Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : Jurnal Transformatika

Analisis Perbandingan Kecepatan Deploy Container Orchestration Menggunakan Docker Swarm dan Kubernetes Umam, Chaerul; Ervikhan, Muhammad Ibnu
Jurnal Transformatika Vol 21, No 1 (2023): July 2023
Publisher : Jurusan Teknologi Informasi Universitas Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26623/transformatika.v21i2.6792

Abstract

A good infrastructure is to be able to provide services with high capability for its clients. The infrastructure of a server is said to be good if it can handle many requests from clients and does not experience downtime. The speed of deploying on container orchestration-based infrastructure greatly affects the downtime of a system. The author uses the Docker Swarm and Kubernetes to compare the deployment speed to find good performance and is suitable. The result shows that Kubernetes has a faster deploy speed than Docker Swarm. Docker Swarm gets an average speed for deploying 3 to 30 replications in 10 consecutive tests for 1 minute 9 seconds. Meanwhile, Kubernetes gets an average deploy speed of 1 minute 2 seconds.
Purwarupa Sistem Pemilihan Umum Elektronik dengan Pemanfaatan Protokol Ethereum pada Teknologi Blockchain Arianto, Eko; Umam, Chaerul; Handoko, L Budi
Jurnal Transformatika Vol. 19 No. 1 (2021): July 2021
Publisher : Jurusan Teknologi Informasi Universitas Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26623/transformatika.v19i1.2746

Abstract

The development of information technology has penetrated various areas. This is driven by improved service, rapid increase in information needs and decision making. General elections that are held every time always leave problems about securities and speed of recapitulation. This is because the process is done in the traditional way. This research tries to apply blockchain technology to the e-Voting system security engineering process so that it creates a votes recapitulation process that is fast, accurate and accompanied by transparency values to maintain the reliability of the existing vote and maintain the confidentiality of the vote data being transacted. Transparency and confidentiality of voter data is a fundamental value in general elections or voting that must exist. Seeing this, blockchain technology deserves to be applied because the principles that needed can be met by applying this technology to the e-Voting system.
Analisa Forensik Kontainer Podman Terhadap Backdoor Metasploit Menggunakan Checkpointctl Sya'bani, Hafiidh Akbar; Umam, Chaerul; Handoko, L Budi
Jurnal Transformatika Vol. 21 No. 2 (2024): Januari 2024
Publisher : Jurusan Teknologi Informasi Universitas Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26623/transformatika.v21i2.8109

Abstract

Container systems are type of virtualization technology with isolated environment. The isolated environment in container system does not make cyber attacks impossible to occur. In this research, containers in which a cyber incident occurred were forensically tested on the container's memory to obtain digital evidence. The forensic process is carried out using standards from NIST framework with the stages of collection, examination, analysis and reporting. The forensic process begins by performing a checkpoint on the container to obtain information from the container's memory. In Podman the checkpoint process is carried out on one of the containers and will produce a file in .tar.gz form, where this file contains the information contained in the container. After the checkpoint process is complete, forensics is then carried out by reading the checkpoint file using a tool called checkpointctl. Forensic results showed that the container was running a malicious program in the form of a backdoor with a PHP extension.
Distributed MD5 Brute Force Using Message Passing Interface (MPI) on ARM Architecture Saputra, Maulana Bagus; Umam, Chaerul
Jurnal Transformatika Vol. 20 No. 2 (2023): January 2023
Publisher : Jurusan Teknologi Informasi Universitas Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26623/transformatika.v20i2.5630

Abstract

Over the years, there has been a computing paradigm shift towards smart devices. However, the security aspect of this type of device is questionable. In this research, the writer provides a design, implementation, and testing of a distributed MD5 brute-force attack method. Testing is performed using two systems. The first system is an ARM Cluster consisting of four single-board computers. The second system is a conventional server with two Xeon processors. From this research, the writer wants to answer the question of whether distributed brute-force attacks using IoT nodes can be realized in the real world by doing a comparison between increases of ARM Cluster performance with node addition to conventional server performance. From the test result, Xeon model performance is equivalent to 8 ARM Clusters and around 30 ARM nodes are required to match Xeon model performance.