This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering TEKNIK INFORMATIKA Media Informatika Seminar Nasional Aplikasi Teknologi Informasi (SNATI) Jurnal Teknik Jurnal Teknologi dan Manajemen Informatika Jurnal Buana Informatika Jurnal Teknologi Informasi dan Ilmu Komputer Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika AJIE (Asian Journal of Innovation and Entrepreneurship) Register: Jurnal Ilmiah Teknologi Sistem Informasi JOIN (Jurnal Online Informatika) Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) SemanTIK : Teknik Informasi JURNAL MEDIA INFORMATIKA BUDIDARMA Network Engineering Research Operation [NERO] Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control IT JOURNAL RESEARCH AND DEVELOPMENT Seminar Nasional Teknologi Informasi Komunikasi dan Industri JRST (Jurnal Riset Sains dan Teknologi) JURNAL ILMIAH INFORMATIKA JURNAL TEKNIK INFORMATIKA DAN SISTEM INFORMASI JURNAL INSTEK (Informatika Sains dan Teknologi) ILKOM Jurnal Ilmiah Jiko (Jurnal Informatika dan komputer) MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer J-SAKTI (Jurnal Sains Komputer dan Informatika) JUMANJI (Jurnal Masyarakat Informatika Unjani) Indonesian Journal of Applied Informatics Jurnal Ilmiah Sinus EDUMATIC: Jurnal Pendidikan Informatika JISKa (Jurnal Informatika Sunan Kalijaga) Technologia: Jurnal Ilmiah Infotekmesin Dinasti International Journal of Education Management and Social Science Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) JUSTINDO (Jurnal Sistem dan Teknologi Informasi Indonesia) Cyber Security dan Forensik Digital (CSFD) JATI (Jurnal Mahasiswa Teknik Informatika) JIIP (Jurnal Ilmiah Ilmu Pendidikan) JITU : Journal Informatic Technology And Communication Automata Journal of Education Informatic Technology and Science Just TI (Jurnal Sains Terapan Teknologi Informasi) JURNAL PENDIDIKAN, SAINS DAN TEKNOLOGI Jurnal Teknik Informatika (JUTIF) Phasti: Jurnal Teknik Informatika Politeknik Hasnur J-SAKTI (Jurnal Sains Komputer dan Informatika) Jurnal Abdi Masyarakat Indonesia Indonesian Journal of Networking and Security - IJNS SPEED - Sentra Penelitian Engineering dan Edukasi Jurnal Indonesia Sosial Teknologi Jurnal Sains, Nalar, dan Aplikasi Teknologi Informasi
Claim Missing Document
Check
Articles

DETEKSI BUKTI DIGITAL ONLINE GAMBLING MENGGUNAKAN LIVE FORENSIK PADA SMARTPHONE BERBASIS ANDROID Andrian Sah; Imam Riadi; Yudi Prayudi
Cyber Security dan Forensik Digital Vol. 1 No. 1 (2018): Edisi Mei 2018
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (622.408 KB) | DOI: 10.14421/csecurity.2018.1.1.1237

Abstract

Internet as media to do political movement. Since that, the Indonesian people understand internet-based activities until this current progress. Use of internet in Indonesia most frequently utilize units to access internet, namely, handphone, laptop/notebook, Personal Computer (PC), and tablet. Media used to access internet include mobile (47.6%), computer (1.7%) and both (50.7%). Use of internet increases so that criminal action rate is higher; for example, online gambling. In general, online gambling is done using smartphone. However, today smartphone can load more than one type of online gambling. So speedy progress of online gambling  must contain criminal action. Criminal action is taken by involving smartphone having online gambling with impact on challenge to prove digital evidences and analyze it. Online gambling is a crime or criminal action  being social problems resulting in negative impacts such as morale and mental disorders in society, especially young generation. Questions asked in this study are how to find characteristic of online gambling and digital evidences available to smartphone. This study focuses on characteristic and digital evidences in smartphone based on facts found in thing of evidence. Based on results of study, we found some types of online gambling in smartphone. Characteristic and digital evidences found in smartphone were found by using forensic media, namely, XRY. Forensic media of XRY were used to find thing of digital evidence in smartphone, such as, ID, Password and transaction of online gambling via social applications.
ANALYSIS OF ROUTER ATTACK WITH SECURITY INFORMATION AND EVENT MANAGEMENT AND IMPLICATIONS IN INFORMATION SECURITY INDEX CITRA ARFANUDIN; Bambang Sugiantoro; Yudi Prayudi
Cyber Security dan Forensik Digital Vol. 2 No. 1 (2019): Edisi Mei 2019
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (324.204 KB) | DOI: 10.14421/csecurity.2019.2.1.1388

Abstract

Information security is a need to secure organizational information assets. The government as the regulator issues an Information Security Management System (ISMS) and Information Security Index (US) as a measure of information security in the agency of a region. Security Information and Event Management (SIEM) is a security technology to secure information assets. SIEM is expected to provide information on attacks that occur on the router network and increase the value of the Indeks KAMI of government agencies. However, the use of SIEM is still questionable whether it can recognize a router attack and its impact on the value of our index. This research simulates attacks on routers with 8 attacks namely Mac Flooding, ARP-Poisoning, CDP Flooding, DHCP Starvation, DHCP Rogue, SYN Flooding SSH Bruteforce and FTP Bruteforce. 8 types of attacks followed by digital forensic analysis using the OSCAR method to see the impact on routers and SIEM. Also measured is index KAMI before and after the SIEM to be able to measure the effect of SIEM installation on the value of index KAMI. It was found that the use of SIEM to conduct security monitoring proved successful in identifying attacks, but not all were recognized by SIEM. SIEM only recognizes DHCP Starvation, DHCP Rogue, SSH Bruteforce and FTP Bruteforce. Mac Flooding, ARP-Poisoning, CDP Flooding, SYN Flooding attacks are not recognized by SIEM because routers do not produce logs. Also obtained is the use of SIEM proven to increase our index from the aspect of technology
PEMANFAATAN HASIL REPORT NEXT-GENERATION FIREWALL SEBAGAI SECURITY AWARENESS Akhmad Muzakka; Bambang Sugiantoro; Yudi Prayudi
Cyber Security dan Forensik Digital Vol. 2 No. 2 (2019): Edisi November 2019
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (735.904 KB) | DOI: 10.14421/csecurity.2019.2.2.1600

Abstract

Keamanan informasi merupakan ranah multidisiplin dalam konsentrasi pengembangan dan pelaksanaan dari berbagai mekanisme yang ada untuk menjaga informasi sesuai pada tempatnya. Secara umum, unsur keamanan informasi terdiri dari ketersediaan, integritas, dan kerahasiaan informasi tersebut. Keamanan informasi erat kaitannya dengan konsep manajemen resiko karena potensi ancaman yang diberikan akan menimbulkan kerentanan bagi aset suatu organisasi. Sebagai salah satu upaya untuk mengukur tingkat kematangan dan kesiapan suatu instansi dalam bidang keamanan informasi adalah dengan menggunakan penilaian indeks keamanan informasi (KAMI). Indeks KAMI memiliki 5 area evaluasi yang terangkum dari area yang dimiliki oleh ISO/IEC 27001:2013. Kelima area tersebut adalah tata kelola, pengelolaan resiko, kerangka kerja, pengelolaan aset, dan aspek teknologi. Tujuan dari penelitian tersebut adalah untuk mengetahui adakah perbedaan dan seberapa besar perbedaan jumlah nilai Indeks KAMI ketika Bidang LTI menggunakan NGFW sebagai acuan untuk security awareness. Dari hasil pre-assesment dan post-assesment, ditemukan perbedaan jumlah nilai indeks KAMI dari 403 menjadi 444. Perbedaan yang cukup signifikan berada pada 3 area, yaitu Tata Kelola, Pengelolaan Aset, dan Teknologi dan Keamanan Informasi. Namun, peningkatan tersebut belum cukup untuk menaikkan hasil evaluasi akhir yang masih berada pada “Pemenuhan Kerangka Kerja Dasar” dengan tingkat kematangan mengalami kenaikan dari I+ menjadi Tingkat II pada area “Pengelolaan Aset” dan pada area “Teknologi dan Keamanan Informasi”. Pada kedua area yang mengalami kenaikan yang cukup signifikan dikarenakan responden merasa lebih aware terhadap keamanan yang diterapkan pada jaringan yang dikelola. Hal tersebut juga diterapkan melalui rekomendasi yang sudah diberikan sebelumnya dan dijalankan disesuaikan dengan SOP yang ada pada bidang kerjanya. Hasil dari penelitian tersebut adalah Bidang LTI mampu menggunakan NGFW yang dimiliki untuk pengamanan jaringan yang dikelola, serta ada peningkatan nilai Indeks KAMI setelah menggunakan report dari Firewall Report Center sebagai security awareness
PENERAPAN SYSTEM DEVELOPMENT LIFE CYCLE (SDLC) DALAM MENGEMBANGKAN FRAMEWORK AUDIO FORENSIK Rahmat Inggi; Bambang Sugiantoro; Yudi Prayudi
semanTIK Vol 4, No 2 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (642.451 KB) | DOI: 10.55679/semantik.v4i2.5276

Abstract

An audio recorder is one of the multimedia content that is often found at the crime scene and is used as evidence in the trial process. Audio recorders that can be made as legal evidence in court must follow the rules and audio forensic standards that apply in the process of obtaining the evidence, this is because audio digital evidence is very easy to manipulate. The forensic audio investigation process requires a framework that can be used as a reference in the investigation process. However, at present, the developing audio forensic focus more on analyzing audio forensic techniques and does not provide more specific stages in handling forensic audio from the scene of the case to the trial process. This research focuses on developing the audio forensic framework by implementing the Systems Development Life Cycle (SDLC) in the process of developing the forensic audio framework. Systems Development Life Cycle (SDLC) has stages of planning, analysis, design, implementation, and maintenance that are often used as references in the process of making and developing systems. In other words, the implementation of this method will enable researchers to develop an audio forensic framework that can be used as a standard in conducting the forensic audio investigation process.Keywords—Audio Recorder, Audio Forensics, Framework, SDLCDOI : 10.5281/zenodo.2528444
Pengembangan Framework Digital Forensics Investigation (FDFI) Pada Sosial Media Dengan Metode System Development Life Cycle (SDLC) Nukman Nukman; Yudi Prayudi; Fetyata Yudha
JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 9 No 3 (2022): JATISI (Jurnal Teknik Informatika dan Sistem Informasi)
Publisher : Lembaga Penelitian dan Pengabdian pada Masyarakat (LPPM) STMIK Global Informatika MDP

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35957/jatisi.v9i3.2151

Abstract

From technological developments that are so increasingly competitive and increasingly needed in people's lives for their daily needs on social media as is often used by the community, namely Twitter, Facebook, Instagram, Youtube, WhatsApp and other social media. But the general public does not know that the data sent is stored on a central server so that other people can use the data to commit crimes such as taking identities so that it can be used as a tool to act to spread information that is not infallible for other crimes that can harm many people. Therefore, the researcher developed an investigative framework in social media as data collection using the System Development Life Cycle (SDLC) method. In developing this data collection framework, researchers used the Maltego tool as a means of proving the identity of the perpetrator. The designed framework will produce five stages, namely planning, analysis, design, maintenance, and implementation. The digital evidence that will be obtained from these tools includes twitter accounts, email addresses, phone numbers, DNS, websites and social media.
Identifikasi Source Image Menggunakan Pendekatan Forensic Similarity pada Image Forensik Ahmad Ridha Kelrey; Yudi Prayudi; Erika Ramadhani
JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 9 No 3 (2022): JATISI (Jurnal Teknik Informatika dan Sistem Informasi)
Publisher : Lembaga Penelitian dan Pengabdian pada Masyarakat (LPPM) STMIK Global Informatika MDP

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35957/jatisi.v9i3.2483

Abstract

With the development of digital technology, digital images can be obtained anytime and anywhere through cameras and cell phones. People can get images easily and can also manipulate the sources of information in the content and can even manipulate images. So it is necessary to verify the source of the image which is the main job in the field of image forensics. Camera source identification is the process of determining which camera device was used to take the image. Forensic Similarity approach based on Convolutional Neural Network determines if two image patches are taken by different cameras or from the same camera. This approach differs from typical camera identification in that it does not specify the exact camera used to capture any of the patches. The strength of this approach is the ability to compare cameras that were not used to train the system. This allows investigators to learn important information about images taken with any camera, and is not limited by the set of camera models in the investigator database. Although camera model information, date and time, and other information can be found in the EXIF ​​or in the JPEG header, it is generally impossible to assume the information is correct because image metadata can be easily modified. The source camera identification process uses identification on the image to find out the camera source obtained from the image. By using a forensic similarity approach, it can support information in metadata so that it can guarantee the authenticity of the information obtained.
Cyberbullying Analysis on Instagram Using K-Means Clustering Ahmad Muhariya; Imam Riadi; Yudi Prayudi
JUITA : Jurnal Informatika JUITA Vol. 10 No. 2, November 2022
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1735.594 KB) | DOI: 10.30595/juita.v10i2.14490

Abstract

Social Media, in addition to having a positive impact on society, also has a negative effect. Based on statistics, 95 percent of internet users in Indonesia use the internet to access social networks. Especially for young people, Instagram is more widely used than other social media such as Twitter and Facebook. In terms of cyberbullying cases, cases often occur through social media, Twitter, and Instagram. Several methods are commonly used to analyze cyberbullying cases, such as SVM (Support Vector Machine), NBC (Naïve Bayes Classifier), C45, and K-Nearest Neighbors. Application of a number of these methods is generally implemented on Twitter social media. Meanwhile, young users currently use Instagram more social media than Twitter. For this reason, the research focuses on analyzing cyberbullying on Instagram by applying the K-Mean Clustering algorithm. This algorithm is used to classify cyberbullying actions contained in comments. The dataset used in this study was taken from 2019 to 2021 with 650 records; there were 1827 words and already had labels. This study has successfully classified the tested data with a threshold value of 0.5. The results for grouping words containing bullying on Instagram resulted in the highest accuracy, which is 67.38%, a precision value of 76.70%, and a recall value of 67.48%. These results indicate that the k-means algorithm can make a grouping of comments into two clusters: bullying and non-bullying.
Faux Insider Hazard Investigation on Non-Public Cloud Computing by Using ADAM’s Technique Dwi Kurnia Wibowo; Ahmad Luthfi; Yudi Prayudi; Erika Ramadhani; Muhamad Maulana
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 6 (2022): Desember 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v6i6.4714

Abstract

Cloud computing is a service system mechanism that businesses and organizations use to perform computerized and integrated transactions over computer networks. The service system must, of course, be”matched”with a”certain amount”of security. It is applied to” forecast the probability of cybercrime. A Cloud Service Provider (CSP) often offers cloud-based services with a basic level of security. Typically, CSPs are set up to offer their services on the open internet. Data security-focused organizations strive to shield their systems from a wide range of attackers. One of the alternatives is to construct a private cloud computing system. The issue is the potential for Man in the Cloud (MITC) assaults, which compromise and modify identities and are identified in cloud systems as phony insider threats. Based on the ISO 27032 standard research, the goal of this work is to undertake a threat analysis of MITC attack methodologies against private cloud computing services. With regards to risks to cloud services in a private cloud computing environment, it is intended that reporting and documenting the study' findings would lead to suggestions for more research and cybersecurity management procedures.
SERIOUS GAME : LEARNING DIGITAL FORENSIC ACQUISITION TECHNIQUES TO INCREASE COMMUNITY AWARENESS Muh. Ditra Pamungkas; Syarif Hidayat; Yudi Prayudi
Jurnal Teknik Informatika (Jutif) Vol. 3 No. 6 (2022): JUTIF Volume 3, Number 6, December 2022
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20884/1.jutif.2022.3.6.630

Abstract

One of the common causes of cybercrime is the lack of education and public awareness of cybercrime and digital forensics, such as acquisition techniques. So far, only a few people know in general the digital forensic acquisition technique, because learning about this acquisition technique is difficult to obtain and difficult to understand. This study aims to apply Serious Game as a solution in increasing understanding and at the same time promoting the importance of basic acquisition techniques in the world of digital forensics to the public. The method used in this study is the Design Thinking method, which consists of: Empathize, Define, Ideate, Prototype, and Test. The results obtained in this study are a serious game built using the Unity 3D application. There are several displays produced, including: splash screen, quests/challenges, instructions, simulation of acquisition techniques, selection of evidence, and quizzes. Based on the blackbox testing carried out, it was found that the application had been developed as expected.
Analisa Deteksi dan Pengenalan Wajah pada Citra dengan Permasalahan Visual Verry Noval Kristanto; Imam Riadi; Yudi Prayudi
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 8 No. 1 (2023): Januari 2023
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/jiska.2023.8.1.78-89

Abstract

Facial recognition is a significant part of criminal investigations because it may be used to identify the offender when the criminal's face is consciously or accidentally recorded on camera or video. However, a majority of these digital photos have poor picture quality, which complicates and lengthens the process of identifying a face image. The purpose of this study is to discover and identify faces in these low-quality digital photographs using the Principal Component Analysis (PCA) and Linear  Discriminant Analysis (LDA) face identification method and the Viola-Jones face recognition method. The success percentage for the labeled face in the wild (LFW) dataset is 63.33%, whereas the success rate for face94 is 46.66%, while LDA is only a maximum of 20% on noise and brightness. One of the names and faces from the dataset is displayed by the facial recognition system. The brightness of the image, where the facial item is located, and any new objects that have entered the scene have an impact on the success rate.
Co-Authors - Bambang Sugiantoro, Bambang Sugiantoro - MTI UII Yogyakarta, Zaenudin - UIN Sunan Kalijaga Yogyakarta, Bambang Sugiantoro Abdul Muis Abdul Rohman Supriyono Abdul Rohman Supriyono Achmad Syauqi Adhitya Wishnu Wardhana Adi Fajaryanto Adristi, Fikri Irfan Agung Firmansyah, Rico Agus Wijayanto Ahmad Luthfi Ahmad Luthfi Ahmad Luthfi Ahmad Luthfie Ahmad Muhariya Ahmad Ridha Kelrey Ahmad Rois Syujak Ahmad Subki Ahmad Subki - STMIK Mataram Ahmad, Muhammad Sabri Akhmad Muzakka Al Jum'ah, Muhammad Na'im Andrian Sah Ardy Wicaksono Arif Surya Putra Arrochman, Ibnu Fajar Astria Adhi Wijaya azis catur laksono Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro - Bambang Sugiantoro CITRA ARFANUDIN Danar Cahyo Prakoso Dedy Frianto Dhomas Hatta Fudholi Dimas Pamilih Epin Andrian Dinda Shafira Gita Islami Dirgahayu, Raden Teduh Dirman Dirman Dita Rahayu Berliana Dodi Prakoso Wibowo Dwi Kurnia Wibowo Erika Ramadhani Erika Ramadhani Ermadi Satriya Wijaya Fajaryanto, Adi Fauzan Natsir Fetyata Yudha Fietyata Yudha Firdaus, Jasmine Erina Fitriyanti S Fudholi, Dhomas Hatta Giffary, Farhan Wildan Hanifah Mardlatillah Helmi Rachman Ibnu Fajar Arrochman Idham Halik Ilman Pradhana Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Isriade Putra Ivany Hikmatunnisa' Iwan Aprizal Kharisma Mahesa Koes Wiyatmoko Kun Saidi Kusuma, Permadi Lilik Widyawati Madi, Permadi Kusuma Mahmud, Rifqi Merisa Kurniasari Fadilla Moch Bagoes Pakarti Moh Fadly Panende Muh. Ditra Pamungkas Muhamad Maulana Muhammad Khairul Faridi Muhammad Naufal Bahreisy Muhammad Nur Adhar Muhammad Zulfadhilah Muzammilatul Wachidah Nafila, Feryan Lutfie NANNY, NANNY Nora Lizarti Nukman Nukman Nurhayati Jiatmiko Nurmi Hidayasari Nuryasin, Ilyas Pahrul Irfan Pomalingo, Suwito Prakoso, Danar Cahyo Putry Wahyu Setyaningsih R, Zulihsan Rachman, Helmi Raharjo, Toto Rahmat Inggi Ramadhan, Arya Danuarta Ramadhani, Erika Ramansyah Ramansyah Ridho Rahmadi Rio Pradana Aji Ririn Anggraini Rosi Rahmadi Syahputra Rosidin Al Caruban Ruuhwan Ruuhwan Setiawan, Mukhammad Andri Sisdarmanto Adinandra, Sisdarmanto Siti Kartika Munawarah Subki, Ahmad Supriyono, Abdul Rohman Syarif Hidayat Teduh Dirgahayu Tino Feri Efendi Tri Sudinugraha Triawan Adi Cahyanto Verry Noval Kristanto Virjayanti Lazinu Wachidah, Muzammilatul Wisnu Pranoto Wisnu Pranoto Wisnu Sanjaya Yasir Muin Zulhair Jidan Dj. Tamu