Articles
Analysis of Digital Evidence on Denial of Service (DoS) Attack Log Based
Galih Fanani;
Imam Riadi
Buletin Ilmiah Sarjana Teknik Elektro Vol. 2 No. 2 (2020): Agustus
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/biste.v2i2.1065
This research is carried out an analysis and investigation of digital log file data retrieval from DoS (Denial of Service) attacks, on internet networks that have been detected by IDS (Intrusion Detection System) and using Wireshark as Tools Analysis Network. The research phase begins with the design of an experimental scenario which is often carried out daily where users access the internet network. The next stage is an attack in the form of a ping flood on the target computer connected to the internet network, the final stage of data retrieval which will be analyzed later. Testing research using UAT (User Acceptance Test), to prove that the analysis has been received by the user. The results of research conducted to obtain data in the form of an attacker's IP (Internet Protocol), target IP, protocol type, the port used, and the time of the attack. In the UAT test results, the obtained value of 18% of students disagrees, 58% of students agree, and 24% of students strongly agree. This research has conducted an analysis of random data attacks using Wireshark applications received by users.
Traffic Shaping Menggunakan Metode HTB (Hierarchical Token Bucket) pada Jaringan Nirkabel
Shiha Budin;
Imam Riadi
Buletin Ilmiah Sarjana Teknik Elektro Vol. 1 No. 3 (2019): Desember
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/biste.v1i3.1100
Perkembangan zaman yang semakin pesat menuntut adanya layanan informasi yang lebih cepat, tepat, dan akurat menjadikan jaringan komputer sebagai kebutuhan utama. Traffic Shaping dengan Quality of Service (QoS) dapat digunakan dalam mengoptimalkan bandwidth suatu jaringan untuk menentukan jenis-jenis lalu lintas jaringan. Metode Hierarchical Token Bucket (HTB) dapat mengimplementasi pembagian trafik yang lebih akurat, dengan bandwidth yang tidak digunakan dapat dioptimalkan oleh pengguna lain. Hasil traffic shaping menggunakan metode HTB menghasilkan rata-rata indeks QoS yaitu 3,75 dan dapat dikategorikan Baik, dibandingkan sebelum menerapkan traffic shaping yaitu rata-rata 2,25 yang dikategorikan Kurang Baik. Berdasarkan hasil pengujian dapat disimpulkan bahwa kinerja jaringan hotspot dengan Traffic Shaping dan Quality of Service (QoS)Â dapat meningkatkan kualitas jaringan daripada sebelumnya.The development of an increasingly rapid era requires the existence of information services that are faster, more precise, and accurate, making computer networks a primary need. Traffic Shaping with Quality of Service (QoS) can be used in optimizing the bandwidth of a network to determine the types of network traffic. The Hierarchical Token Bucket (HTB) method can implement more accurate traffic sharing, with unused bandwidth being optimized by other users. The results of traffic shaping using the HTB method produces an average QoS index of 3.75 and can be categorized Good, compared to before applying traffic shaping which is an average of 2.25 which is categorized as Poor. Based on the test results it can be concluded that the performance of hotspot networks with Traffic Shaping and Quality of Service (QoS) can improve network quality than before.
Intruder Detection Systems on Computer Networks Using Host Based Intrusion Detection System Techniques
Rio Widodo;
Imam Riadi
Buletin Ilmiah Sarjana Teknik Elektro Vol. 3 No. 1 (2021): April
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/biste.v3i1.1752
The openness of access to information raises various problems, including maintaining the validity and integrity of data, so a network security system is needed that can deal with potential threats that can occur quickly and accurately by utilizing an IDS (intrusion detection system). One of the IDS tools that are often used is Snort which works in real-time to monitor and detect the ongoing network by providing warnings and information on potential threats in the form of DoS attacks. DoS attacks run to exhaust the packet path by requesting packets to a target in large and continuous ways which results in increased usage of CPU (central processing unit), memory, and ethernet or WiFi networks. The snort IDS implementation can help provide accurate information on network security that you want to monitor because every communication that takes place in a network, every event that occurs and potential attacks that can paralyze the internet network are monitored by snort.
Image Quality Analysis of PNG Images on WhatsApp Messenger Sending
Fahmi Anwar;
Abdul Fadlil;
Imam Riadi
Telematika Vol 14, No 1: February (2021)
Publisher : Universitas Amikom Purwokerto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.35671/telematika.v14i1.1114
Technology is growing rapidly, especially in communication with various types of information services such as internet-based messages. One of the most popular internet-based messages in Indonesia is WhatsApp Messenger. WhatsApp is a chat application that can be used on many platforms. Message sending on WhatsApp is carried out end-to-end encryption from the sender to the message recipient. The sending of messages in PNG images is secured using end-to-end encryption and compressed according to predefined rules. This study analyzes Image Compression and Alpha channel in PNG by comparing PNG images before being sent with PNG images that have gone through the sending process on WhatsApp using the test-driven development (TDD) method. The analysis results contain comparisons based on the RMSE, SSIM, PSNR, and MD5 hash values. Delivery with a gallery image attachment type using an image transparent background changes to a white image background. While those with a background other than transparent have good image quality because it has a PSNR value of more than 35 dB, and submissions with document attachment types do not experience changes in MD5 hash value and image quality.
Smart Payment Application Security Optimization from Cross-Site Scripting (XSS) Attacks Based on Blockchain Technology
Imam Riadi;
Rusydi Umar;
Tri Lestari
Telematika Vol 14, No 2: August (2021)
Publisher : Universitas Amikom Purwokerto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.35671/telematika.v14i2.1221
The digital era is an era everyone has used technology and they are connected to each other very easily. The Smart Payment application is one of the applications that is developing in the digital era. This application is not equipped with security, so there is a concern that hackers will try to change user or even change user data. One of the possible attacks on this application is a cross-site attack (XSS). It is a code injection attack on the user side. Security in the Smart Payment application needs to be improved so that data integrity is maintained. In this research, security optimization is carried out by implementing blockchain. Blockchain has the advantage in terms of security with the concept of decentralization by utilizing a consensus algorithm that can eliminate and make improvements to data changes made by hackers. The result obtained from this study is the implementation of blockchain to maintain the security of payment transaction data on the Smart Payment application from XSS attacks. It is proven by the results of the vulnerability before and after blockchain implementation. Before the implementation of the vulnerability is found, 1 XSS vulnerability had a high level of overall risk. Meanwhile, the result of the vulnerability after blockchain implementation was not found from XSS attacks (the XSS vulnerability was 0 or not found).
Japanese Hiragana Handwriting Pattern Recognition Using Template Matching Correlation Method
Imam Riadi;
Abdul Fadlil;
Putri Annisa
JUITA : Jurnal Informatika JUITA Vol. 9 No. 1, May 2021
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1056.24 KB)
|
DOI: 10.30595/juita.v9i1.7082
Hiragana is one of the traditional Japanese letters used to translate native Japanese words. The introduction of an object requires a learning process, which is obtained through the characteristic in the form of unique features on similar objects, but manually it is quite difficult to distinguish these letters. This writing explains the discussion system to differentiate between hiragana letters starting from preprocess namely grayscale and threshold, then segmenting and normalization, while image classification uses the Template Matching Correlation method. The results of tests carried out assessing the test rate of around 76% using the Matching Template Correlation method. While the remaining 14% indicates that the object identified does not match the intended results.
Penerapan Teknik SURF pada Forensik Citra untuk Analisa Rekayasa Foto Digital(Application of SURF Technique in Image Forensic for Digital Photo Engineering Analysis)
Wicaksono Yuli Sulistyo;
Imam Riadi;
Anton Yudhana
JUITA : Jurnal Informatika JUITA Vol. 8 Nomor 2, November 2020
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (743.302 KB)
|
DOI: 10.30595/juita.v8i2.6602
Perkembangan teknologi citra digital yang semakin maju membuat mudahnya merekayasa suatu citra. Perubahan pada citra membuat informasi yang disampaikan menjadi berubah dan rawan dimanfaatkan menjadi aksi kejahatan digital. Salah satu cara menyelesaikan kasus kejahatan digital ini menggunakan forensik citra. Penelitian ini menggunakan metode teknik pendeteksian rekayasa foto digital Speeded Up Robust Features (SURF). Tahapan pertama melakukan mengakuisisi data kemudian melakukan proses ekstraksi dengan hasil akuisisi tersebut. Hasil yang sudah didapat dianalisis menggunakan algoritma SURF, algoritma ini mendeteksi adanya manipulasi pada foto dengan tidak adanya keypoint pada beberapa objek yang tidak terhubung. Rekayasa foto digital dapat dipastikan menggunakan perbandingkan kualitas citra pada setiap foto dengan perhitungan MSE, RMSE dan PSNR. Hasil perbandingan nilai kualitas didapat perbedaan antara nilai kualitas pada foto asli dan foto manipulasi, hal tersebut dapat membuktikan bahwa foto tersebut sudah dimanipulasi.
An Analysis of Vulnerability Web Against Attack Unrestricted Image File Upload
Imam Riadi;
Eddy Irawan Aristianto
Computer Engineering and Applications Journal Vol 5 No 1 (2016)
Publisher : Universitas Sriwijaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (668.245 KB)
|
DOI: 10.18495/comengapp.v5i1.161
The development of computer security technology is very rapidly. Web security is one of the areas that require particular attention related to the abundance of digital crimes conducted over the web. Unrestricted file upload image is a condition in the process of uploading pictures is not restricted. This can be used to make the attacker retrieve the information that is contained in a system. This research developed with several stages, such as, data collection, analysis of the current conditions, designing improvements to the program code, testing and implementation of the results of patch. Security testing is performed to find out the difference between before and after conditions applied patch unrestricted image file upload. Based on the results of testing done by the method of penetration testing results obtained before the application of patch unrestricted image file upload results respondents said 15% strongly disagree, 85% did not agree. Testing after applying patch unrestricted image file upload results respondents said 7.5% strongly agree, 92.5% agree, so it can be concluded that the development of the patch that has been done has been running smoothly as expected.
Analisis Kelayakan Integrated Digital Forensics Investigation Framework Untuk Investigasi Smartphone
Ruuhwan Ruuhwan;
Imam Riadi;
Yudi Prayudi
Jurnal Buana Informatika Vol. 7 No. 4 (2016): Jurnal Buana Informatika Volume 7 Nomor 4 Oktober 2016
Publisher : Universitas Atma Jaya Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.24002/jbi.v7i4.767
Abstract. The handling of digital evidence each and every digital data that can proof a determination that a crime has been committed; it may also give the links between a crime and its victims or crime and the culprit. How to verify a valid evidence is to investigate using the approach known as the Digital Forensic Examination Procedures. Integrated Digital Forensic Investigation Framework (IDFIF) is the latest developed method, so that it is interesting to further scrutinize IDFIF, particularly in the process of investigation of a smartphone. The current smartphone devices have similar functions with computers. Although its functions are almost the same as the computer, but there are some differences in the process of digital forensics handling between computer devices and smartphones. The digital evidence handling process stages need to overcome the circumstances that may be encountered by an investigator involving digital evidence particularly on electronic media and smartphone devices in the field. IDFIF needs to develop in such a way so it has the flexibility in handling different types of digital evidence.Keywords: digital evidence, IDFIF, investigation, smartphone Abstrak. Penanganan bukti digital mencakup setiap dan semua data digital yang dapat menjadi bukti penetapan bahwa kejahatan telah dilakukan atau dapat memberikan link antara kejahatan dan korbannya atau kejahatan dan pelakunya. Cara pembuktian untuk mendapatkan bukti valid adalah dengan melakukan investigasi dengan pendekatan Prosedur Pemeriksaan Digital Forensic. Integrated Digital Forensics Investigation Framework (IDFIF) merupakan metode terbaru sehingga IDFIF ini menarik untuk diteliti lebih lanjut terutama dalam proses investigasi smartphone. Saat ini perangkat smartphone memiliki fungsi yang sama dengan komputer. Meskipun demikian, ada beberapa perbedaan dalam proses penanganan digital forensics diantara perangkat komputer dan smartphone. Tahapan proses penanganan barang bukti digital seharusnya dibuat untuk mengatasi keadaan umum yang mungkin dihadapi oleh investigator yang melibatkan barang bukti digital terutama pada perangkat smartphone dan media elektronik terkait di lapangan. IDFIF perlu dikembangkan sehingga memiliki fleksibilitas dalam menangani berbagai jenis barang bukti digital. Kata Kunci: bukti digital, IDFIF, investigasi, smartphone
Vulnerability of injection attacks against the application security of framework based websites open web access security project (OWASP)
Imam Riadi;
Rusydi Umar;
Wasito Sukarno
Jurnal Informatika Vol 12, No 2: July 2018
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (272.384 KB)
|
DOI: 10.26555/jifo.v12i2.a8292
The development of website applications is currently growing rapidly, but it is not followed by a good security system that can cause the number of security holes that can be entered by the attacker. The number of website applications that are vulnerable to injection attacks to make managers must be aware of and often update and immediately close the security gap. Website applications that have good security will become more secure but the application is still vulnerable to injection attacks. Updating and changing passwords periodically will be better than in fix. Many security hints and risks are released by Open Web Application Security Project (OWASP) TOP 10-2017 as well as a reference in wary of security risks in the application.