p-Index From 2021 - 2026
6.684
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering TEKNIK INFORMATIKA Media Informatika Seminar Nasional Aplikasi Teknologi Informasi (SNATI) Jurnal Teknik Jurnal Teknologi dan Manajemen Informatika Jurnal Buana Informatika Jurnal Teknologi Informasi dan Ilmu Komputer Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika AJIE (Asian Journal of Innovation and Entrepreneurship) Register: Jurnal Ilmiah Teknologi Sistem Informasi JOIN (Jurnal Online Informatika) Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) SemanTIK : Teknik Informasi JURNAL MEDIA INFORMATIKA BUDIDARMA Network Engineering Research Operation [NERO] Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control IT JOURNAL RESEARCH AND DEVELOPMENT Seminar Nasional Teknologi Informasi Komunikasi dan Industri JRST (Jurnal Riset Sains dan Teknologi) JURNAL ILMIAH INFORMATIKA JURNAL TEKNIK INFORMATIKA DAN SISTEM INFORMASI JURNAL INSTEK (Informatika Sains dan Teknologi) ILKOM Jurnal Ilmiah Jiko (Jurnal Informatika dan komputer) MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer J-SAKTI (Jurnal Sains Komputer dan Informatika) JUMANJI (Jurnal Masyarakat Informatika Unjani) Indonesian Journal of Applied Informatics Jurnal Ilmiah Sinus EDUMATIC: Jurnal Pendidikan Informatika JISKa (Jurnal Informatika Sunan Kalijaga) Technologia: Jurnal Ilmiah Infotekmesin Dinasti International Journal of Education Management and Social Science Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) JUSTINDO (Jurnal Sistem dan Teknologi Informasi Indonesia) Cyber Security dan Forensik Digital (CSFD) JATI (Jurnal Mahasiswa Teknik Informatika) JIIP (Jurnal Ilmiah Ilmu Pendidikan) JITU : Journal Informatic Technology And Communication Automata Journal of Education Informatic Technology and Science Just TI (Jurnal Sains Terapan Teknologi Informasi) JURNAL PENDIDIKAN, SAINS DAN TEKNOLOGI Jurnal Teknik Informatika (JUTIF) Phasti: Jurnal Teknik Informatika Politeknik Hasnur J-SAKTI (Jurnal Sains Komputer dan Informatika) Jurnal Abdi Masyarakat Indonesia Indonesian Journal of Networking and Security - IJNS SPEED - Sentra Penelitian Engineering dan Edukasi Reformasi Hukum Jurnal Indonesia Sosial Teknologi Prosiding SEMNAS INOTEK (Seminar Nasional Inovasi Teknologi) Jurnal Sains, Nalar, dan Aplikasi Teknologi Informasi
Claim Missing Document
Check
Articles

PENERAPAN SYSTEM DEVELOPMENT LIFE CYCLE (SDLC) DALAM MENGEMBANGKAN FRAMEWORK AUDIO FORENSIK Rahmat Inggi; Bambang Sugiantoro; Yudi Prayudi
semanTIK Vol 4, No 2 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (642.451 KB) | DOI: 10.55679/semantik.v4i2.5276

Abstract

An audio recorder is one of the multimedia content that is often found at the crime scene and is used as evidence in the trial process. Audio recorders that can be made as legal evidence in court must follow the rules and audio forensic standards that apply in the process of obtaining the evidence, this is because audio digital evidence is very easy to manipulate. The forensic audio investigation process requires a framework that can be used as a reference in the investigation process. However, at present, the developing audio forensic focus more on analyzing audio forensic techniques and does not provide more specific stages in handling forensic audio from the scene of the case to the trial process. This research focuses on developing the audio forensic framework by implementing the Systems Development Life Cycle (SDLC) in the process of developing the forensic audio framework. Systems Development Life Cycle (SDLC) has stages of planning, analysis, design, implementation, and maintenance that are often used as references in the process of making and developing systems. In other words, the implementation of this method will enable researchers to develop an audio forensic framework that can be used as a standard in conducting the forensic audio investigation process.Keywords—Audio Recorder, Audio Forensics, Framework, SDLCDOI : 10.5281/zenodo.2528444
Pengembangan Framework Digital Forensics Investigation (FDFI) Pada Sosial Media Dengan Metode System Development Life Cycle (SDLC) Nukman Nukman; Yudi Prayudi; Fetyata Yudha
JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 9 No 3 (2022): JATISI (Jurnal Teknik Informatika dan Sistem Informasi)
Publisher : Lembaga Penelitian dan Pengabdian pada Masyarakat (LPPM) STMIK Global Informatika MDP

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35957/jatisi.v9i3.2151

Abstract

From technological developments that are so increasingly competitive and increasingly needed in people's lives for their daily needs on social media as is often used by the community, namely Twitter, Facebook, Instagram, Youtube, WhatsApp and other social media. But the general public does not know that the data sent is stored on a central server so that other people can use the data to commit crimes such as taking identities so that it can be used as a tool to act to spread information that is not infallible for other crimes that can harm many people. Therefore, the researcher developed an investigative framework in social media as data collection using the System Development Life Cycle (SDLC) method. In developing this data collection framework, researchers used the Maltego tool as a means of proving the identity of the perpetrator. The designed framework will produce five stages, namely planning, analysis, design, maintenance, and implementation. The digital evidence that will be obtained from these tools includes twitter accounts, email addresses, phone numbers, DNS, websites and social media.
Identifikasi Source Image Menggunakan Pendekatan Forensic Similarity pada Image Forensik Ahmad Ridha Kelrey; Yudi Prayudi; Erika Ramadhani
JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 9 No 3 (2022): JATISI (Jurnal Teknik Informatika dan Sistem Informasi)
Publisher : Lembaga Penelitian dan Pengabdian pada Masyarakat (LPPM) STMIK Global Informatika MDP

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35957/jatisi.v9i3.2483

Abstract

With the development of digital technology, digital images can be obtained anytime and anywhere through cameras and cell phones. People can get images easily and can also manipulate the sources of information in the content and can even manipulate images. So it is necessary to verify the source of the image which is the main job in the field of image forensics. Camera source identification is the process of determining which camera device was used to take the image. Forensic Similarity approach based on Convolutional Neural Network determines if two image patches are taken by different cameras or from the same camera. This approach differs from typical camera identification in that it does not specify the exact camera used to capture any of the patches. The strength of this approach is the ability to compare cameras that were not used to train the system. This allows investigators to learn important information about images taken with any camera, and is not limited by the set of camera models in the investigator database. Although camera model information, date and time, and other information can be found in the EXIF ​​or in the JPEG header, it is generally impossible to assume the information is correct because image metadata can be easily modified. The source camera identification process uses identification on the image to find out the camera source obtained from the image. By using a forensic similarity approach, it can support information in metadata so that it can guarantee the authenticity of the information obtained.
Cyberbullying Analysis on Instagram Using K-Means Clustering Ahmad Muhariya; Imam Riadi; Yudi Prayudi
JUITA : Jurnal Informatika JUITA Vol. 10 No. 2, November 2022
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1735.594 KB) | DOI: 10.30595/juita.v10i2.14490

Abstract

Social Media, in addition to having a positive impact on society, also has a negative effect. Based on statistics, 95 percent of internet users in Indonesia use the internet to access social networks. Especially for young people, Instagram is more widely used than other social media such as Twitter and Facebook. In terms of cyberbullying cases, cases often occur through social media, Twitter, and Instagram. Several methods are commonly used to analyze cyberbullying cases, such as SVM (Support Vector Machine), NBC (Naïve Bayes Classifier), C45, and K-Nearest Neighbors. Application of a number of these methods is generally implemented on Twitter social media. Meanwhile, young users currently use Instagram more social media than Twitter. For this reason, the research focuses on analyzing cyberbullying on Instagram by applying the K-Mean Clustering algorithm. This algorithm is used to classify cyberbullying actions contained in comments. The dataset used in this study was taken from 2019 to 2021 with 650 records; there were 1827 words and already had labels. This study has successfully classified the tested data with a threshold value of 0.5. The results for grouping words containing bullying on Instagram resulted in the highest accuracy, which is 67.38%, a precision value of 76.70%, and a recall value of 67.48%. These results indicate that the k-means algorithm can make a grouping of comments into two clusters: bullying and non-bullying.
Faux Insider Hazard Investigation on Non-Public Cloud Computing by Using ADAM’s Technique Dwi Kurnia Wibowo; Ahmad Luthfi; Yudi Prayudi; Erika Ramadhani; Muhamad Maulana
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 6 (2022): Desember 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v6i6.4714

Abstract

Cloud computing is a service system mechanism that businesses and organizations use to perform computerized and integrated transactions over computer networks. The service system must, of course, be”matched”with a”certain amount”of security. It is applied to” forecast the probability of cybercrime. A Cloud Service Provider (CSP) often offers cloud-based services with a basic level of security. Typically, CSPs are set up to offer their services on the open internet. Data security-focused organizations strive to shield their systems from a wide range of attackers. One of the alternatives is to construct a private cloud computing system. The issue is the potential for Man in the Cloud (MITC) assaults, which compromise and modify identities and are identified in cloud systems as phony insider threats. Based on the ISO 27032 standard research, the goal of this work is to undertake a threat analysis of MITC attack methodologies against private cloud computing services. With regards to risks to cloud services in a private cloud computing environment, it is intended that reporting and documenting the study' findings would lead to suggestions for more research and cybersecurity management procedures.
SERIOUS GAME : LEARNING DIGITAL FORENSIC ACQUISITION TECHNIQUES TO INCREASE COMMUNITY AWARENESS Muh. Ditra Pamungkas; Syarif Hidayat; Yudi Prayudi
Jurnal Teknik Informatika (Jutif) Vol. 3 No. 6 (2022): JUTIF Volume 3, Number 6, December 2022
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20884/1.jutif.2022.3.6.630

Abstract

One of the common causes of cybercrime is the lack of education and public awareness of cybercrime and digital forensics, such as acquisition techniques. So far, only a few people know in general the digital forensic acquisition technique, because learning about this acquisition technique is difficult to obtain and difficult to understand. This study aims to apply Serious Game as a solution in increasing understanding and at the same time promoting the importance of basic acquisition techniques in the world of digital forensics to the public. The method used in this study is the Design Thinking method, which consists of: Empathize, Define, Ideate, Prototype, and Test. The results obtained in this study are a serious game built using the Unity 3D application. There are several displays produced, including: splash screen, quests/challenges, instructions, simulation of acquisition techniques, selection of evidence, and quizzes. Based on the blackbox testing carried out, it was found that the application had been developed as expected.
Analisa Deteksi dan Pengenalan Wajah pada Citra dengan Permasalahan Visual Verry Noval Kristanto; Imam Riadi; Yudi Prayudi
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 8 No. 1 (2023): Januari 2023
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/jiska.2023.8.1.78-89

Abstract

Facial recognition is a significant part of criminal investigations because it may be used to identify the offender when the criminal's face is consciously or accidentally recorded on camera or video. However, a majority of these digital photos have poor picture quality, which complicates and lengthens the process of identifying a face image. The purpose of this study is to discover and identify faces in these low-quality digital photographs using the Principal Component Analysis (PCA) and Linear  Discriminant Analysis (LDA) face identification method and the Viola-Jones face recognition method. The success percentage for the labeled face in the wild (LFW) dataset is 63.33%, whereas the success rate for face94 is 46.66%, while LDA is only a maximum of 20% on noise and brightness. One of the names and faces from the dataset is displayed by the facial recognition system. The brightness of the image, where the facial item is located, and any new objects that have entered the scene have an impact on the success rate.
DETEKSI KEMIRIPAN CITRA DIGITAL MENGGUNAKAN METODE FEATURE DETECTION DAN FEATURE MATCHING UNTUK MENDUKUNG ANALISA IMAGE FORENSIC Siti Kartika Munawarah; Yudi Prayudi; Erika Ramadhani
Just TI (Jurnal Sains Terapan Teknologi Informasi) Vol 1, No 15 (2023): JANUARI 2023
Publisher : Politeknik Negeri Samarinda

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46964/justti.v1i15.1738

Abstract

Teknologi pencitraan yang semakin pesat perkembangannya saat ini menimbulkan banyak problematika dan tantangan dalam menentukan keaslian citra digital. Forensik citra atau dikenal sebagai image forensic merupakan bidang ilmu yang dikhususkan untuk mengumpulan bukti penentuan keaslian gambar dalam gambar digital. Algoritma SIFT (Scale Invariant Feature Transform) merupakan salah satu algoritma yang diterapkan dalam pendeteksian objek untuk mendeteksi titik-titik kunci (keypoints) pada citra digital. Algoritma FLANN (Fast Library Approximated Nearest Neighbor) merupakan salah satu algoritma yang diterapkan pada metode pencocokan objek untuk menentukan keypoints terbaik (atau disebut sebagai good match). Penelitian ini membangun program pendeteksi kemiripan citra dengan menggunakan metode feature detection dan feature matching untuk mendukung analisis citra forensik. Penelitian ini menghasilkan bahwa penerapan algoritma SIFT dan FLANN melalui OpenCV dapat mendeteksi persentase kemiripan dari image asli dan image rekayasa, dimana kedua image tersebut terlihat mirip secara visual namun melalui algoritma SIFT dan FLANN dapat dilakukan analisis kemiripan dari kedua image tersebut. Pada penelitian ini diperoleh nilai yang cukup signifikan pada persentase kemiripan kedua image, dimana persentase tertinggi dengan nilai rata-rata 95% ke atas diperoleh pada perbandingan image asli dengan image rekayasa dengan gangguan cropping, sedangkan persentase kemiripan terendah dengan nilai rata-rata 1,05% ke bawah diperoleh pada perbandingan image asli dengan image rekayasa – flip vertical.
CHAIN OF CUSTODY UNTUK ARTEFAK SOSIAL MEDIA FORENSIK Virjayanti Lazinu; Bambang Sugiantoro; Yudi Prayudi
Just TI (Jurnal Sains Terapan Teknologi Informasi) Vol 1, No 15 (2023): JANUARI 2023
Publisher : Politeknik Negeri Samarinda

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46964/justti.v1i15.1750

Abstract

Chain of Custody (COC) merupakan salah satu aspek penting dalam penanganan barang bukti yang secara kronologis melakukan dokumentasi terhadap barang bukti serta pencatatan interaksi terhadapnya. Untuk itu barang bukti pada kasus siber dibagi menjadi dua jenis yaitu barang bukti fisik(elektronik) dan barang bukti digital. Salah satu pembuktian ilmiah yang dapat digunakan adalah memastikan informasi kronologis barang bukti dalam dokumen Chain ofCustody. Penelitian ini, bertujuan untuk menghasilkan dokumentasi Chains of Custody dari hasil investigasi cyber crime dengan menggunakan software hunchly dan metode National Institute Standard and Technology (NIST) yang diterapkan pada kasus artefak sosial media. Untuk mengidentifikasi dan memodelkan informasi,pendekatan normalisasi diterapkan terhadap beberapa formulir Chain of Custody untuk kejahatan siber. Sehingga diharapkan dengan adanya konsep Chain ofCustody untuk Artefak Sosial media Forensik dapat membantu penyelidikan dalam penanganan bukti digital yang terjadi di sosial media agar terjaga dan sama persis seperti ketika pertama kali ditemukan.
ANALYSIS OF BRUTE FORCE ATTACK LOGS TOWARD NGINX WEB SERVER ON DASHBOARD IMPROVED LOG LOGGING SYSTEM USING FORENSIC INVESTIGATION METHOD Rio Pradana Aji; Yudi Prayudi; Ahmad Luthfi
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 1 (2023): JUTIF Volume 4, Number 1, February 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.1.644

Abstract

Since it was first launched in 1990, the Web Server is still in use today. No exception, almost all companies entering industry 4.0 use Web Servers to show the existence of the company's website and its products. Starting from the websites provided for free by WordPress and Blogspot to independent websites created by their respective companies. The web server itself is available in several types, ranging from apache, nginx, litespeed, etc. Of course, the use of a Web Server for websites cannot be separated from internet crimes or cyber crimes. One of the crimes committed is the hacker's attempt to login to the website Administrator page. The loophole used by hackers is brute force or forced entry by trying every combination of existing Administrator User and Password. This research focuses on building and updating a website monitoring dashboard system with Wazuh technology. The method used in this study is the Quantitative Forensic Investigation Method by examining the logs generated by the System Dashboard using Digital Forensic procedures. This monitoring process aims to detect brute force threats on managed websites by showing the website Administrator login activity log. The results of the metadata log shown by the optimized dashboard show the number of brute force attacks on managed websites. The number of attacks recorded was 259646 attacks on the first cluster and 288676 attacks on the second cluster. In addition, the results of the metadata log can be investigated further to find the location of the Hacker. The location of the hackers found was only limited to the VPN (Virtual Private Network) server used. One of the VPN servers used in this case is Amazon Data Center.
Co-Authors - Bambang Sugiantoro, Bambang Sugiantoro - MTI UII Yogyakarta, Zaenudin - UIN Sunan Kalijaga Yogyakarta, Bambang Sugiantoro Abdul Muis Abdul Rohman Supriyono Abdul Rohman Supriyono Achmad Syauqi Adhitya Wishnu Wardhana Adi Fajaryanto Adristi, Fikri Irfan Agung Firmansyah, Rico Agus Wijayanto Agus Wijayanto, Agus Ahmad Luthfi Ahmad Luthfi Ahmad Luthfi Ahmad Luthfie Ahmad Muhariya Ahmad Ridha Kelrey Ahmad Rois Syujak Ahmad Subki - STMIK Mataram Ahmad, Muhammad Sabri Akhmad Muzakka Al Jum'ah, Muhammad Na'im Aloysius Wisnubroto Andrian Sah Ardy Wicaksono Arif Surya Putra Arrochman, Ibnu Fajar Astria Adhi Wijaya azis catur laksono Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro - Bambang Sugiantoro CITRA ARFANUDIN Danar Cahyo Prakoso Dedy Frianto Dhomas Hatta Fudholi Dimas Pamilih Epin Andrian Dinda Shafira Gita Islami Dirgahayu, Raden Teduh Dirman Dirman Dita Rahayu Berliana Dodi Prakoso Wibowo Dwi Kurnia Wibowo Efendi, Muhamad Masjun Erika Ramadhani Erika Ramadhani Ermadi Satriya Wijaya Fajaryanto, Adi Fauzan Natsir Fetyata Yudha Fietyata Yudha Firdaus, Jasmine Erina Fitriyanti S Fudholi, Dhomas Hatta Giffary, Farhan Wildan Helmi Rachman Ibnu Fajar Arrochman Idham Halik Ilman Pradhana Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Isriade Putra Ivany Hikmatunnisa' Iwan Aprizal Jidan Dj. Tamu, Zulhair Kharisma Mahesa Koes Wiyatmoko Kun Saidi Kusuma, Permadi Lilik Widyawati Madi, Permadi Kusuma Mahmud, Rifqi Mardlatillah, Hanifah Merisa Kurniasari Fadilla Moch Bagoes Pakarti Moh Fadly Panende Muh. Ditra Pamungkas Muhamad Maulana Muhammad Khairul Faridi Muhammad Naufal Bahreisy Muhammad Nur Adhar Muhammad Zulfadhilah Muzammilatul Wachidah Nafila, Feryan Lutfie NANNY, NANNY Nora Lizarti Nukman Nukman Nurhayati Jiatmiko Nurmi Hidayasari Nuryasin, Ilyas Pahrul Irfan Pomalingo, Suwito Prakoso, Danar Cahyo Putry Wahyu Setyaningsih R, Zulihsan Rachman, Helmi Raharjo, Toto Rahmat Inggi Ramadhan, Arya Danuarta Ramadhani, Erika Ramansyah Ramansyah Ridho Rahmadi Rio Pradana Aji Ririn Anggraini Rosi Rahmadi Syahputra Rosidin Al Caruban Ruuhwan Ruuhwan Setiawan, Mukhammad Andri Sisdarmanto Adinandra, Sisdarmanto Siti Kartika Munawarah Subki, Ahmad Sudinugraha, Tri Supriyono, Abdul Rohman Syarif Hidayat Teduh Dirgahayu Tino Feri Efendi Triawan Adi Cahyanto Verry Noval Kristanto Virjayanti Lazinu Wachidah, Muzammilatul Wafi, Muhammad Syafiq Wisnu Pranoto Wisnu Pranoto Wisnu Sanjaya Yasir Muin