Claim Missing Document
Check
Articles

Found 19 Documents
Search

PERANCANGAN KEAMANAN JARINGAN AUTHENTICATION LOGIN HOTSPOT MENGGUNAKAN RADIUS SERVER DAN PROTOKOL EAP-TTLS PADA MIKROTIK DI IDOOP HOTEL i Wayan Sukartayasa; I Putu Hariyadi
Jurnal Bumigora Information Technology (BITe) Vol 1 No 1 (2019)
Publisher : Prodi Ilmu Komputer Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (771.017 KB) | DOI: 10.30812/bite.v1i1.421

Abstract

Idoop Hotel merupakan salah satu hotel yang terletak di kawasan Kota Mataram, Jalan Swaramahardika No.883, 83121. Idoop Hotel mulai beroperasi pada bulan Juni 2014. Idoop Hotel memiliki total 9 departement yang tergabung dalam jaringan back office dan operasional. Keseluruhan department berada dalam satu jaringan lokal yang dikelola oleh administrator jaringan pada hotel tersebut. Protocol Extensible Authentication Protocol-Tunelled Transport Layer Security (EAP-TTLS) melihat dari segi implementasi EAP-TTLS dirancang untuk memberikan kemudahan implementasi otentikasi dibandingkan dengan protocol EAP yang berbasis sertifikat digital. Implementasi EAP-TTLS hanya memerlukan sertifikat digital pada sisi authentication server, sedangkan sertifikat digital pada sisi client akan digantikan dengan menggunakan kombinasi username dan password. Kesimpulan yang diperoleh berdasarkan hasil pengujian yang dilakukan yaitu Penggunaan kombinasi username dan password untuk menggantikan sertifikat digital pada Extensible Authentication Protocol-Tunelled Transport Layer Security (EAP-TTLS) juga dapat meningkatkan mobilitas pengguna, karena pengguna tidak perlu menambahkan sertifikat digital untuk melakukan login ke hotspot. Authentikasi EAP-TTLS memiliki kemampuan yang lebih baik yang ditambahkan dengan enkripsi MD5 pada hotspot MikroTIK sehingga pengguna nyaman untuk melakukan login ke hotspot dan mempermudah karyawan IT dari Idoop Hotel untuk memanajemen pengguna dalam jumlah banyak.
ANALISA METRIC ROUTING PROTOKOL EIGRP Yudi Syahputra; I Putu Hariyadi
Jurnal Bumigora Information Technology (BITe) Vol 1 No 1 (2019)
Publisher : Prodi Ilmu Komputer Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (752.003 KB) | DOI: 10.30812/bite.v1i1.423

Abstract

Router merupakan peralatan jaringan yang dapat menghubungkan satu jaringan dengan jaringan yang lain. Router bekerja menggunakan routing table yang disimpan di memorinya untuk membuat keputusan tentang bagaimana paket dikirimkan. Informasi pada routing table dapat diperolah salah satunya melalui penggunaan routing protocol. Routing protocol adalah suatu aturan yang mempertukarkan informasi routing yang akan membentuk sebuah tabel routing sehingga pengalamatan pada paket data yang akan dikirim menjadi lebih jelas dan routing protocol mencari rute tersingkat untuk mengirimkan paket data menuju alamat yang dituju. Enhanced Interior Gateway Routing Protocol (EIGRP) merupakan salah satu protocol dengan jenis Interior Gateway Protocol (IGP) yang dapat digunakan dalam suatu Autonomous System (AS). EIGRP adalah protokol routing yang dikembangkan oleh Cisco dan saat ini hanya dapat dijalankan pada router Cisco. Berdasarkan latar belakang diatas mendorong penulis untuk meneliti lebih lanjut tentang bagaimana penentuan rute terbaik pada EIGRP berdasarkan metric yang digunakan pada jaringan LAN (Local Area Network) dan WAN (Wide Area Network). Metric yang digunakan oleh EIGRP dikenal dengan nama K-Value meliputi bandwidth, delay, reliability, loading, dan MTU. Adapun kesimpulan dalam penilitian ini adalah bahwa antar router EIGRP harus memiliki nilai AS dan K-value yang sama agar terbentuk hubungan kebertetanggaan sehingga dapat bertukar informasi routing, nilai K-Value default yang digunakan untuk perhitungan metric adalah bandwidth terendah sepanjang jalur dan cumulative delay sepanjang jalur.
IMPLEMENTASI IPS BERBASIS PORTSENTRY DAN VULNERABILITY ASSESMENT BERBASIS OPENVAS UNTUK PENGAMANAN WEB SERVER Edy Satriawan; Raisul Azhar; I Putu Hariyadi
Jurnal Bumigora Information Technology (BITe) Vol 1 No 1 (2019)
Publisher : Prodi Ilmu Komputer Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1737.386 KB) | DOI: 10.30812/bite.v1i1.424

Abstract

Jaringan komputer merupakan jaringan telekomunikasi yang menghubungkan satu komputer atau lebih agar dapat saling bertukar data dan informasi. Manfaat yang sedemikian besar tersebut tentunya akan berkurang dengan adanya gangguan yang muncul terhadap jaringan. Adapun salah satu masalah yang dapat menganggu keamanan sistem adalah masuknya user atau hacker yang bermaksud merusak sistem jaringan. Dalam penerapan pengamanan web server berbasis Intrusion Prevention System (IPS), penulis menggunakan aplikasi Portsentry dan IPTables. Portsentry dan IPTables berfungsi sebagai firewall terhadap serangan seperti DDoS, Ping Attack, dan Portscanning, serta penggunaan OpenVAS dalam penerepanan metode Vulnerability Assesment dalam melakukan scannin terhadap sistem, untuk dapat mengetahui kekelemahan-kelemahan terhadap sistem yang dibangun, sehingga dapat dilakukan upaya perbaikan terhadap sistem agar menjadi lebih baik. Metodologi Penelitian yang penulis adopsi yaitu Network Development Life Cycle (NDLC), NDLC merupakan pendekatan proses dalam komunikasi data yang menggambarkan siklus yang tiada awal dan tiada akhir dalam membangun sebuah jaringan komputer mencakup sejumlah tahapan yaitu Analysis, Design, Simulation Prototype, Implementation, Monitoring dan Management.
Analisa Penerapan Intrusion Prevention System (IPS) Berbasis Snort Sebagai Pengaman Server Internet Yang Terintegrasi Dengan Telegram Abdul Muhaimi; I Putu Hariyadi; Akbar Juliansyah
Jurnal Bumigora Information Technology (BITe) Vol 1 No 2 (2019)
Publisher : Prodi Ilmu Komputer Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (756.544 KB) | DOI: 10.30812/bite.v1i2.611

Abstract

ABSTRAK Keamanan merupakan salah satu bagian yang sangat penting dalam Teknologi Informasi (TI) yang telah dimanfaatkan di berbagai bidang. Pemanfaatan TI dapat memperlancar operasional sehingga meningkatkan kualitas layanan. Namun di sisi lain apabila tidak dijaga keamanannya maka akan berdampak pada ketersediaan layanan. Setiap institusi atau lembaga harus memiliki pencegahan terhadap keterbukaan akses dari pihak yang tidak berhak. Peran pertahanan sistem pada umumnya terletak pada administrator sebagai pengelola jaringan yang memiliki akses penuh terhadap infrastruktur jaringan yang dibangunnya. Terdapat berbagai metode yang dihasilkan oleh beberapa peneliti yang telah menerapkan pengamanan terkait layanan pada server Internet salah satunya adalah Intrusion Prevention System (IPS). Sistem IPS yang diterapkan oleh peneliti terdahulu belum terintegrasi dengan telegram sehingga administrator system yang sedang berada di luar instansi atau perusahaan tidak dapat mengetahui ketika server mengalami serangan. Selain itu pemblokiran terhadap serangan masih dilakukan secara manual menggunakan IPTables sehingga memerlukan campur tangan administrator system. Berdasarkan permasalahan tersebut maka mendorong peneliti mengembangkan system IPS yang diintegrasikan dengan Telegram dan IPTables sehingga administrator system dapat memperoleh notifikasi ketika terjadi serangan kapan pun dan dimana pun. Selain itu system dapat secara otomatis melakukan pemblokiran serangan. Pada tahap analysis dilakukan pengumpulan data dan analisa data. Pada tahap desain dilakukan rancangan jaringan ujicoba, pengalamatan IP, perancangan alur kerja system dan kebutuhan perangkat keras dan lunak. Pada tahap simulation prototyping memuat tentang instalasi konfigurasi pada masing-masing perangkat, ujicoba dan analisa hasil ujicoba. Terdapat 5 skenario uji coba yang dilakukan meliputi Ftp Attack, Telnet Attack, Bruteforce Form Login menggunakan Hydra Attack, Remote File Incusion (RFI) Attack serta Http Bruteforce menggunakan Hydra Attack. Adapun kesimpulan dari penelitian ini adalah penerapan IPS berbasis Snort yang diintegrasikan dengan telegram serta IPTables maka server dapat mendeteksi serangan yang masuk. ABSTRACT Security is one very important part in Information Technology (IT) which has been utilized in various fields. Utilization of IT can facilitate operations so as to improve service quality. But on the other hand if it is not maintained its security will have an impact on the availability of services. Every institution or institution must have a prevention against open access from unauthorized parties. The role of the defense system in general lies with the administrator as a network manager who has full access to the network infrastructure that he built. There are various methods produced by several researchers who have implemented security-related services on an Internet server, one of which is the Intrusion Prevention System (IPS). The IPS system implemented by previous researchers has not been integrated with telegrams so that system administrators who are outside the agency or company cannot find out when the server has an attack. Besides blocking attacks is still done manually using IPTables so that it requires the intervention of a system administrator. Based on these problems, it encourages researchers to develop IPS systems that are integrated with Telegram and IPTables so that system administrators can get notifications when an attack occurs anytime and anywhere. In addition the system can automatically block attacks. In the analysis phase, data collection and data analysis are carried out. At the design stage, a trial network design, IP addressing, system workflow design and hardware and software requirements are carried out. At the simulation stage prototyping includes the configuration installation on each device, testing and analyzing the results of trials. There are 5 test scenarios conducted including Ftp Attack, Telnet Attack, Bruteforce Form Login using Hydra Attack, Remote File Incusion (RFI) Attack and Http Bruteforce using Hydra Attack. The conclusion of this study is the application of Snort-based IPS integrated with telegram and IPTables, the server can detect incoming attacks.
Implementasi Ansible Playbook Untuk Mengotomatisasi Manajemen Konfigurasi VLAN Berbasis VTP Dan Layanan DHCP Ni Made Anggrena Yalestia Chandrawaty; I Putu Hariyadi
Jurnal Bumigora Information Technology (BITe) Vol 3 No 2 (2021)
Publisher : Prodi Ilmu Komputer Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/bite.v3i2.1577

Abstract

Penerapan otomatisasi manajemen konfigurasi jaringan dapat meningkatkan efisiensi dan meminimalkan risiko kesalahan konfigurasi. Penelitian terdahulu telah berhasil menerapkan otomatisasi manajemen konfigurasi Virtual Local Area Network (VLAN), InterVLAN dan Dynamic Host Configuration Protocol (DHCP) Server menggunakan Ansible pada infrastruktur jaringan berbasis Cisco. Namun rancangan sistem otomatisasi yang dibuat hanya dapat diterapkan pada rancangan jaringan ujicoba di penelitian tersebut. Konfigurasi kebijakannya masih dikelola secara statik dan digabungkan menjadi satu kesatuan didalam file Ansible playbook sehingga ketika terjadi perubahan harus diubah di dalam file tersebut secara langsung. Penelitian ini mengimplementasikan Ansible Playbook dengan variable files yang menampung kebijakan konfigurasi sehingga dapat mengotomatisasi manajemen konfigurasi VLAN berbasis VTP dan layanan DHCP secara dinamis. Metode penelitian yang digunakan adalah Network Developement Life Cycle. Rancangan jaringan ujicoba disimulasikan menggunakan PNETLab. Sistem otomatisasi yang dibangun dapat digunakan untuk manajemen konfigurasi perangkat jaringan baik router, switch maupun multilayer switch meliputi pembuatan dan penghapusan VLAN berbasis VTP dan DHCP di setiap lokasi. Selain itu sistem otomatisasi yang dibuat dapat mempercepat proses pengelolaan VLAN berdasarkan 3 (tiga) kali percobaan di setiap lokasi yaitu rata-rata 6 (enam) kali lebih cepat ketika operasi pembuatan konfigurasi. Sedangkan ketika operasi penghapusan konfigurasi, sistem otomatisasi rata-rata 3 (tiga) kali lebih cepat dibandingkan secara manual.
Simulator GNS3 dan Wireshark Sebagai Model Virtual Pembelajaran Pratikum Jaringan Komputer Raisul Azhar; I Putu Hariyadi
Jurnal Kependidikan: Jurnal Hasil Penelitian dan Kajian Kepustakaan di Bidang Pendidikan, Pengajaran dan Pembelajaran Vol 3, No 2: September 2017
Publisher : Universitas Pendidikan Mandalika (UNDIKMA)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (536.327 KB) | DOI: 10.33394/jk.v3i2.678

Abstract

Impkementation of practicum on the course of computer networking at vocational school (SMKN1 Sambelia) and (SMKS Al Ma’rif Qomarul Huda) was through a convensional methods with incomplete equipments. In practicum activity should be supported by a various eqipments with different functions, such as; router, hub, accent firewall, but relatively expensive for procurement. Therefore, the school unable to fullfill the practicum equipments and potentially disturb the instructional process. To solve this condition, a virtual instructional methods could be implemented through GNS3 simulator completed with the network analyzer tools. The research method was Network Development Life Cicle and simulator utility of measurement functionality in the instructional of computer networking.
Analisa Cakupan Area Signal Wireless Fidelity Terhadap Kualitas Layanan Dengan Metode Top Down Network Raisul Azhar; I Putu Hariyadi; Heroe Santoso; I Gede Bagus Arthana
Jurnal Bumigora Information Technology (BITe) Vol 4 No 2 (2022)
Publisher : Prodi Ilmu Komputer Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/bite.v4i2.2431

Abstract

The proper placement of Access Point (AP) devices will affect network connectivity. This study applies the Top-Down Network Design Method which consists of the Needs Analysis Stage, Logic Design and Physical Design. This method is used to map processes that occur by identifying the needs of all internet users, designing network topology logic and determining the physical design of computer networks to be implemented. The purpose of this study is to determine the quality of connectivity from the proper Access Point range of Access Point devices and there are no deadzone s that occur and their impact on the quality of network service to users. The conclusion of this study is that it is able to improve the quality of connectivity from the reach of internet user Access Points so that there are no more dead zone coverage areas that occur in class 1 and 2 floor buildings as well as graduate buildings in the best coverage area in the 50m range for the 2.4GHz frequency. With a total of 450 users (students and lecturers), it is sufficient to provide a minimum of 125.25Mbps internet bandwidth and required 5 Access Point units and 3 wireless router units as a whole. Placement of different locations from AP devices determines good or bad quality of service produced and there is still a packet loss of 5.9% and a Throughput of 15.93Mbps in the lecturer room and in other areas.
Plume Detection System Based Internet of Things I Nyoman Susila Astraning Utama; Sirojul Hadi; I Putu Hariyadi
International Journal of Engineering and Computer Science Applications (IJECSA) Vol 1 No 1 (2022): March 2022
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (808.285 KB) | DOI: 10.30812/ijecsa.v1i1.1698

Abstract

Security is one of the important aspects in a system or environment. Residential, office, tourist and industrial areas are places that are prone to fires because they contain flammable objects. Slow handling when a gas leak occurs can trigger a fire. The solution that can be used to minimize the occurrence of fires is to build tools that work to monitor the condition of the room or environment that is prone to leakage of gas or other flammable liquids. The design and manufacture of a system to detect LPG and alcohol gas leaks can be useful for providing information in the event of a gas or alcohol leak so that it can be handled quickly and minimize fire damage. This system combines an plume detection system with an internet of things system so that it can provide information when a gas or flammable liquid leak occurs. The gas leak information is sent as a notification to the telegram from the operator. The design and manufacture of this system uses the Waterfall methodology with the following stages: analyzing (covering the need for system creation), system design (including designing electronic circuits and web monitoring interfaces), implementing system design and testing the system as a whole. The result of this research is that an electronic detection system has been successfully built that can distinguish gases and can provide information via telegram and web if gas is detected in the sensor environment. In the LPG gas leak test, the results show that the characteristics of LPG gas, namely the sensor output voltage, have an average of 4.17 volts with an average Part Per Million (PPM) of 8340 and the characteristics of alcohol gas, namely the sensor output voltage, have an average of 0, 13 volts with an average Part Per Million (PPM) of 254.
SISTEM PENDUKUNG KEPUTUSAN KELOMPOK PENENTUAN DOSEN PENGAMPU MATA KULIAH DENGAN METODE PROMETHEE DAN BORDA Heroe Santoso; Raisul Azhar; I Putu Hariyadi; Husain, Husain; Yayan Suganda
TEKNIMEDIA: Teknologi Informasi dan Multimedia Vol. 4 No. 1 (2023): Juni 2023
Publisher : Badan Penelitian dan Pengabdian Masyarakat (BP2M) STMIK Syaikh Zainuddin NW Anjani

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46764/teknimedia.v4i1.88

Abstract

Lecturers are professional educators and scientists with the main task of teaching, transforming, developing and disseminating science, technology, and art (IPTEKS) through teaching, research and community service. The position of lecturers as professionals serves to increase the dignity of lecturers and develop science and technology to improve the quality of national education. The goal is to implement the national education system and realize the goals of national education. The head of the study program and the dean in determining the lecturers for the courses are still done manually based on the competence of each lecturer and looking at the previous semester's teacher decisions. In this method of determination, of course, the results obtained are still not optimal because there are still some lecturers who do not match the competencies/qualifications of the courses being taught. Based on the problems above, the faculty will think of a better system, namely switching from a manual system to a Group Decision Support System (GDSS). The GDSS method used is the promethee and borda method which is one method of solving decision-making problems in a group. With promethee and borda method, several different opinions or perceptions about a decision can be combined into a group/joint decision. That way, the resulting decisions can be accepted by the group. The system development method uses the waterfall method which consists of several stages, including: data collection stage, analysis stage, design stage, coding stage and testing stage. The conclusion of this study resulted in a Group Decision Support System for determining the lecturers of courses using the borda method. Based on the results of system testing, respondents stated that the system can simplify and speed up the process of determining the course lecturers.
IMPLEMENTATION OF CONTINUOUS INTEGRATION/CONTINUOUS DEPLOYMENT TO AUTOMATE COMPUTER NETWORK INFRASTRUCTURE CONFIGURATION MANAGEMENT Hariyadi, I Putu; Raisul Azhar; Heroe Santoso; Khairan Marzuki; I Made Yadi Dharma
TEKNIMEDIA: Teknologi Informasi dan Multimedia Vol. 4 No. 2 (2023): Desember 2023
Publisher : Badan Penelitian dan Pengabdian Masyarakat (BP2M) STMIK Syaikh Zainuddin NW Anjani

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46764/teknimedia.v4i2.127

Abstract

Computer network infrastructure is one of the supporting components for smooth operations for companies that utilize Information and Communication Technology (ICT). Companies are required to continue to innovate to continue to grow so it requires various adjustments, including changes to the policy configuration of computer network infrastructure. Implementation of configuration changes to computer network infrastructure if done manually will be inefficient and ineffective. In addition, it is prone to errors as a result of human error resulting in downtime. The application of Continuous Integration/Continuous Deployment (CI/CD) can be a solution to overcome these problems. This study analyzes the implementation of CI/CD on network infrastructure which is simulated using the PNETLab and GitLab CI/CD tools as well as Ansible Configuration Management. Based on the tests conducted five times, it can be concluded that the Ansible Playbook that has been created and integrated with the GitLab CI/CD pipeline can be used to automate configuration management of MikroTik-based network infrastructure that is simulated in PNETLab. CI/CD can speed up the implementation of configuration changes on network devices through an automated process. Testing additional configurations on the test network takes an average of 82.6 seconds. Meanwhile, on the production network, it takes an average of 80.2 seconds. On the other hand, testing the configuration deletion on the test network takes an average of 56.6 seconds. Meanwhile, on the production network, the average is 54.4 seconds. In addition, the application of CI/CD can minimize errors because before the configuration is applied to the production network, the configuration is tested first on the test network automatically. Application of the configuration to the production network is carried out only if testing of the configuration on the test network is successful. The CI/CD mechanism can improve the performance and reliability of computer network infrastructure.