Claim Missing Document
Check
Articles

Found 20 Documents
Search

ANALYSIS OF APPLICATION PERFORMANCE TESTING USING LOAD TESTING AND STRESS TESTING METHODS IN API SERVICE Mokhamd Hendayun; Arief Ginanjar; Yoan Ihsan
JURNAL SISFOTEK GLOBAL Vol 13, No 1 (2023): JURNAL SISFOTEK GLOBAL
Publisher : Institut Teknologi dan Bisnis Bina Sarana Global

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.38101/sisfotek.v13i1.2656

Abstract

Testing an application is an important thing to do in software development. However, there are some tests that are sometimes missed after application development has been completed, such as performance testing. Performance testing is a type of test to ensure software will work properly under the expected workload. When performance testing is important to ensure that the functional needs of the system are running well. To ensure that the business objectives of the system are satisfactory and according to user needs can be done using Black Box Method. After ensuring the final results meet the specifications of the system needs, performance testing can be carried out. In performance testing, a load and stress testing methods are used to test the system, so as to be able to validate system performance are correct and determine the operating capacity of the system, with load limit at the break threshold and above the break threshold. This test is carried out to help determine how software can act well when accessed by several users together with a lot of data. This study conduct analyze the behavior of the system in the server environment that currently running and then optimize the configuration of the service and server to achieve concurrent users with 500 users at a time with jmeter as a performance test tools.
Optimalisasi Open Source Relational Database Menggunakan Metode Replication dan Metode Cluster Arief Ginanjar; Mokhamad Hendayun; Wahyu Purnama Sari
Jurnal ICT: Information Communication & Technology Vol. 23 No. 1 (2023): JICT-IKMI, Juli 2023
Publisher : LPPM STMIK IKMI Cirebon

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Information technology are developed very fast in the present days. Along with the development of time, the amount of data and users will also increase which results in process of accessed and process workload will become slower. The ability to provide fast retrieve information is highly demanded to be more efficient and effective at these time, hopefully no problems occur when the required data is to be access. To overcome this problem there are technologies called Cluster and Replication that can help ensure high service availability by utilizing several computer resources that work together. If there’s a server that experiences failure, the system will not be immediately disrupted because other servers will continue functioning and replace the task of main server. Cluster capabilities allow a database to stay alive for a long time. Replications are techniques to copy and distribute database and objects from one to another database and synchronise between them. And data consistency can be keepted. Testing results with clusters tend to be faster, and testing between double VMs and triple VMs looks superior to triple VMs so it can make new alternative of choice in implementing database programming
Kehandalan Software Berdasarkan Data Sekunder Menggunakan Distribusi Poisson dan Kualifikasi Cronbach’s Alpha Bambang Pudjoatmodjo; Mokhamad Hendayun
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 5 No 2: Mei 2016
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (738.933 KB)

Abstract

In the last 17 years, the usage of computer software, such as operating system software and application software, (after the appearance of Windows 95) have increased rapidly. This is shown by the increasing number of choices for user to use the software to facilitate their work, such as word processing software, digital image processing, and financial application. A software must have a good reliability. It means the software can work according to the needs of the user. In addition, the software can perform fast recovery when subjected to disruption caused by mistakes made by users of the application. Therefore, we need a method for determining the software reliability. The assessment is based on the observation of failures occur in a certain interval range. Based on the observation we will determine the specific characteristics of data that will be used to select the probability distribution to determine the value of reliability. The type of data is secondary data (discrete). This aims to conduct a preliminary assessment before they are applied in real cases. The determination of reliability is used to draw conclusions on observations. Cronbach's Alpha scale is used to see how well the conclusions are drawn.
Strategi Komunikasi Hadapi Penolakan Pemanfaatan Energi Nuklir sebagai Pembangkit Listrik di Indonesia Pratama, Syahdino; Pasma, Satriani Aga; Hendayun, Mokhamad; Samihardjo, Isroil
Jurnal Ilmu Sosial dan Ilmu Politik (JISIP) Vol 13, No 2 (2024): August
Publisher : Universitas Tribhuwana Tungga Dewi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33366/jisip.v13i2.3081

Abstract

One form of potential threat faced by Indonesia is an energy crisis that can disrupt national stability. However, the use of nuclear as an alternative source of clean energy through Nuclear Power Plants (PLTN) has not been realized until now. This research aims to identify the obstacles faced in the plan to build a nuclear power plant in Indonesia and explain the communication strategy in facing the rejection of nuclear energy utilization as a power plant in Indonesia. This research uses qualitative methods with data collection techniques through interviews with competent parties in the energy sector, especially nuclear energy and its utilization in power plants in Indonesia. The results showed that public acceptance of the nuclear power plant development plan experienced ups and downs depending on the time and events behind it. In addition, the interpretation of the phrase “considering nuclear as the last resort” in the legislation is also one of the obstacles to the progress of the implementation of nuclear power plant construction. Therefore, the support of all stakeholders is needed for the initiative to revise the laws and regulations that are considered to hinder the construction of nuclear power plants, in addition to building communication with those who reject the development plan through structured and massive persuasive and educational methods.Salah satu bentuk potensi ancaman yang dihadapi Indonesia adalah krisis energi yang dapat mengganggu stabilitas nasional. Namun, pemanfaatan nuklir sebagai alternatif sumber energi bersih melalui Pembangkit Listrik Tenaga Nuklir (PLTN) belum terealisasi hingga saat ini. Penelitian ini bertujuan untuk mengidentifikasi kendala-kendala yang dihadapi dalam rencana pembangunan PLTN di Indonesia dan menjelaskan strategi komunikasi dalam menghadapi penolakan pemanfaatan energi nuklir sebagai pembangkit listrik di Indonesia. Penelitian ini menggunakan metode kualitatif dengan teknik pengumpulan data melalui wawancara dengan pihak-pihak yang berkompeten di bidang energi, khususnya energi nuklir dan pemanfaatannya pada pembangkit listrik di Indonesia. Hasil penelitian menunjukkan penerimaan publik terhadap rencana pembangunan PLTN mengalami pasang-surut bergantung waktu dan peristiwa yang melatarinya. Selain itu, interpretasi terhadap frasa “mempertimbangkan nuklir sebagai pilihan terakhir” dalam peraturan perundang-undangan juga menjadi salah satu penghambat kemajuan implementasi pembangunan PLTN. Oleh karena itu, diperlukan dukungan seluruh stakeholder terhadap insiasi untuk merevisi peraturan perundang-undangan yang dinilai menghambat pembangunan PLTN, di samping membangun komunikasi terhadap pihak-pihak yang menolak rencana pembangunan tersebut melalui cara-cara persuasif dan edukasi yang terstruktur serta masif.
Tata Kelola pada Perguruan Tinggi Menggunakan Control Objective for Information & Related Technology (COBIT) 5 asriyanik asriyanik; Mokhamad Hendayun
Jurnal Teknik Informatika dan Sistem Informasi Vol 3 No 1 (2017): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v3i1.665

Abstract

A College needs a good governance in implementation of information technology, especially which related with information security because information is an important asset. Framework which can be used for the preparation of information security governance is COBIT 5 from ISACA. The first  step to start the preparation of the governance using COBIT is mapping between the goal of college with enterprise goals (EG), IT Related Goals and domain process COBIT 5. From 15 colleges that have been accredited in West Java (15 Januari 2015), produced 13 EG related for college accreditation A, B and 10 for college accreditation EG C. For a sample in process capability assessment of information security governance, we used Universitas Muhammadiyah Sukabumi (UMMI) as the research object, which is an accredited college C, and EG focused on optimization of business process functionality associated with the alignment of IT goals of IT and business strategy, and 10 processes, i.e EDM01, EDM01, APO01, APO02, APO03, APO05, APO07, APO08, BAI01, BAI02. From the results obtained capability assessment process UMMI value of 7 is on level 0, ie the value of the attribute <15-50% and 3 process closer to fulfillment level 1, ie the interval> 50-85%. Gap analysis results, it turns out that making such UMMI lack of work products (evidence / result) of activities of governance processes deemed to have been executed. To meet the achievement level, it is recommended to perform compliance on each best practice and work products, and can be initiated by creating a guide to information security.
Evaluation of Network Function Virtualization Efficiency in Network Traffic Management Rusdan, Muchamad; Hendayun, Mokhamad; Kuswayati, Sri
Journal of Informatics and Communication Technology (JICT) Vol. 7 No. 1 (2025)
Publisher : PPM Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study investigates the efficiency of Network Function Virtualization (NFV) in managing network traffic using a simulation-based experimental approach. NFV offers flexibility, scalability, and cost-efficiency by replacing hardware-based functions with software-based services. The research involves the deployment of Virtual Network Functions (VNFs) such as firewalls, load balancers, and intrusion detection systems within a simulated environment using tools like Mininet, OpenStack, and GNS3. Performance was evaluated under varying traffic conditions—normal, moderate, and high load scenarios—by measuring latency, throughput, jitter, CPU, and memory usage. The findings indicate that while NFV performs comparably to traditional systems under low to moderate load, it suffers from performance degradation under high traffic, particularly in latency and resource utilization. However, the integration of intelligent orchestration and dynamic resource management can mitigate these limitations. The results suggest that with proper optimization, NFV can serve as a viable alternative to traditional network infrastructure, especially in supporting next-generation network applications. This study contributes to the understanding of NFV’s operational performance and provides recommendations for its deployment in modern networks.
Evaluation of Network Function Virtualization Efficiency in Network Traffic Management Rusdan, Muchamad; Hendayun, Mokhamad; Kuswayati, Sri
Journal of Informatics and Communication Technology (JICT) Vol. 7 No. 1 (2025)
Publisher : PPM Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study investigates the efficiency of Network Function Virtualization (NFV) in managing network traffic using a simulation-based experimental approach. NFV offers flexibility, scalability, and cost-efficiency by replacing hardware-based functions with software-based services. The research involves the deployment of Virtual Network Functions (VNFs) such as firewalls, load balancers, and intrusion detection systems within a simulated environment using tools like Mininet, OpenStack, and GNS3. Performance was evaluated under varying traffic conditions—normal, moderate, and high load scenarios—by measuring latency, throughput, jitter, CPU, and memory usage. The findings indicate that while NFV performs comparably to traditional systems under low to moderate load, it suffers from performance degradation under high traffic, particularly in latency and resource utilization. However, the integration of intelligent orchestration and dynamic resource management can mitigate these limitations. The results suggest that with proper optimization, NFV can serve as a viable alternative to traditional network infrastructure, especially in supporting next-generation network applications. This study contributes to the understanding of NFV’s operational performance and provides recommendations for its deployment in modern networks.
Early Warning System and Monitoring of River Water Quality Based on Internet of Things Hafizh Cahaya Putra, Vito; Hendayun, Mokhamad; Yustianto , Purnomo
Devotion : Journal of Research and Community Service Vol. 3 No. 13 (2022): Special Issue
Publisher : Green Publisher Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36418/dev.v3i1.89

Abstract

River conditions in Bandung City are currently in critical condition. This study aims to create an early warning system and monitoring of river water quality based on the Internet of Things in the hope that early warnings sent through the telegram application belonging to the Bandung City DLHK officer and the Twitter social media website, can inform the Bandung City DLHK officer that a river is in a polluted condition and the officer can immediately go to the location of river water to carry out mitigation, and give warnings to the community. The research method used using the waterfall method which consists of: needs analysis, system design, implementation, testing, and maintenance with sequential implementation. Data collection methods were carried out in several ways, namely: interviews, giving questionnaires, and literature studies used in this study sourced from books, journals, seminar presentations, and the internet as references in the research conducted. Based on the research that has been carried out, the following test results are obtained: black box testing is carried out in accordance with those contained in the test plan with the results of each test having valid results. The results obtained from the user acceptance test which are calculated using the Likert scale have an average value of 86.94% which fall into the category of strongly agree, and there are three guidelines which are a follow-up to the output of the early warning system that can be carried out either by the Environmental Service. and Cleanliness (DLHK) of Bandung City and the community.
Implementasi Metode Reverse Engineering pada Analisis Mobile Forensic terhadap kasus Cyber Crime Phising Supendi, Yiyi; Permana, Farrel Anggara; Hendayun, Mokhamad; Dwipriyoko, Estiyan
Jurnal Tiarsie Vol 20 No 4 (2023): Jurnal TIARSIE 20.4
Publisher : Fakultas Teknik Universitas Langlangbuana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32816/tiarsie.v20i4.262

Abstract

Perkembangan teknologi digital yang pesat telah meningkatkan kompleksitas kejahatan siber, salah satunya adalah phishing, yaitu upaya untuk memperoleh data pribadi secara ilegal melalui rekayasa sosial dan manipulasi aplikasi digital. Penelitian ini bertujuan untuk menganalisis penerapan metode Reverse Engineering dalam mobile forensic sebagai pendekatan untuk mengungkap mekanisme dan bukti digital pada kasus cyber crime phishing. Metode reverse engineering digunakan untuk membongkar struktur internal aplikasi berbahaya (malicious app) dengan menganalisis kode sumber, manifest file, serta aktivitas jaringan yang terjadi pada perangkat korban. Proses penelitian dilakukan melalui beberapa tahapan utama: (1) identifikasi perangkat bukti digital menggunakan mobile forensic tools seperti Autopsy dan Cellebrite UFED, (2) ekstraksi dan decompiling aplikasi mencurigakan menggunakan JADX dan APKTool, (3) analisis artefak digital untuk menemukan payload, API call, dan network request yang mengarah pada aktivitas phishing, serta (4) interpretasi hasil untuk rekonstruksi modus operandi pelaku. Hasil penelitian menunjukkan bahwa penerapan reverse engineering dalam mobile forensic mampu mengidentifikasi malicious intent, pola komunikasi server (command and control), serta metadata pengguna yang disalahgunakan. Penelitian ini memberikan kontribusi praktis dalam bidang digital forensics dan keamanan siber, khususnya dalam mendukung proses investigasi hukum terkait kejahatan phishing berbasis aplikasi mobile. Selain itu, hasil analisis juga dapat digunakan sebagai dasar untuk pengembangan sistem deteksi dini (early warning system) terhadap serangan serupa di masa mendatang.
Identifikasi Kerentanan Website untuk Meningkatkan Keamanan Menggunakan Open Source Security Testing Methodology Manual Rusdan, Muchamad; Hendayun, Mokhamad
Journal of Practical Computer Science Vol. 4 No. 2 (2024): November 2024
Publisher : DPPM Universitas Pelita Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37366/jpcs.v4i2.5427

Abstract

This study aims to identify and analyze security vulnerabilities on the online learning website of Utama University using the Open Source Security Testing Methodology Manual (OSSTMM). This method offers a structured framework for security testing with a systematic and evidence-based approach. The research findings indicate several vulnerabilities in authentication mechanisms, input validation, SSL/TLS configuration, and API security. The identified vulnerabilities include weaknesses in authentication mechanisms against brute force attacks, input validation susceptible to injection attacks, SSL/TLS configuration not meeting security standards, and inadequate API security. The mitigation recommendations include implementing CAPTCHA, limiting login attempts, using prepared statements, enhancing SSL/TLS configuration, and implementing security headers such as X-Frame-Options, Content-Security-Policy, and X-Content-Type-Options. By applying these recommendations, the overall security level of the website is expected to improve, ensuring the confidentiality, integrity, and availability of user data, and increasing trust in the university's digital services.