Claim Missing Document
Check
Articles

Found 22 Documents
Search

Hybird Autokey Cipher Algorithm Implementation Reverse Key and Standard Data Encryption for App-Based Text Messages Lazuardi, Risandio Ilham; Anwar, Nuril
Mobile and Forensics Vol. 5 No. 2 (2023)
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/mf.v5i2.8451

Abstract

The development of the internet facilitates public communication in sharing information. Along with the advancement of technology in the communication segment, there were various threats to it. Many applications had sophisticated security systems, but the actions in exploiting these security systems were also increasingly diverse. This study implemented a combination of classic and modern algorithms, namely autokey cipher reverse key and DES to protect data from these crimes. This research develops encryption and decryption applications using the agile method, the technique used because of the time spent on the built progress of applications with a cycle for the development process. With this cycle utilized, the method was suitable for developing applications in the short term and revising or improving applications in each cycle. The research resulted in security applications having the function of helping people secure data so that they could prevent and complicate digital criminal acts.
Impact Analysis of Web Application Firewall on Website-Based Application Security (Case Study PPDB Kak Seto School Website) Pratama, Krisna Dewa; Anwar, Nuril
Mobile and Forensics Vol. 5 No. 1 (2023)
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/mf.v5i1.8914

Abstract

The swift advancement of web-based applications has posed security challenges. Insufficient security awareness among web developers has resulted in a surge of cybercrime incidents due to website vulnerabilities. To counter this, implementing a Web Application Firewall (WAF) is proposed for the vulnerable PPDB Sekolah Kak Seto website, aiming to mitigate threats in the public network. The WAF acts as a defense against potential cyber breaches. Employing an experimental approach, this research encompasses identification, observation, literature review, analysis of WAF system requirements, implementation, testing, and pre/post-implementation analysis using ModSecurity as the security system. The study analyzes the impact of WAF adoption and provides recommendations for enhancing security. Findings demonstrate WAF's effectiveness in fortifying the Kak Seto School web application by efficiently identifying and blocking potential attacks, thereby reducing breach success rates. Post-WAF implementation, Pingdom tests show a slight drop in Performance Grade (70 to 69) and a minor increase in Load Time (2.76 to 3.23 seconds). GTmetrix tests reveal a Grade downgrade from B to C and an increase in Largest Contentful Paint time (2.2 to 2.7 seconds). In conclusion, despite minor performance effects, WAF significantly enhances security, as evident in improved loading times during tests.
Network Security Monitoring System via Android Mobile App With IDS Prasetyo, Hamas; Anwar, Nuril
Mobile and Forensics Vol. 6 No. 1 (2024)
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/mf.v6i1.10317

Abstract

Network security is an important factor in securing data on a server, so a server needs to be kept safe from things that could threaten the validity and integrity of stored data. One way that can be used to detect threats on a server is implementing an Intrusion detection system on the server. A literature study conducted on research that implemented intrusion detection systems, found that there was a lack of intrusion detection system research that could detect one type of network security attack with a variety of attack variables and it was also found in research that had successfully implemented an intrusion detection system to detect network security attacks but still incorrectly identifying the type of attack. This research uses the Snort intrusion detection system method with an experimental model of an attack detection system and an Android application which is applied to monitor the statistics of attacks detected on the Xyz University network. The research results showed that the rules created on the IDS can detect network security attacks, especially DoS/DDoS and PortScan attacks. Then an IDS was created that can send application alert notifications and SMS with a response time that is quite responsive based on the NIST Cybersecurity reference with an average of 22 seconds for DoS/DDoS attacks and 21 seconds for Port Scanning attacks. For the percentage results from 3 times testing the rule by sending DoS/DDoS attack packets of 309,462 to 1,459,548, getting a high level of accuracy with an average of 92.1% on first test, 91.7% on the second test and 91.5% on the third test. In the results of testing the PortScan rule by sending 1,001 to 10,564 attack packets, a high level of accuracy was obtained with an average result of 92.2% in the first test, 94.2% in the second test and 93.4% in the third test.
Analisis Forensik Citra untuk Meningkatkan Kualitas Gambar Hasil Capture CCTV menggunakan Metode Bilinear Interpolasi dan Adaptif Median Filter Zain, Luthfi Amalia; Anwar, Nuril
Jurnal Sarjana Teknik Informatika Vol. 10 No. 2 (2022): Juni
Publisher : Program Studi Informatika, Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/jstie.v10i2.22471

Abstract

Banyak ditemukan kejahatan konvensional yang ditemukan di masyarakat yang terekam kamera CCTV. CCTV merupakan salah satu perangkat digital yang paling umum dalam menyediakan digital evidence untuk keperluan analisis forensik. Digital evidence pada dasarnya sangat rentan untuk dimodifikasi. Hasil tangkapan rekaman kamera CCTV banyak dijadikan sebagai alat bukti digital, namun hasil tangkapan layar yang diperbesar berpotensi mengakibatkan gambar menjadi kabur. Penelitian ini bertujuan melakukan proses analisis bukti digital dan perbaikan kualitas rekaman video CCTV. Analisis dilakukan dengan metode National Institute of Justice yang merekomendasikan tahapan dasar forensik yaitu persiapan, koleksi, pemeriksaan, analisis, dan pelaporan. Proses resizing dilakukan dengan metode Bilinear Interpolasi dan proses filtering dilakukan dengan menerapkan metode Adaptif Median Filter. Hasil analisis menunjukkan nilai hash MD5 dan SHA1 pada PHYSICALDRIVE2 dan BB001.001 adalah cocok. Kapasitas dan durasi rekaman video CCTV pada metadata memiliki hasil yang sesuai dengan aslinya. Nilai MSE hasil metode Bilinear Interpolasi sebesar 461,3762 dan nilai MSE hasil metode Adaptif Median Filter sebesar 447,2479. Nilai Hash yang sama menunjukkan integritas digital evidence dan penurunan nilai MSE sebesar 14,1283 yang menunjukkan terjadi peningkatan kualitas dari gambar.
Forensik Jaringan Terhadap Serangan DDOS Menggunakan Metode Network Forensic Development Life Cycle Murti, Raden Hario Wahyu; Riadi, Imam; Anwar, Nuril; Ismail, Taufiq
Jurnal Sarjana Teknik Informatika Vol. 11 No. 3 (2023): Oktober
Publisher : Program Studi Informatika, Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/jstie.v11i3.26544

Abstract

Teknologi informasi dan komunikasi merupakan elemen penting dalam kehidupan masa kini yang telah menjadi bagian bagi berbagai sektor kehidupan dan memberi andil besar terhadap perubahan yang mendasar. Sekelompok orang atau organisasi yang tidak bertanggung jawab dapat menggunakan internet untuk mengganggu atau merusak suatu website sehingga menyebabkan overload pada router dan membuat website tidak dapat diakses. Metode penyerangan ini disebut dengan DDoS (Distributed Denial of Service). Tujuan penelitian ini adalah mengidentifikasi keamanan jaringan pada router dan mendapatkan karakteristik barang bukti digital pada router untuk keperluan forensik. Penelitian ini menggunakan metode Network Forensic Development Life Cycle (NFDLC) yang memiliki pada lima tahapan utama yaitu Initiation, Acquisition, Implemetation, Operations, dan Disposation. Tools yang digunakan pada penelitian adalah menggunakan Wireshark yang bertugas monitoring serangan DDoS terhadap serangan router dan melakukan investigasi untuk mendapatkan barang bukti digital berupa hasil serangan yang masuk ke servertrak. Hasil temuan barang bukti digital yang didapat pada monitoring ubuntu server tercatat menerima 84.407 paket pada serangan pertama dengan IP Address 10.10.1.2 dan menerima 359.510 paket pada serangan kedua dengan Ip Address 10.10.1.4 dan hasil monitoring windows server tercatat menerima 2.305.835 paket pada serangan pertama dengan IP Address 10.10.1.2 dan menerima 94.120 paket pada serangan kedua dengan Ip Address 10.10.1.4. 
A Security Development Life Cycle (SDLC)-Based Approach for Designing Intrusion Detection and Prevention Systems to Counter SQL Injection Attacks at MAN 2 Magetan Hafizh, Muhammad Naufal; Anwar, Nuril; Azhari, Ahmad
Mobile and Forensics Vol. 7 No. 1 (2025)
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/mf.v7i1.9365

Abstract

Information security is a critical aspect of ensuring the validity, integrity, and availability of data while protecting users’ access to services. Inadequate security measures can expose systems to various threats, potentially compromising their functionality. One such threat is SQL Injection, a common attack vector targeting web applications. MAN 2 Magetan, an Islamic high school located in Purwosari, Magetan Regency, East Java, Indonesia, operates an online admission system on its website. However, this website contains input fields that are not properly validated, creating a vulnerability to SQL Injection attacks. This study aims to design and implement an Intrusion Detection and Prevention System (IDPS) to mitigate SQL Injection attacks using the Security Development Life Cycle (SDLC) methodology. The SDLC process for the system development consists of five stages: Analysis, Design, Implementation, Enforcement, and Enhancement. A hybrid system combining Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) was utilized to create an effective solution. The results of the research demonstrate that the developed IDPS successfully detects and prevents SQL Injection attacks, ensuring the security and integrity of the online admission system. The integration of IDS and IPS within the SDLC framework has proven to be an effective approach to enhancing web application security at MAN 2 Magetan.
EFISIENSI USAHA PEMBIBITAN ITIK MODERN DAN TRADISIONAL PADA SKALA RUMAH TANGGA DI KABUPATEN LEBONG Anwar, Nuril; Utama, Satria Putra; Reswita, Reswita
Jurnal AGRISEP JURNAL AGRISEP VOL 14 NO 01 2015 (MARCH)
Publisher : Badan Penerbitan Fakultas Pertanian, Universitas Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (321.477 KB) | DOI: 10.31186/jagrisep.14.1.26-38

Abstract

The objectives of this research are to determine the income level and to estimate the differencies of income between modern and traditional techniques of breeding by the household in Amen and Lebong Sakti subdistrict, Lebong District. The determination of the amount of revenue is done using analysis of revenues, while for testing whether there are differences in the income of both the duck breeding efforts carried out by different assay analysis of average income. The calculation to determine the level of efficiency of the business activities of breeding ducks using R/C ratio. Based on the results of the research the average revenues of modern ducks nursery is Rp. 1.331.969,21 for four months, while the average income of the traditional duck breeding attempt amounted to Rp. 1.662.396,66 for four months. After a test of the difference of income between enterprises of modern and traditional duck breeding, breeding of modern ducks revenues smaller revenues equal to the traditional duck breeding where the real differences in the degrees of confidence 95. The average value of the results analysis of R/C ratio in modern duck breeding efforts Lebong is equal to 2.00 while R/C ratio of the traditional duck breeding amounted to 2.15.
Analisa Forensik Citra Menggunakan Metode Error Level Analysis dan Block Matching Sudianto, Iis; Anwar, Nuril
Jurnal Sarjana Teknik Informatika Vol. 11 No. 1 (2023): Februari
Publisher : Program Studi Informatika, Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/jstie.v11i1.25714

Abstract

Perkembangan perangkat editing gambar saat ini membuat semua orang dapat memanipulasi gambar dengan mudah sehingga banyak gambar yang tersebar diragukan keasliannya. Saat ini, gambar dapat dijadikan barang bukti dalam kasus hukum di  persidangan. Keaslian gambar menjadi topik yang banyak dicoba untuk dipecahkan dalam berbagai  penelitian. Penelitian ini membahasa tentang analisa keaslian gambar menggunakan metode Error Level Analysis (ELA) untuk mengetahui keaslian gambar. Block Matching digunakan pada proses membagi gambar menjadi beberapa bagian persegi atau blok. Metode ELA berhasil diimplementasikan dengan kompresi pada gambar sebesar 95% menghasilkan nilai MSE dan PSNR dalam membedakan gambar yang telah diubah. MSE rata-rata adalah 23,8 dB dan PSNR rata-rata adalah 34,47 dB. Hasil Block Matching secara keseluruhan menujukkan nilai pixel untuk nilai x yang mencapai 30 terdapat 9 gambar, nilai x yang mencapai 24 terdapat 9 gambar, nilai x yang mencapai 23 terdapat 1 gambar, dan untuk nilai x yang mencapai 19 terdapat 1 gambar. Hasil pixel (y) seluruh gambar melebihi nilai 12 yang dimana pada nilai pixel (y) mengalami banyak perubahan dengan ditandai adanya bintik putih.
Analisis dan Implementasi Usulan Perbaikan Website BIMAWA Universitas Ahmad Dahlan Dengan Metode Usability Testing dan Heuristic Evaluation Azmi, Muhammad Ilham; Mardhia, Murein Miksa; Anwar, Nuril; Aretama, Lucky Barga
Jurnal Sarjana Teknik Informatika Vol. 11 No. 1 (2023): Februari
Publisher : Program Studi Informatika, Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/jstie.v11i1.25815

Abstract

Website adalah salah satu media yang memfasilitasi dalam mencari informasi ataupun wadah memberi informasi. Dalam menyajikan informasi melalui website sangat beragam sesuai dengan informasi yang disampaikan agar informasi yang disampaikan dapat tercapai, namun ada juga beberapa website yang penyampaian isi informasi tidak memenuhi tujuan yang seharusnya disampaikan sehingga berdampak pada keluhan pengguna yang rutin mencari informasi. Penelitian ini fokus pada mengidentifikasi keluhan penggunaan mahasiswa dalam pengaksesan informasi yang dibagikan di website milik Biro Kemahasiswaan dan Alumni Universitas Ahmad Dahlan(BIMAWA UAD), serta mengevaluasi perbaikan yang diwujudkan dalam desain antarmuka usulan. Metode yang digunakan dalam pengumpulan data antara lain wawancara, studi literatur, observasi, dan kuesioner. Metode yang digunakan dalam pengujian yakni dengan Usability Testing dan Heuristic Evaluation. Metode Usability Testing digunakan untuk mengidentifikasi sejauh mana sebuah produk dapat digunakan oleh pengguna untuk mencapai tujuan secara efektif, efisien dan memuaskan sesuai konteks penggunaannya. Pada pengujian dengan Heuristic Evaluation, evaluasi dilakukan oleh 3 orang pakar dibidang UI/UX untuk menguji kelayakan website Bimawa UAD. Hasil dari teknik usability rata-rata adalah 67,5 untuk website existing dan nilai usability rata-rata 75,3 pada website perbaikan.
Multimedia Forensic Analysis of TikTok Application Using National Institute of Justice (NIJ) Method Fauzi, Rachmad Nur; Anwar, Nuril
Jurnal Ilmiah Teknik Elektro Komputer dan Informatika Vol. 9 No. 4 (2023): December
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/jiteki.v9i4.26924

Abstract

The advancement of technology, especially in mobile devices like smartphones, has had a significant impact on human life, particularly during the COVID-19 pandemic, leading to the growth of online activities, especially on social media platforms like TikTok. TikTok is a highly popular social media platform, primarily known for its focus on short videos and images often accompanied by music. However, this has also opened up opportunities for misuse, including the spread of false information and defamation. To address this issue, this research utilizes mobile forensic analysis with Error Level Analysis (ELA) to collect digital evidence related to crimes on TikTok. This research contributes by applying digital forensic techniques, specifically Error Level Analysis (ELA), to detect image manipulation on TikTok. By using forensic methods, this research helps uncover digital crimes occurring on TikTok and provides essential insights to combat misuse and criminal activities on this social media platform. The research aims to collect digital evidence from TikTok on mobile devices using MOBILedit Forensic Express Pro and authenticate it with ELA through tools like FotoForensics and Forensically, as well as manual examination. This research follows the National Institute of Justice (NIJ) methodology with ten stages of mobile forensic investigation, including scenario creation, identification, collection, investigation, and analysis. The research yields manipulated digital evidence from TikTok, primarily concerning upload times. Error Level Analysis (ELA) is used to assess the authenticity of images, revealing signs of manipulation in digital evidence. The research's contribution is to produce or collect manipulated digital evidence from TikTok, primarily concerning upload times, and to apply the Error Level Analysis (ELA) approach or technique to assess the authenticity of images, uncovering signs of manipulation in digital evidence.