p-Index From 2021 - 2026
6.684
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering TEKNIK INFORMATIKA Media Informatika Seminar Nasional Aplikasi Teknologi Informasi (SNATI) Jurnal Teknik Jurnal Teknologi dan Manajemen Informatika Jurnal Buana Informatika Jurnal Teknologi Informasi dan Ilmu Komputer Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika AJIE (Asian Journal of Innovation and Entrepreneurship) Register: Jurnal Ilmiah Teknologi Sistem Informasi JOIN (Jurnal Online Informatika) Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) SemanTIK : Teknik Informasi JURNAL MEDIA INFORMATIKA BUDIDARMA Network Engineering Research Operation [NERO] Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control IT JOURNAL RESEARCH AND DEVELOPMENT Seminar Nasional Teknologi Informasi Komunikasi dan Industri JRST (Jurnal Riset Sains dan Teknologi) JURNAL ILMIAH INFORMATIKA JURNAL TEKNIK INFORMATIKA DAN SISTEM INFORMASI JURNAL INSTEK (Informatika Sains dan Teknologi) ILKOM Jurnal Ilmiah Jiko (Jurnal Informatika dan komputer) MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer J-SAKTI (Jurnal Sains Komputer dan Informatika) JUMANJI (Jurnal Masyarakat Informatika Unjani) Indonesian Journal of Applied Informatics Jurnal Ilmiah Sinus EDUMATIC: Jurnal Pendidikan Informatika JISKa (Jurnal Informatika Sunan Kalijaga) Technologia: Jurnal Ilmiah Infotekmesin Dinasti International Journal of Education Management and Social Science Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) JUSTINDO (Jurnal Sistem dan Teknologi Informasi Indonesia) Cyber Security dan Forensik Digital (CSFD) JATI (Jurnal Mahasiswa Teknik Informatika) JIIP (Jurnal Ilmiah Ilmu Pendidikan) JITU : Journal Informatic Technology And Communication Automata Journal of Education Informatic Technology and Science Just TI (Jurnal Sains Terapan Teknologi Informasi) JURNAL PENDIDIKAN, SAINS DAN TEKNOLOGI Jurnal Teknik Informatika (JUTIF) Phasti: Jurnal Teknik Informatika Politeknik Hasnur J-SAKTI (Jurnal Sains Komputer dan Informatika) Jurnal Abdi Masyarakat Indonesia Indonesian Journal of Networking and Security - IJNS SPEED - Sentra Penelitian Engineering dan Edukasi Reformasi Hukum Jurnal Indonesia Sosial Teknologi Prosiding SEMNAS INOTEK (Seminar Nasional Inovasi Teknologi) Jurnal Sains, Nalar, dan Aplikasi Teknologi Informasi
Claim Missing Document
Check
Articles

Validasi Policy Statement pada Lemari Penyimpanan Bukti Digital (LPBD) Achmad Syauqi; Imam Riadi; Yudi Prayudi
Jurnal Pendidikan Teknologi Informatika dan Sains Vol 1 No 2 (2019): Journal of Education Informatic Technology and Science (JeITS)
Publisher : Faculty of Teacher Training and Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (249.064 KB)

Abstract

Bukti digital sangat rentan terhadap kerusakan. Oleh sebab itu dalam membuat lemari penyimpanan bukti digital (LPBD) diperlukan adanya access control. Access control sendiri memiliki beberapa model, salah satunya yaitu ABAC. ABAC merupakan salah satu model dari access control yang baru. Karena model ABAC ini mempunyai fungsi yang fleksibel, memungkinkan bersinggungan dengan banyak sekali atribut, hal ini akan menjadi sangat kompleks dan dapat menimbulkan munculnya incosistency dan incompleteness. Maka dari itu implementasi dari ABAC ini harus didukung oleh kebijakan policy yang tepat dan tervalidasi dengan baik agar keamanan dalam LPBD lebih terjamin. Salah satu model pengujian access control yaitu model checking. Model checking ini bersifat memeriksa elemen-elemen di dalam sistem sehingga jika terdapat error maka akan diketahui. Sedangkan tools untuk validasi policy statement terdapat beraneka ragam salah satunya ACPT (Acess Control Policy Testing). Di dalam ACPT terdapat berbagai metode untuk membuat dan menguji policy statement. Pengujian ini dilakukan menggunakan kombinasi algoritma permit overrides dan dilakukan sebanyak 30 kali pengujian. Penelitian ini telah berhasil menguji dan membuktikan bahwa policy statement tersebut tidak menemukan incosistency dan incompleteness. Dalam 30 kali pengujian, policy statement tersebut berjalan sesuai dengan rule yang ada.
RING UNTUK PROSES CYBER PROFILING : STUDI KASUS PADA DUNIA PENDIDIKAN TINGGI DI INDONESIA Muhammad Zulfadhillah; Yudi Prayudi; Imam Riadi
Phasti: Jurnal Teknik Informatika Politeknik Hasnur Vol 2 No 02 (2016): PHASTI: Oktober 2016
Publisher : Program Studi Teknik Informatika, Politeknik Hasnur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46365/pha.v2i02.185

Abstract

Aktifitas pengguna internet semakin meningkat dari tahun ke tahun.Hal ini telah berdampak pada perilaku pengguna itu sendiri.Penilaian terhadap perilaku pengguna seringkali hanya didasarkan pada interaksi di internet tanpa mengetahui apa saja aktifitas lainnnya. Penggunaan log aktifitas dapat dijadikan sebagai cara lain untuk mengetahui perilaku pengguna. Log aktifitas internet adalah salah satu tipe big data sehingga penggunaan data mining dengan teknik K-Means dapat dijadikan sebagai solusi untuk melakukan analisis terhadap perilaku pengguna. Pada penelitian ini telah dilakukan proses klasterisasi menggunakan algoritma K-Means yang terbagi menjadi tiga klaster yaitu tinggi, sedang, dan rendah. Hasil yang didapat dari institusi pendidikan menunjukkan bahwa setiap klaster menghasilkan website yang sering dikunjungi dengan urutan : wesite pencarian, social media, berita, dan informasi. Penelitian ini juga menunjukkan bahwa Cyber profiling yang telah dilakukan sangat dipengaruhi oleh faktor lingkungan dan aktifitas sehari-hari. Kata Kunci : Clustering, K-Means, Log, Network, Profiling
PENERAPAN METODE COMPOSITE LOGIC UNTUK PERANCANGAN FRAMEWORK PENGUMPULAN BUKTI DIGITAL PADA MEDIA SOSIAL Muhammad Naim Al Jumah; Bambang Sugiantoro; Yudi Prayudi
ILKOM Jurnal Ilmiah Vol 11, No 2 (2019)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v11i2.442.135-142

Abstract

Social media has become a major part of society. But most of the time social media is used as a way people commit the crime. Due to numerous crimes that use social media, it is essential to design a framework to gather digital evidence on social media. This study develops the design of Framework by implementing Composite Logic Model.  A logic Composite model can be used to determine the role model of any variable or pattern that need to collaborate. Composite Logic Model will produce a role model that has a role to produce patterns so that it can produce the same goal. A method of Composite Logic will collaborate with the Digital Forensics Investigation framework to produce a Digital Evidence Collection Framework on Social Media. Based on data and facts, this study has been producing a new framework of gathering digital evidence on social media. The framework has four main stages in the process of collecting digital evidence on social media including pre-process, collection, analysis, and report.
DATA VISUALISASI SEBAGAI PENDUKUNG INVESTIGASI MEDIA SOSIAL Suwito Pomalingo; Bambang Sugiantoro; Yudi Prayudi
ILKOM Jurnal Ilmiah Vol 11, No 2 (2019)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v11i2.443.143-151

Abstract

Social media is an application that can make everyone interact with each other and can consume information by sharing content quickly, efficiently and real time. Various kinds of information about someone's activities that we can find on social media, making social media can help to conduct investigations. Some research, using visualization with several graph methods to facilitate the process of analyzing data on social media that is so abundant. But the data used only comes from one social media, while there is still a lot of information on other social media that can be used as data sources for analysis purposes. In this study visualization using the directed graph method will be carried out, then calculate the value of network property and the value of centrality to find out which nodes have many activities which will be carried out in depth searches to find patterns of interaction or activity. Based on the results of the calculated centrality, it is found that on Twitter and Instagram accounts there are many interactions, this can be seen in the value of the indegree and outdegree node. Based on the results of the analysis in this study, information that is important for investigating social media is obtained, such as information about user profiles, posts, comments, preferred social media pages, location, and timestamp, all of which are connected by a line that shows the relationship between the node.
Forensic storage framework development using composite logic method Helmi Rachman; Bambang Sugiantoro; Yudi Prayudi
ILKOM Jurnal Ilmiah Vol 13, No 1 (2021)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v13i1.811.58-66

Abstract

Increasing number of information technology users allows possibility for crimes to take advantage of information technology to continue increasing either directly and indirectly. Criminals often use computer devices to commit crimes. This is a major concern so that the need for handling digital evidences becomes significantly urgent. Therefore, a forensic storage framework is required for managing digital evidences. This framework is designed by applying the composite logic method to determine role model of each variable or the initial pattern of the stages to be collaborated. Composite logic produces a role model that is to generate patterns in order to achieve the same goal. This method collaborates framework for handling the pre-existing hdd, ssd, and vmware to be in turn combined into a forensic storage framework. Based on the results of the test, this study proposes a new framework called forensic storage framework which comprises of four main stages, namely preparation, collection, analysis and report. The advantage of this framework is that it can be used to handle digital evidences in four storages which are SSD, HDD, VmWare, and cloud.
PENGGUNAAN METODE STATIS DAN LIVE FORENSIK PADA UAV UNTUK MENDAPATKAN BUKTI DIGITAL Ibnu Fajar Arrochman; Dhomas Hatta Fudholi; Yudi Prayudi
ILKOM Jurnal Ilmiah Vol 11, No 2 (2019)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v11i2.444.152-158

Abstract

In recent years, the use of drones by civilians is increasing rapidly by the presentation of total sales continued to increase rapidly every year. With the increasing possibility of Unmanned Aerial Vehicle (UAV) abuse, crime in the use of UAVs to be larger. Through forensic analysis of data using static forensic and live forensic to obtain data that allows it to be used as digital evidence. To dig up information that could be used as digital evidence in the UAV and controllers, as well as to know the characteristics of digital evidence on a UAV. The results showed that digital evidence on a UAV, the smartphone is used as a controller UAV has a very important role in the investigation. The findings in aircraft has a percentage of 50% and a camera memory card with 16.6%. DJI Phantom 3 Advanced GPS coordinates always store data in flight LOG; the data is always stored even when the flight mode is used does not use GPS signals to stability. Due to DJI Phantom 3 Advanced always use GPS on flights, file, image or video captured by the camera has the best GPS location coordinates to the metadata therein.
Manajemen Pengelolaan Bukti Digital Untuk Meningkatkan Aksesibilitas Pada Masa Pandemi Covid-19 Moch Bagoes Pakarti; Dhomas Hatta Fudholi; Yudi Prayudi
Jurnal Ilmiah SINUS Vol 19, No 1 (2021): Vol. 19 No. 1, Januari 2021
Publisher : STMIK Sinar Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30646/sinus.v19i1.502

Abstract

Covid-19 has a major impact on human life, including the process of managing digital evidence. Management of digital evidence requires special handling that can store and maintain the integrity of digital evidence. The current problem is there is no concept of storing digital evidence that can be accessed online in wider accessibility. Online digital evidence management is proposed as a solution to solve this problem. This concept is in the form of an online digital evidence management system that can be accessed anywhere and anytime using MD5 and SHA1 hash functions in order to maintain the properties of digital evidence so that it can be legally accepted. The problems with digital evidence management require a Management System for Digital Evidence that is suitable for application in Digital Forensics Laboratory. This research had successfully implemented the concept of online chain of custody. It is expected, with the concept of Online Digital Evidence Management, this digital evidence control and all activities related to it can be maintained and well documented. Moreover, it can reach a wider area accessed anywhere and any time and reduce the spread of Covid-19.
KARAKTERISTIK METADATA PADA SHARING FILE DI MEDIA SOSIAL UNTUK MENDUKUNG ANALISIS BUKTI DIGITAL Dimas Pamilih Epin Andrian; Dhomas Hatta Fudholi; Yudi Prayudi
Jurnal Ilmiah SINUS Vol 19, No 1 (2021): Vol. 19 No. 1, Januari 2021
Publisher : STMIK Sinar Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30646/sinus.v19i1.494

Abstract

Metadata is information in a file which its contents are an explanation of the file. Metadata contains information about the contents of data for file management purposes. In various cases involving digital evidence, investigators can uncover a case through the metadata file. Problems that arise when file metadata has changed or deleted information, for example, the moment that a file is shared via social media. Basically, all of the shared files through social media will experience changes in metadata information. This study conducted detailed analysis of changes in metadata information and hex dump values to determine the changing characteristics of metadata files shared in social media. This research method applied a comparison table to see the details of changes in metadata values from all files and social media as research objects. The results of this study are expected to have contribution for forensic analysts to identify the shared metadata characteristics of files in social media. As a result, later, the source of shared files in social media will be known. Moreover, it is expected from these findings that forensic analysts can explore the social media used by the cybercrime perpetrators.
Membangun Framework Konseptual Terintegrasi Menggunakan Metode Composite Logic untuk Cloud Forensic Readiness pada Organisasi Merisa Kurniasari Fadilla; Bambang Sugiantoro; Yudi Prayudi
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 6, No 1 (2022): Januari 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v6i1.3427

Abstract

In the Forensic Readiness approach, incident readiness is the goal of the company or organization in dealing with incidents that may occur. Forensic Readiness can consist of actions or steps, technical and non-technical, that supposedly maximize an organization's ability to use digital evidence. A well-built Cloud Forensic Readiness Framework can help speed up and simplify decision-making regarding an incident occurring in a cloud computing environment. This creates new opportunities for collaboration in the field of digital forensics and cloud computing or cloud computing, so that solutions can be studied and researched by analyzing various literature sources of cloud computing forensic readiness framework and building an integrated cloud forensic readiness framework on an institutional scale using the composite logic method. With the completeness of the readiness framework designed, it is a kind of research that is expected to ease decision making process for organizational stakeholders to handle incident responses.
ANALISIS HALAMAN DARKWEB UNTUK MENDUKUNG INVESTIGASI KEJAHATAN Muhammad Naufal Bahreisy; Ridho Rahmadi; Yudi Prayudi
JIKO (Jurnal Informatika dan Komputer) Vol 4, No 1 (2021)
Publisher : Journal Of Informatics and Computer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33387/jiko.v4i1.1817

Abstract

Dark Web merupakan konten online yang terenkripsi dan hanya dapat di akses menggunakan jaringan khusus seperti TOR (The Onion Router). Saat ini perkembangan konten online menjadi perhatian serius karena pertumbuhan bagi kegiatan dan layanan terlarang seperti penjualan barang illegal, narkoba dan pornografi anak. Kejahatan komputer dalam dunia internet mendorong banyaknya pertumbuhan transaksi jual beli barang-barang illegal yang dijual dipasar gelap, transaksi yang menguntukan namun illegal menarik perhatian. Dark Web merupakan istilah web yang dikategorikan sebagai Deep Web yang berdomain .onion yang tidak dapat ditemukan di mesin pencarian seperti google, yahoo dan bing. Analisis halaman-halaman Dark Web dalam mendukung investigasi kejahatan diusulkan sebagai solusi untuk memecahkan masalah tersebut. Konsep ini berupa analisis halaman-halaman Dark Web yang diharapkan mendukung dalam investigasi kejahatan.
Co-Authors - Bambang Sugiantoro, Bambang Sugiantoro - MTI UII Yogyakarta, Zaenudin - UIN Sunan Kalijaga Yogyakarta, Bambang Sugiantoro Abdul Muis Abdul Rohman Supriyono Abdul Rohman Supriyono Achmad Syauqi Adhitya Wishnu Wardhana Adi Fajaryanto Adristi, Fikri Irfan Agung Firmansyah, Rico Agus Wijayanto Agus Wijayanto, Agus Ahmad Luthfi Ahmad Luthfi Ahmad Luthfi Ahmad Luthfie Ahmad Muhariya Ahmad Ridha Kelrey Ahmad Rois Syujak Ahmad Subki - STMIK Mataram Ahmad, Muhammad Sabri Akhmad Muzakka Al Jum'ah, Muhammad Na'im Aloysius Wisnubroto Andrian Sah Ardy Wicaksono Arif Surya Putra Arrochman, Ibnu Fajar Astria Adhi Wijaya azis catur laksono Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro - Bambang Sugiantoro CITRA ARFANUDIN Danar Cahyo Prakoso Dedy Frianto Dhomas Hatta Fudholi Dimas Pamilih Epin Andrian Dinda Shafira Gita Islami Dirgahayu, Raden Teduh Dirman Dirman Dita Rahayu Berliana Dodi Prakoso Wibowo Dwi Kurnia Wibowo Efendi, Muhamad Masjun Erika Ramadhani Erika Ramadhani Ermadi Satriya Wijaya Fajaryanto, Adi Fauzan Natsir Fetyata Yudha Fietyata Yudha Firdaus, Jasmine Erina Fitriyanti S Fudholi, Dhomas Hatta Giffary, Farhan Wildan Helmi Rachman Ibnu Fajar Arrochman Idham Halik Ilman Pradhana Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Isriade Putra Ivany Hikmatunnisa' Iwan Aprizal Jidan Dj. Tamu, Zulhair Kharisma Mahesa Koes Wiyatmoko Kun Saidi Kusuma, Permadi Lilik Widyawati Madi, Permadi Kusuma Mahmud, Rifqi Mardlatillah, Hanifah Merisa Kurniasari Fadilla Moch Bagoes Pakarti Moh Fadly Panende Muh. Ditra Pamungkas Muhamad Maulana Muhammad Khairul Faridi Muhammad Naufal Bahreisy Muhammad Nur Adhar Muhammad Zulfadhilah Muzammilatul Wachidah Nafila, Feryan Lutfie NANNY, NANNY Nora Lizarti Nukman Nukman Nurhayati Jiatmiko Nurmi Hidayasari Nuryasin, Ilyas Pahrul Irfan Pomalingo, Suwito Prakoso, Danar Cahyo Putry Wahyu Setyaningsih R, Zulihsan Rachman, Helmi Raharjo, Toto Rahmat Inggi Ramadhan, Arya Danuarta Ramadhani, Erika Ramansyah Ramansyah Ridho Rahmadi Rio Pradana Aji Ririn Anggraini Rosi Rahmadi Syahputra Rosidin Al Caruban Ruuhwan Ruuhwan Setiawan, Mukhammad Andri Sisdarmanto Adinandra, Sisdarmanto Siti Kartika Munawarah Subki, Ahmad Sudinugraha, Tri Supriyono, Abdul Rohman Syarif Hidayat Teduh Dirgahayu Tino Feri Efendi Triawan Adi Cahyanto Verry Noval Kristanto Virjayanti Lazinu Wachidah, Muzammilatul Wafi, Muhammad Syafiq Wisnu Pranoto Wisnu Pranoto Wisnu Sanjaya Yasir Muin