Claim Missing Document
Check
Articles

Found 7 Documents
Search
Journal : ILKOM Jurnal Ilmiah

PENERAPAN METODE COMPOSITE LOGIC UNTUK PERANCANGAN FRAMEWORK PENGUMPULAN BUKTI DIGITAL PADA MEDIA SOSIAL Al Jumah, Muhammad Naim; Sugiantoro, Bambang; Prayudi, Yudi
ILKOM Jurnal Ilmiah Vol 11, No 2 (2019)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (615.256 KB) | DOI: 10.33096/ilkom.v11i2.442.135-142

Abstract

Social media has become a major part of society. But most of the time social media is used as a way people commit the crime. Due to numerous crimes that use social media, it is essential to design a framework to gather digital evidence on social media. This study develops the design of Framework by implementing Composite Logic Model.  A logic Composite model can be used to determine the role model of any variable or pattern that need to collaborate. Composite Logic Model will produce a role model that has a role to produce patterns so that it can produce the same goal. A method of Composite Logic will collaborate with the Digital Forensics Investigation framework to produce a Digital Evidence Collection Framework on Social Media. Based on data and facts, this study has been producing a new framework of gathering digital evidence on social media. The framework has four main stages in the process of collecting digital evidence on social media including pre-process, collection, analysis, and report.
DATA VISUALISASI SEBAGAI PENDUKUNG INVESTIGASI MEDIA SOSIAL Pomalingo, Suwito; Sugiantoro, Bambang; Prayudi, Yudi
ILKOM Jurnal Ilmiah Vol 11, No 2 (2019)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (889.489 KB) | DOI: 10.33096/ilkom.v11i2.443.143-151

Abstract

Social media is an application that can make everyone interact with each other and can consume information by sharing content quickly, efficiently and real time. Various kinds of information about someone's activities that we can find on social media, making social media can help to conduct investigations. Some research, using visualization with several graph methods to facilitate the process of analyzing data on social media that is so abundant. But the data used only comes from one social media, while there is still a lot of information on other social media that can be used as data sources for analysis purposes. In this study visualization using the directed graph method will be carried out, then calculate the value of network property and the value of centrality to find out which nodes have many activities which will be carried out in depth searches to find patterns of interaction or activity. Based on the results of the calculated centrality, it is found that on Twitter and Instagram accounts there are many interactions, this can be seen in the value of the indegree and outdegree node. Based on the results of the analysis in this study, information that is important for investigating social media is obtained, such as information about user profiles, posts, comments, preferred social media pages, location, and timestamp, all of which are connected by a line that shows the relationship between the node.
DETEKSI PINEAP PADA FIRMWARE WIFI PINEAPPLE MENGGUNAKAN SMARTPHONE BERBASIS ANDROID Romisa, Fahmi; Sugiantoro, Bambang
ILKOM Jurnal Ilmiah Vol 8, No 3 (2016)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (930.876 KB) | DOI: 10.33096/ilkom.v8i3.68.204-211

Abstract

Kebutuhan akan akses jaringan nirkabel atau wireless saat ini sangat dibutuhkan oleh hampir semua orang, hampir di semua tempat terdapat akses jaringan wifi. Sebuah ilmu penetrasi jaringan semakin lama selama meningkat, tidak hanya menggunakan suatu penetrasi yang menggunakan perangkat lunak, tetapi sudah merambah ke perangkat keras yang sudah berubah fungsi, tidak lagi berfungsi sebagai menyebar sebuah koneksi data, tetapi sudah merambah sebagai alat penetrasi jaringan, sistem ini berguna untuk mendeteksi adanya sebuah router yang dapat menduplikasi semua router sekitar dengan permintaan probe request, maka dari itu diperlukan suatu alat pendeteksian yang dapat mendeteksi secara real time terhadap router tersebut . penelitian ini menghasilkan suatu alat pendeteksian yang user friendly menggunakan smartphone berbasis android, beserta analisis dan melakukan suatu uji beda pada router yang memiliki firmware wifi pineapple yang memiliki core pineap. 
Development of the Forensic Storage Framework using the Composite Logic method Rachman, Helmi; Sugiantoro, Bambang; Prayudi, Yudi
ILKOM Jurnal Ilmiah Vol 13, No 1 (2021)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Along with the development of information technology users, it is possible that crimes that take advantage of information technology continue to develop both directly and indirectly. Criminals often use computer devices to commit crimes. This is a major concern, so the need for handling digital evidence is very important. Therefore, a storage forensic framework is needed for handling digital evidence. This framework is designed by applying the Composite Logic method. The Composie Logic method is applied to determine the role model of each variable or initial pattern of the stages that you want to collaborate with. Composite Logic produces a role model who has a role to produce patterns so that they achieve the same goal. The logic composite method collaborates with existing frameworks for handling hdd, ssd, vmware and cloud which are then combined into a foreign storage framework. Based on the results of the tests carried out, this research has produced a new framework called the storage forensic framework. The advantage of this storage forensic framework compared to several other frameworks is that it is far required that it can be used to generate digital evidence in four storage, namely, SSD, HDD, VmWare, and cloud. This framework produces four main stages, namely preparation, collection, analysis and reports.
DATA VISUALISASI SEBAGAI PENDUKUNG INVESTIGASI MEDIA SOSIAL Suwito Pomalingo; Bambang Sugiantoro; Yudi Prayudi
ILKOM Jurnal Ilmiah Vol 11, No 2 (2019)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v11i2.443.143-151

Abstract

Social media is an application that can make everyone interact with each other and can consume information by sharing content quickly, efficiently and real time. Various kinds of information about someone's activities that we can find on social media, making social media can help to conduct investigations. Some research, using visualization with several graph methods to facilitate the process of analyzing data on social media that is so abundant. But the data used only comes from one social media, while there is still a lot of information on other social media that can be used as data sources for analysis purposes. In this study visualization using the directed graph method will be carried out, then calculate the value of network property and the value of centrality to find out which nodes have many activities which will be carried out in depth searches to find patterns of interaction or activity. Based on the results of the calculated centrality, it is found that on Twitter and Instagram accounts there are many interactions, this can be seen in the value of the indegree and outdegree node. Based on the results of the analysis in this study, information that is important for investigating social media is obtained, such as information about user profiles, posts, comments, preferred social media pages, location, and timestamp, all of which are connected by a line that shows the relationship between the node.
Forensic storage framework development using composite logic method Helmi Rachman; Bambang Sugiantoro; Yudi Prayudi
ILKOM Jurnal Ilmiah Vol 13, No 1 (2021)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v13i1.811.58-66

Abstract

Increasing number of information technology users allows possibility for crimes to take advantage of information technology to continue increasing either directly and indirectly. Criminals often use computer devices to commit crimes. This is a major concern so that the need for handling digital evidences becomes significantly urgent. Therefore, a forensic storage framework is required for managing digital evidences. This framework is designed by applying the composite logic method to determine role model of each variable or the initial pattern of the stages to be collaborated. Composite logic produces a role model that is to generate patterns in order to achieve the same goal. This method collaborates framework for handling the pre-existing hdd, ssd, and vmware to be in turn combined into a forensic storage framework. Based on the results of the test, this study proposes a new framework called forensic storage framework which comprises of four main stages, namely preparation, collection, analysis and report. The advantage of this framework is that it can be used to handle digital evidences in four storages which are SSD, HDD, VmWare, and cloud.
DETEKSI PINEAP PADA FIRMWARE WIFI PINEAPPLE MENGGUNAKAN SMARTPHONE BERBASIS ANDROID Fahmi Romisa; Bambang Sugiantoro
ILKOM Jurnal Ilmiah Vol 8, No 3 (2016)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v8i3.68.204-211

Abstract

Kebutuhan akan akses jaringan nirkabel atau wireless saat ini sangat dibutuhkan oleh hampir semua orang, hampir di semua tempat terdapat akses jaringan wifi. Sebuah ilmu penetrasi jaringan semakin lama selama meningkat, tidak hanya menggunakan suatu penetrasi yang menggunakan perangkat lunak, tetapi sudah merambah ke perangkat keras yang sudah berubah fungsi, tidak lagi berfungsi sebagai menyebar sebuah koneksi data, tetapi sudah merambah sebagai alat penetrasi jaringan, sistem ini berguna untuk mendeteksi adanya sebuah router yang dapat menduplikasi semua router sekitar dengan permintaan probe request, maka dari itu diperlukan suatu alat pendeteksian yang dapat mendeteksi secara real time terhadap router tersebut . penelitian ini menghasilkan suatu alat pendeteksian yang user friendly menggunakan smartphone berbasis android, beserta analisis dan melakukan suatu uji beda pada router yang memiliki firmware wifi pineapple yang memiliki core pineap. 
Co-Authors Abdul Haris Muhammad Abdullah, Mohd. Fikri Azli bin Afrianto, Nurdi Agung Fatwanto Ahmad Luthfie Akbar, Bintang Faisal Akbar, Muhammad Tulus Akbar, Reonaldo Al Jum'ah, Muhammad Na'im Alfani, Muhammad Nur Alfarizi, Naufal Faiz Alifah Amalia Amalia, Alifah Amanulloh, Rivkih Amin Pujiati Amin Retnoningsih Anbari, Muhamad Zaki Anwar, Muhammad Khoirul Arromdoni, Bad’ul Hilmi Astari, M Rizky Asyhab, Naufal bahary, muhammad syaiful Bahry, Muhammad Syaeful Budi Permana Putra Budiman, Kholiq Dewantara, Rizki Dori Gusti Alex Candra Efdika, Muhamad Fadil Efendi, Muhamad Masjun Elvanisa Ayu Muhsina, Elvanisa Ayu Endra Yuliawan Fahmi Romisa Gatra, Rahmadhan Gatra, Ramadhan Gunawan Gunawan Habibah, Berlian Ummu Habibullah, Ricky Hafizuddin, Faiz Akhmad Hakim, Fani Rakhman Hanif Hanif Hartono Hartono Helmi Rachman Hikmatyar, Firmansyah Gustav Idir Fitriyanto Idir Ika Arfiani Imtikhan Azmi, Himawan Istianto, Yudi Izdiharsant, Almaas Jazi Eko Istiyanto Karmesti, Danissa Wirna Kesumahadi, Lisdianto Dwi Khanif Setiyawan Khusna, Tachiyya Nailal Mahardhika, Yuha Bani Mahbub Puba Fawzan Mahbub Puba Fawzan, Mahbub Puba Mahmuda, Muhimmatul Mardlian, M. Sa’id Abdurrohman Kunta Maria Ulfa Siregar Maria Ulfah Siregar Maria Ulfah Siregar Mastur Mastur Meiditra, Irzon Merisa Kurniasari Fadilla Muhamad Fadli Muhamad Soleh Muhamad Zaki Anbari Muhammad Hambali, Muhammad Muhammad Reza Velayani Muhammad Taufiq Nuruzzaman Mujahidah, Latifatul Mulyana, Riyan Nana Kariada Trimartuti Nana Supriyana Ngisomudin, Ngisomudin Nora Lizarti Nugrah Rekto Prabowo Nur Wibowo, Trio Nuruzzaman, Muhammad Taufiq Panggih Gumelaring Praja Pomalingo, Suwito Praharto, YB. Prasdika, Prasdika Pratiwi, Millati Putry Wahyu Setyaningsih Qorry Aina Fitroh Rachman, Helmi Retantyo Wardoyo Rini Audia Rinny Asasunnaja Riwanto, Yudha Romisa, Fahmi Rusnaldhy, Rusnaldhy Sakuri, Sakuri Sakuri, Sakuri Shofwatul 'Uyun Shofwatul ‘Uyun Son’Aniy, Irham Sophan Sofian Sri Hartati Subki, Ahmad Sucinta, Hanny Handayani Sumarsono , Sumarsono Sunyoto Sunyoto Supiyana, Nana Supriyono, Abdul Rohman Susilo Adi Widyanto Sutarno Sutarno Tasya Kumala Dewi, Bella Tri Widodo Tris Sugiarto Utis Sutisna Warso Warso, Warso Wicaksono, Nur Kukuh widowati widowati Wildan Nadiyal Ahsan Winasis, Bima Putra Wishnu, Asep Yudi prayudi Yuha Bani Mahardhika