudj-net. This research will use five tools that are good enough in terms of steganography, namely Hide In Picture (HIP), OpenStego, SilentEye, Steg and S-Tools, which is not known exactly what steganography methods are used on the tool. The Yedroudj-net method will be implemented in a steganographic file from the output of five tools. Then compare with other steganalysis tools, namely StegSpy. The results showed that Yedroudj-net could detect the presence of steganographic files. However, when compared with StegSpy the results of undetected images are higher.
Block-hash of blockchain framework against man-in-the-middle attacks Riadi, Imam; Umar, Rusydi; Busthomi, Iqbal; Muhammad, Arif Wirawan
Register: Jurnal Ilmiah Teknologi Sistem Informasi Vol 8 No 1 (2022): January
Publisher : Information Systems - Universitas Pesantren Tinggi Darul Ulum

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26594/register.v8i1.2190

Abstract

Payload authentication is vulnerable to Man-in-the-middle (MITM) attack. Blockchain technology offers methods such as peer to peer, block hash, and proof-of-work to secure the payload of authentication process. The implementation uses block hash and proof-of-work methods on blockchain technology and testing is using White-box-testing and security tests distributed to system security practitioners who are competent in MITM attacks. The analyisis results before implementing Blockchain technology show that the authentication payload is still in plain text, so the data confidentiality has not minimize passive voice. After implementing Blockchain technology to the system, white-box testing using the Wireshark gives the result that the authentication payload sent has been well encrypted and safe enough. The percentage of security test results gets 95% which shows that securing the system from MITM attacks is relatively high. Although it has succeeded in securing the system from MITM attacks, it still has a vulnerability from other cyber attacks, so implementation of the Blockchain needs security improvisation.
Network Forensics Against Address Resolution Protocol Spoofing Attacks Using Trigger, Acquire, Analysis, Report, Action Method Wijayanto, Agus; Riadi, Imam; Prayudi, Yudi; Sudinugraha, Tri
Register: Jurnal Ilmiah Teknologi Sistem Informasi Vol 8 No 2 (2022): July
Publisher : Information Systems - Universitas Pesantren Tinggi Darul Ulum

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26594/register.v8i2.2953

Abstract

This study aims to obtain attack evidence and reconstruct commonly used address resolution protocol attacks as a first step to launch a moderately malicious attack. MiTM and DoS are the initiations of ARP spoofing attacks that are used as a follow-up attack from ARP spoofing. The impact is quite severe, ranging from data theft and denial of service to crippling network infrastructure systems. In this study, data collection was conducted by launching an test attack against a real network infrastructure involving 27 computers, one router, and four switches. This study uses a Mikrotik router by building a firewall to generate log files and uses the Tazmen Sniffer Protocol, which is sent to a syslog-ng computer in a different virtual domain in a local area network. The Trigger, Acquire, Analysis, Report, Action method is used in network forensic investigations by utilising Wireshark and network miners to analyze network traffic during attacks. The results of this network forensics obtain evidence that there have been eight attacks with detailed information on when there was an attack on the media access control address and internet protocol address, both from the attacker and the victim. However, attacks carried out with the KickThemOut tool can provide further information about the attacker’s details through a number of settings, in particular using the Gratuitous ARP and ICMP protocols.
Co-Authors ., Andi Zulherry Abdul Fadlil Abdul Fadlil Abdullah Hanif Abdullah Hanif Abe, Tuska Achmad Nugrahantoro Achmad Syauqi Ade Davy Wiranata Ade Elvina Adhi Prabowo, Basit Adiniah Gustika Pratiwi Agung Wahyudi Agus Wijayanto Ahmad Azhar Kadim Ahmad Azhari Ahmad Luthfi Ahmad, Muhammad Sabri Aini, Fadhilah Dhinur Akrom, Akrom Al Amany, Sarah Ulfah Alawi, Hanna Syahida Andrianto, Fiki Anggara, Rio Annisa, Putri Anshori, Ikhwan Anton Yudahana Anton Yudhana Anton Yudhana ANWAR, FAHMI anwar, nuril Apriliani, Evinda Aprilliansyah, Deco Ardi Pujiyanta Arif Rahman Arif Rahman Arif Wirawan Muhammad Arif Wirawan Muhammad Arif Wirawan Muhammad Arini, Merita Ariqah Adliana Siregar Arizona Firdonsyah Asno Azzawagama Firdaus Asruddin, Asruddin Astika AyuningTyas, Astika Aulia, Aulia Aulyah Zakilah Ifani Bahagiya, Multika Untung Bashor Fauzan Muthohirin Basir, Azhar Bernadisman, Dora Budi Barata Kusuma Utami Budin, Shiha Busthomi, Iqbal Chandra Kurniawan, Gusti D.E Purwadi Putra, Izzan Julda Davito Rasendriya Rizqullah Putra Davito Rasendriya Rizqullah Putra Deco Aprilliansyah Dewi Astria Faroek Dewi Estri Jayanti Dikky Praseptian M Dwi Aryanto Eddy Irawan Aristianto Ediansa, Oka Eko Brillianto Eko Handoyo Eko Handoyo Elfatiha, Muhammad Ihya Aulia Elvina, Ade Ervin Setyobudi Fadhilah Dhinur Aini Fadhilah Dhinur Aini Fadlil , Abdul Fahmi Anwar Fahmi Auliya Tsani Faiz , Muhammad Nur Faiz Isnan Abdurrachman Fakhri, La Jupriadi Fanani, Galih Fatmawaty, Virdiana Sriviana Faulinda Ely Nastiti Fauzan Natsir Fauzan, Fauzan Firdonsyah, Arizona Fithriatus Shalihah Fitri, Fitriyani Tella Fitriyani Tella Furizal Furizal, Furizal Galih Fanani Galih Pramuja Inngam Fanani Guntur Maulana Zamroni Guntur Maulana Zamroni, Guntur Maulana Habie, Khairul Fathan Hafizh, Muhammad Nasir Hanif, Abdullah Harman, Rika Haryanto, Eri Helmiyah, Siti Herman Herman Herman Herman Herman Yuliansyah Herman Yuliansyah, Herman Hidayati, Anisa Nur Himawan I Azmi Iis Wahyuningsih Ikhram, Ridho Ikhsan Zuhriyanto Ikhwan Anshori Iqbal Busthomi Irhas Ainur Rafiq Irhash Ainur Rafiq Iwan Tri Riyadi Yanto, Iwan Tri Riyadi Jamalludin Jamalludin Jamalludin, Jamalludin Jayawarsa, A.A. Ketut Joko Handoyo Joko Triyanto Kariyamin, Kariyamin Kartoirono, Suprihatin Kurniawan, Endang Kurniawan, Gusti Chandra Kusuma, Ridho Surya Laura Sari Luh Putu Ratna Sundari M Rosyidi Djou M. Rosyidi Djou M.A. Khairul Qalbi Mahsun Mahsun Maulana, Irvan Miladiah Miladiah Miladiah, Miladiah Muammar Muammar, Muammar Muchlas Muchlas Muflih, Ghufron Zaida Muh. Hajar Akbar Muhajir Yunus Muhamad Abduh, Muhamad Muhamad Caesar Febriansyah Putra, Muhamad Caesar Febriansyah Muhammad Abdul Aziz Muhammad Abdul Aziz Muhammad Fahmi Mubarok Nahdli Muhammad Faqih Dzulqarnain, Muhammad Faqih Muhammad Fauzan Gustafi Muhammad Ihya Aulia Elfatiha Muhammad Irwan Syahib Muhammad Kunta Biddinika Muhammad Muhammad Muhammad Nur Faiz Muhammad Syukri Muhammad Yanuar Efendi Muhammad Zulfadhilah Muis, Alwas Murinto Murinto Murinto Murni Murni Murti, Raden Hario Wahyu Musa, Shahrulniza Mushab Al Barra Mustafa Mustafa Mustafa Mustafa NANNY, NANNY Nasrulloh, Imam Mahfudl Nasution, Dewi Sahara Nia Ekawati, Nia Nur Faiz, Muhammad Nur Hamida Siregar Nur Miswar Nur Widiyasono, Nur Nuril Anwar Nuril Anwar, Nuril Nurmi Hidayasari Panggah Widiandana Prabowo, Basit Adhi Pradana Ananda Raharja Prakoso, Danar Cahyo Prambudi, Rizal Prambudi, Rizal Prambudi Prasetyaningrum, Putri Taqwa Prasongko, Riski Yudhi Purwaningrum, Santi Purwanto Purwanto Purwono Purwono, Purwono Putra, Marta Dwi Darma Putri Annisa Putro, Aldibangun Pidekso Raden Hario Wahyu Murti Raden Mohamad Herdian Bhakti Rafiq, Irhash Ainur Rahmat Ardila Dwi Yulianto Ramadhani, Erika Ramansyah Ramansyah Rauli, Muhamad Ermansyah Rauli, Muhamad Ermansyah Reyhanssan Islamey Ridho Surya Kusuma Rio Anggara Rio Widodo Robiin, Bambang Rochmadi, Tri Roni Anggara Putra Rudy Ansari, Rudy Ruslan, Takdir Rusydi Umar Rusydi Umar Rusydi Umar Ruuhwan Ruuhwan Safiq Rosad Sahiruddin Sahiruddin Salim, Mansyur Santi Purwaningrum Sari, Laura Shiha Budin Sismadi, Wawan Sri Mulyaningsih Sri Winiarti Sri Winiati St Rahmatullah Sudinugraha, Tri Sugandi, Andi Suhartono, Bambang Sukma Aji Sunardi Sunardi - Sunardi Sunardi sunardi sunardi Sunardi, Sunardi Suprihatin Suprihatin Suprihatin Suprihatin Suprihatin Supriyanto Suryanto, Farid Syaefudin, Rizal Syahib, Muhammad Irwan Syahida Alawi, Hanna Syahrani Lonang Syarifudin, Arma Taufiq Ismail Taufiq Ismail Tawar Tawar Tole Sutikno Tri Lestari Tri Lestari Triyanto, Joko Umar, Rusdy Veithzal Rivai Zainal Verry Noval Kristanto W, Yunanri Wahyusari, Retno Wardiwiyono, Sartini Wasito Sukarno Weni Hawariyuni, Weni Wicaksono Yuli Sulistyo Wicaksono Yuli Sulistyo Wicaksono, Sonny Abriantoro Widiandana, Panggah WIDODO, RIO Winiati, Sri Wintolo, Hero Wisnu Pranoto Yana Mulyana Yana Mulyana Yana Safitri, Yana Yudi Kurniawan Yudi Kurniawan Yudi prayudi Yulian Wahyu Permadi Yuliansyah, Herman Yuliansyah, Herman Zein, Wahid Alfaridsi Achmad