p-Index From 2021 - 2026
7.182
P-Index
This Author published in this journals
All Journal Jambi Medical Journal : Jurnal Kedokteran dan Kesehatan Tekno - Pedagogi : Jurnal Teknologi Pendidikan Jurnal Pendidikan Sosiologi dan Humaniora Jurnal Al-Ijtimaiyyah Jurnal Manajemen Pendidikan Jurnal Ilmiah Universitas Batanghari Jambi Jurnal Penelitian Pendidikan IPA (JPPIPA) Informatics for Educators and Professional : Journal of Informatics PINTER : Jurnal Pendidikan Teknik Informatika dan Komputer Pendas : Jurnah Ilmiah Pendidikan Dasar IRJE (Indonesian Research Journal in Education) Edukasi Islami: Jurnal Pendidikan Islam Misykat al-Anwar Jurnal Kajian Islam dan Masyarakat Jurnal Basicedu FIKRAH IJISTECH (International Journal Of Information System & Technology) JTP - Jurnal Teknologi Pendidikan GERVASI: Jurnal Pengabdian kepada Masyarakat BERNAS: Jurnal Pengabdian Kepada Masyarakat JES (Jurnal Ekonomi Syariah Jurnal Ilmu Manajemen Terapan (JIMT) IJISTECH JOURNAL OF ECONOMICS EDUCATION AND ENTREPRENEURSHIP Maslahah: Jurnal Pengabdian Masyarakat LADU: Journal of Languages and Education Tafkir: Interdisciplinary Journal of Islamic Education PRIMA : Portal Riset dan Inovasi Pengabdian Masyarakat Jurnal Prajaiswara Jurnal Manajemen Dakwah Jurnal Pengabdian Masyarakat Bestari (JPMB) Jurnal Basicedu Jurnal Karya Abdi Masyarakat International Journal of Learning Reformation in Elementary Education Jurnal Inovasi Pendidikan dan Teknologi Informasi (JIPTI) Tasyri' PPSDP International Journal of Education Al-Khidmah : Jurnal Pengabdian Kepada Masyarakat Indonesian Educational Administration and Leadership Journal (IDEAL) El-Mujtama: Jurnal Pengabdian Masyarakat Jurnal Pengabdian ADPIKS Fikrah : Jurnal Pendidikan Agama Islam Edumaspul: Jurnal Pendidikan INTECH - Informatika Dan Teknologi
Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : IJISTECH

Design And Implementation of Freeradius as A User Manager on The Mikrotik Hotspot Network at PT Indotruck Utama using The NDLC (Network Development Life Cycle) Method Pratama, Arya Pandu; Sugiyanta, Lipur; Idrus, Ali
IJISTECH (International Journal of Information System and Technology) Vol 7, No 2 (2023): The August edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i2.309

Abstract

PT Indotruck Utama utilizes the 802.11n network only as an internet medium, without thinking about a sufficient security system for offices or companies. By only utilizing the 802.11n network which has poor security, it affects many illegal users who can enter the wireless network and can interfere with the performance of employees who are working. The purpose of this study is to produce a RADIUS-based authentication system that is used to improve wireless network security systems, namely being able to make a user have to login authentication twice, create different usernames and passwords for each user, prevent the entry of illegal users, and facilitate administrators in user management. In designing FreeRADIUS as a user manager on this proxy hotspot network using the NDLC (Network Development Life) method through 6 stages, namely analysis, design, simulation prototype, implementation, monitoring, and management. However, its application is only carried out until the implementation stage. This authentication system can be one solution to solve some problems that exist in the wireless network at PT Indotruck Utama. The test results from the capture on the wireshark application that uses PAP authentication still see the username and password, while those who use CHAP authentication only the username is visible, while the password is not visible because it has passed the encryption process.
Design and Implementation of Sucirata-Based Instrusion Detection System as a Network Security System Cloud Computers Idrus, Ali; Sugiyanta, Lipur; Nugraheni, Murien; Subhiyanto, S
IJISTECH (International Journal of Information System and Technology) Vol 7, No 2 (2023): The August edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i2.310

Abstract

Cloud computing is currently being developed and widely used by companies that require large and efficient computing resources. As technology evolves, security threats in cloud services continue to increase. Various threats in cloud computing technology can be avoided by maximizing the identification of security holes. Information threats associated with cloud computing require network and service security against possible attacks. Suricata is a threat detection identifier supported by existing rules. When an attack is detected, Suricata will create a log of the attack committed, Suricata can also perform automatic detection at level 7. The author collected the results of the attack in a log. Sign Suricata and the authors also evaluate whether Suricata can detect port scanning, brute force, denial of service, and backdoors for Cloud Computing. From the test results, optimal results were obtained from the results of attacks detected by the Suricata Intrusion Detection System (IDS) logs in the /var/log/suricata/fast directory.log, the author added that the Suricata configuration is not only for detection, so it can also run drops if there is suspicious activity using network filters that already exist in Suricata and manipulated configuration assumptions to optimally improve security in the cloud.
Co-Authors ., Sulistari ., Syafira Agus Gunawan Agustin, Cahya Lestari Akbar, Tubagus Osama Amelia, Besse Desi Amirsyah, Amirsyah Ammany, Farah Andika Sulistiawan Andreo Yudherta Andriadi, Dian Angga warda prasakti Apdelmi, Apdelmi Apriani, Astri Dian Aprillitzavivayarti Atani, Moudy Hadillah Atani Az-Zahra, Deska Maura Azmina Zata Ismah Busahdiar Busahdiar, Busahdiar Citra Adinda Hartawan Denny Denmar Desy Pujiastuti Dika, Muhammad Arya Dupa, Annuri Putri Dwi Noerjoedianto Elfina, Ira Elis Kholisoh Emosda Emosda Fahriah , Putri Haezah Fahriah, Putri Haezah Farida Kohar Fatma Kartika, Rini Firjatullah, M. Habi Firman Firman Firman Gündüzöz, Güldane Gusnawan, Agung Hadi, Sukandar Hadiyanto Hadiyanto Haezah Fahriah, Putri Hanna Maryam Hariyati, Marisa Harmita Hartawan, Citra Adinda Hasugian, Reny Agustina Hefri Asra Omika Hendra, Robi Herawati, Helma Ilham, Muhammad Dzaky Faqihuddin Inmanora Irawan, Dodi Ismah, Azmina Zata Jamil, Rahmat Pebrian Jefri Marzal K.A. Rahman Kartika, Rini Fatma Kemas Abdu Rahman Khairinal Khairinal Khalid Rahman, Khalid Kholisoh, Elis Lestari, Agus Lestari, renda Linardo Pratama Lunita, Pramodya Casqie M. Hidayat M. Reza Matondang Mansur Mansur Margaretha, Dian Maryani , Anis Tatik Mayasari Mayasari, Mayasari Megawati Moh Khoirul Anam Mohamad Muspawi Mohzana Muazza Muazza Muchammad Ficky Duskarnaen MULYADI Mulyanah Mulyanah Mulyanah, Mulyanah Murien Nugraheni Musyaiyadah, Musyaiyadah Muttaqien, Muhammad Khaerul Muwafiqus Shobri Nida Jarmita Nur Aini Nur Aini Nurfauzi , Utari Nuryadin, Deni Pratama, Arya Pandu Pratama, Robin Puspita, Eti Putra, Yogi Irdes Raisha Putri Mellisa Reny Agustina Hasugian Respy Desmaryani Robin Pratama Rosmika, Enita Saputra , Endarman Setiyadi, Bradley Sinambela, Elfrida Sofyan Sopa & Siti Rahmah Sri Wahyuni Subandi , Andi Subhanadri Subhiyanto, S Suci Pratiwi Sudarman, Daman Sufri Sufri Sugiyanta, Lipur Sulistiyo, Urip Supian Suratno Sya'roni, Muhammad Syaifullah, Hamli Syarifuddin, Ummah Karimah Taufik, Azhar Tianna Simanjuntak Tukiyo Tukiyo Ummah Karimah, Ummah Wati, Suci Rahma Yudo Handoko