Articles
Provisioning Google Kubernetes Engine (GKE) Cluster dengan Menggunakan Terraform dan Jenkins pada Dua Environment
Odi Pramadika;
Dian Widiyanto Chandra
JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Vol 8, No 2 (2023)
Publisher : STKIP PGRI Tulungagung
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.29100/jipi.v8i2.3630
Pada sistem dengan cangkupan besar membutuhkan ratusan bahkan ribuan server.Setiap server yang ada juga harus saling terhubung satu sama lain agar dapat berkomunikasi secara du arah dan setiap server memiliki kapasitasnya masing masing.Pada tahap development selalu membutuhkan minimal dua environment, yaitu development environment dan production environment. Provisioning GKE Cluster menggunakan Terraform dan Jenkins dapat memudahkan tim DevOps dalam menyiapkan Server sesuai kebutuhan secara otomatis. Hanya memerlukan waktu 15 menit 18,412 detik untuk menyiapkan satu cluster dengan tiga node pada environment Development dan 13 menit 26,407 detik untuk menyiapkan satu cluster dengan satu node pada environment Production. Dengan adanya sistem in membantu tim DevOps untuk menyiapkan server dengan lebih cepat dan minim kendala karena semakin kompleksnya kebutuhan suatu perusahaan.
Peningkatan Keamanan Database Pada Layanan Azure Melalui Metode Multi-Tenant Dengan Pendekatan Separate Database
Samuel Nugraha;
Dian W. Chandra
Jurnal Pendidikan dan Teknologi Indonesia Vol 3 No 6 (2023): JPTI - Juni 2023
Publisher : CV Infinite Corporation
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jpti.293
Untuk semakin menghemat biaya dalam penggunaan layanan cloud di Azure, maka dapat menggunakan arsitektur multi-tenant. Arsitektur multi-tenant memungkinkan pengguna untuk menggunakan layanan cloud secara bersama-sama. Namun ada hal yang perlu diperhatikan saat menggunakan layanan multi-tenant, salah satunya adalah keamanan database antar pengguna. Salah satu solusi untuk mengatasi hal tersebut adalah dengan melakukan pendekatan separate database. Penelitian ini bertujuan untuk meningkatkan keamanan data pada metode multi tenant dengan pendekatan separate database pada layanan Microsoft Azure. Metode yang dilakukan pada penelitian ini adalah metode multi tenant dengan pendekatan arsitektur database yang digunakan adalah separate database, dan jenis layanan cloud yang digunakan adalah Paas (Platform as a Service) yang mana menggunakan Azure App Service dan Azure SQL Database dalam melakukan proses migrasi. Hasil dari penelitian ini adalah melakukan migrasi database dengan pendekatan separate database dari masing-masing pengguna layanan ke dalam layanan Azure. Hal ini dapat meningkatkan keamanan data antar pengguna sehingga tidak terjadi kebocoran data karena masing-masing pengguna memiliki databasenya sendiri.Desain arsitektur multi tenant separated database memiliki manfaat yaitu keamanan data yang lebih baik, karena tiap tenant memiliki database tersendiri sehingga data dari tiap tenant tidak bercampur menjadi satu. Sementara dari segi biaya layanan Azure App lebih hemat dibandingkan dengan layanan Azure Virtual Machine
Implementasi Metode Hierarchical Token Bucket (HTB) pada Pembagian Bandwith Berdasarkan Media Pembelajaran Online dan Social Media
Dicky Anggara Sendiyono;
Dian Widiyanto Chandra
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 7 No 3 (2023): JULY-SEPTEMBER 2023
Publisher : KITA Institute
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.35870/jtik.v7i3.824
Education in Indonesia is growing rapidly, schools provide the internet for learning activities by accessing educational content that has been created by schools through online learning media. SMP Stella Matutina Salatiga as a case study place, in learning activities using online learning media is not optimal because many school residents use the internet to access social media. To overcome this problem, it is necessary to manage internet bandwidth by implementing the Hierarchical Token Bucket (HTB) method. This bandwidth distribution aims to facilitate learning activities, where bandwidth will be prioritized for online learning media. By dividing the bandwidth using the HTB method, the bandwidth is more organized. The results of the test were carried out by measuring the QoS parameters using video streaming services and interactive services which experienced an increase in network quality after the HTB method was applied, it was marked by a decrease in the average value of jitter, delay, and packet loss, which means the throughput obtained is greater. The application of the HTB method is of course learning to use online learning media to be more optimal.
Implementation Of Intrusion Detection System (Ids) Using Security Onion
Rulof Baltwin Tallane;
Dian Widiyanto Chandra
Syntax Literate Jurnal Ilmiah Indonesia
Publisher : Syntax Corporation
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (186.841 KB)
|
DOI: 10.36418/syntax-literate.v7i10.8824
Intrusion Detection System (IDS) is a system in charge of monitoring network traffic to detect suspicious and abnormal activity and provide alerts when such activity is detected. The use of the Intrusion Detection System is very helpful for administrators to monitor network traffic so as to minimize the occurrence of attacks that result in system damage and data theft. To minimize the occurrence of system damage and data theft by attackers, the author implements an Intrusion Detection System using Security Onion so that when an attack occurs it can be directly handled by the administrator. In this study, a test was conducted on Security Onion using the Signature Based method in detecting Remote Access Trojan attacks which according to BSSN data from January to April 2020 were the most common types of attacks. The results of this study can be used to detect cyber attacks that result in system damage and data theft.
Implementasi Wazuh Integritas File untuk Perlindungan Keamanan Berdasarkan Aktivitas Log di BTSI UKSW
Bagas Haryanto;
Dian W. Chandra
Jurnal Indonesia : Manajemen Informatika dan Komunikasi Vol. 5 No. 1 (2024): Jurnal Indonesia : Manajemen Informatika dan Komunikasi (JIMIK)
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) AMIK Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.35870/jimik.v5i1.447
Technological developments are now increasingly sophisticated, especially in data security. Data security and File Integrity have an essential role and are one of the main concerns in the corporate environment. Practical steps are needed for a data security system that detects data threats, especially File Integrity within the SWCU BTSI environment. The Wazuh system provides monitoring and detection of File change activity. This feature works because of Real-Real File change activity and log analysis. To maintain system security is to monitor File Integrity, namely ensuring that critical Files are not subject to unauthorized changes by unauthorized parties. Therefore, research was carried out and implementation of File Integrity Wazuh for security protection based on log activity at SWCU BTSI. The results showed that the implementation of the File Integrity Wazuh system can identify security incidents against suspicious activity on a File and is effectively able to provide notifications to administrators against unauthorized activity
Implementasi Wazuh Integritas File untuk Perlindungan Keamanan Berdasarkan Aktivitas Log di BTSI UKSW
Haryanto, Bagas;
Chandra, Dian W.
Jurnal Indonesia : Manajemen Informatika dan Komunikasi Vol. 5 No. 1 (2024): Januari
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) STMIK Indonesia Banda Aceh
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.35870/jimik.v5i1.447
Technological developments are now increasingly sophisticated, especially in data security. Data security and File Integrity have an essential role and are one of the main concerns in the corporate environment. Practical steps are needed for a data security system that detects data threats, especially File Integrity within the SWCU BTSI environment. The Wazuh system provides monitoring and detection of File change activity. This feature works because of Real-Real File change activity and log analysis. To maintain system security is to monitor File Integrity, namely ensuring that critical Files are not subject to unauthorized changes by unauthorized parties. Therefore, research was carried out and implementation of File Integrity Wazuh for security protection based on log activity at SWCU BTSI. The results showed that the implementation of the File Integrity Wazuh system can identify security incidents against suspicious activity on a File and is effectively able to provide notifications to administrators against unauthorized activity
ANALISIS LOGGING DAN AUDITING AKSES DATABASE SQL MELALUI KONEKSI REMOTE AKSES MENGGUNAKAN ANYDESK
Joshua, Ivan;
W. Chandra, Dian
JATI (Jurnal Mahasiswa Teknik Informatika) Vol. 7 No. 6 (2023): JATI Vol. 7 No. 6
Publisher : Institut Teknologi Nasional Malang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.36040/jati.v7i6.8072
Semakin banyak organisasi atau perusahaan mengadopsi praktik kerja jarak jauh dan mengandalkan koneksi remote untuk mengakses basis data SQL yang mengandung informasi penting mereka. Ini memunculkan kebutuhan untuk mengamankan, memantau, dan mengaudit aktivitas akses database yang dilakukan melalui koneksi remote. Keamanan, integritas, dan kepatuhan data menjadi prioritas utama dalam menghadapi tantangan ini untuk menjaga kesuksesan bisnis di era digital yang terus berkembang. Permasalahannya dalam pertanyaan penelitian adalah bagaimana cara memastikan bahwa data yang diinputkan ke database SQL melalui koneksi remote menggunakan anydesk sudah benar dan tidak mengalami redudansi data atau manipulasi yang tidak sah?. Penelitian ini menggunakan metode NDLC (Network Development Life Cycle) yang merupakan teknik analisis terstruktur yang digunakan untuk merencanakan dan mengelola proses pengembangan sistem. Hasil penelitian mendapatkan 2 bagian log yang tercatat yaitu bagian login dan bagian database atau transaction log.
Analisis keamanan Content Delivery Network (CDN) Cloudflare (Studi kasus: Web Hakazon)
Rahmadyanto, Eko Putra;
Chandra, Dian Widiyanto
Jutisi : Jurnal Ilmiah Teknik Informatika dan Sistem Informasi Vol 12, No 3: Desember 2023
Publisher : STMIK Banjarbaru
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.35889/jutisi.v12i3.1636
Content Delivery Network (CDN) is a server network system that has the function of distributing servers globally. On the Cloudflare CDN, there is a Web Application Firewall (WAF) feature that is used to secure servers and websites so that Cloudflare can take preventive actions against hacker attacks. The purpose of this study is to analyze and compare the security of websites using Cloudflare CDN and without Cloudflare CDN. The method used in this research is research and comparison. The results show that Cloudflare's CDN security is effective if it is used to strengthen the security of a website in the form of preventive actions using the CDN and WAF contained in it. In addition, requests that are considered dangerous will be blocked by WAF so that website security becomes stronger on the server-side.Keywords: Content Delivery Network; Hacker; Website Security; Web Application Firewall  AbstrakContent Delivery Network (CDN) merupakan sistem jaringan server yang memiliki fungsi mendistribusikan server secara global. Pada CDN Cloudflare terdapat fitur Web Aplication Firewall (WAF) yang dimanfaatkan untuk melakukan pengamanan pada server dan website sehingga Cloudflare dapat melakukan tindakan preventif terhadap serangan peretas. Tujuan penelitian ini adalah menganalisis dan membandingkan keamanan website yang menggunakan CDN Cloudflare dan tanpa CDN Cloudflare. Metode yang digunakan dalam penelitian ini adalah penelitian dan perbandingan. Hasil penelitian menunjukkan bahwa keamanan CDN Cloudflare efektif jika digunakan untuk memperkuat keamanan suatu website berupa tindakan preventif menggunakan CDN dan WAF yang ada di dalamnya. Selain itu, request yang dianggap berbahaya akan dilakukan block oleh WAF sehingga keamanan website menjadi lebih kuat melalui sisi server.Â
Analisis Keamanan DHCP Menggunakan RADIUS Accounting
Purun, Elisa Stefano Franli;
Chandra, Dian Widiyanto
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 9 No 3 (2025): JULI-SEPTEMBER 2025
Publisher : Lembaga Otonom Lembaga Informasi dan Riset Indonesia (KITA INFO dan RISET)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.35870/jtik.v9i3.3667
Every computer needs and must have an IP Address to connect with other computer network users, the IP Address will be automatically distributed to network users using the Router as a DHCP Server. In addition to DHCP, the Router has a DHCP Accounting service that can improve network security with AAA and RADIUS Server features that can be implemented with Freeradius. DHCP Accounting has accounting capabilities for secure START and STOP message transmission, but the flash memory capacity on the C2691 router is around 32 MB, making the DHCP Accounting service not run optimally if it has many users. Using MySQL as a database can be a solution to this problem. When using the DHCP Accounting feature, data from DHCP Accounting will be sent and centralized on Freeradius. Accounting data centralized on Freeradius will be stored using a MySQL database so that the available storage space will be much larger and can accommodate more data from DHCP Accounting, as well as monitoring the network so as to improve network security for users.
Analisis hubungan antara kualitas layanan jaringan dan pengalaman pengguna pada layanan video streaming youtube
Auliya, Kharisma Xena;
Dian W. Chandra
IT Explore: Jurnal Penerapan Teknologi Informasi dan Komunikasi Vol 4 No 3 (2025): IT-Explore Oktober 2025
Publisher : Fakultas Teknologi Informasi, Universitas Kristen Satya Wacana
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.24246/itexplore.v4i3.2025.pp272-281
The quality of user experience (Quality of Experience/QoE) in YouTube video streaming services is highly influenced by the quality of network service (Quality of Service/QoS). QoS measurement is conducted using Wireshark software with parameters such as throughput, packet loss, delay, and jitter, and assessed based on the TIPHON standard. Meanwhile, QoE is evaluated through a survey of 30 respondents and measured using the Likert scale.The analysis results indicate that QoS falls into the "Good" category, with a throughput of 1,545.45 kbps at 51.5%, 0% packet loss, 5.69 ms delay, and 0.0015 ms jitter. Additionally, the average QoE score of 4.55 suggests that the user experience is also considered good. Further analysis reveals a correlation between QoS and QoE, where a more optimal network quality positively impacts user experience. These findings provide insights for service providers to optimize streaming quality to meet user expectations.