Claim Missing Document
Check
Articles

Found 9 Documents
Search
Journal : Jurnal Jarkom

SIMULASI SISTEM DETEKSI PENYUSUP DALAM JARINGAN KOMPUTER BERBASIS WEB INTERFACE SERTA PENCEGAHAN UNTUK MENINGKATKAN KEAMANAN Prihasmoro, Sukma Ageng; Rachmawati, Yuliana; Fatkhiyah, Erfanti
Jurnal Jarkom Vol 2, No 1 (2014): EDISI DESEMBER 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT            Network security is a matter that needs to be given special attention, because infiltration often occurs with a variety of purposes. Intrusion detection systems (IDS) is a method of network security by detecting intrusion and provide output results in the form of alerts that can be known through the web. To implement the various components of the detection system is needed in order to maximize performance. In this study, the application is used as a detection system Snort attack. Basic Analysis and Security System (BASE) is used as a web interface. Log storage media attacks using MySQL. Fields marked with an ICMP protocol detection system ie, TCP and UDP. To follow up, use iptables and portsentry in the IP address blocking intruders. Attacks that occur can be analyzed using BASE, this application can indicate the type of attacks carried out and can see the span of attack for several months. By analyzing the types of attacks that occur, can help administrators reinforce the gap.Keywords : IDS, intruder, network security
PERANCANGAN APLIKASI AUTOMATIC RESERVATION PADA UNIT PELAYANAN JASA BERBASIS MULTI CLIENT DENGAN SERVER STORAGE (Studi Kasus Unit Pelayanan Jasa Konveksi Toko Gorden Jogjakarta) ., Andrianto; Fatkhiyah, Erfanti; ., Suraya
Jurnal Jarkom Vol 3, No 1 (2015): Desember 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTCurtains vintage is one of the service providers tailor shop as well as sellers of goods curtains, Along with the order to make them quite overwhelmed in terms of bookkeeping. During this time they do the bookkeeping manually, only occasionally copied into the data-processing applications such as Microsoft Excel, which still must be input manually. Under these conditions, it will be created a booking system automatically and computerized, with the system expected to reduce the negligence of the officers, or the ambiguity of data. The system to be used is the customer data collection system, the cost calculation system, the date calculation system, as well as the entire financial report obtained from the service unit. The system uses the Delphi programming platform based on client server, so that each part will be getting its own computer to be able to access the menus on the UPJ. With the system described above, is expected to help employees to recapitalize the transaction and providing the speed and efficiency performance, while providing good service to customers Keywords: Automated Booking System, Desktop Systems, Delphi, Application Services Unit
SIMULASI SISTEM DETEKSI PENYUSUP DALAM JARINGAN KOMPUTER BERBASIS WEB INTERFACE SERTA PENCEGAHAN UNTUK MENINGKATKAN KEAMANAN Prihasmoro, Sukma Ageng; Rachamawati, Rr.Yuliana; Fatkhiyah, Erfanti
Jurnal Jarkom Vol 2, No 2 (2015): EDISI JUNI 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT            Network security is a matter that needs to be given special attention, because infiltration often occurs with a variety of purposes. Intrusion detection systems (IDS) is a method of network security by detecting intrusion and provide output results in the form of alerts that can be known through the web. To implement the various components of the detection system is needed in order to maximize performance. In this study, the application is used as a detection system Snort attack. Basic Analysis and Security System (BASE) is used as a web interface. Log storage media attacks using MySQL. Fields marked with an ICMP protocol detection system ie, TCP and UDP. To follow up, use iptables and portsentry in the IP address blocking intruders. Attacks that occur can be analyzed using BASE, this application can indicate the type of attacks carried out and can see the span of attack for several months. By analyzing the types of attacks that occur, can help administrators reinforce the gap. Keywords : IDS, intruder, network security
SIMULASI SISTEM DETEKSI PENYUSUP DALAM JARINGAN KOMPUTER BERBASIS WEB INTERFACE SERTA PENCEGAHAN UNTUK MENINGKATKAN KEAMANAN Prihasmoro, Sukma Ageng; Rachmawati, Rr. Yuliana; Fatkhiyah, Erfanti
Jurnal Jarkom Vol 4 No 1 (2016): Juni 2016
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Keamanan jaringan merupakan hal yang perlu diberi perhatian khusus, karena penyusupan sering terjadi dengan berbagai tujuan. Intrusion detection system (IDS) adalah sebuah metode pengamanan jaringan dengan mendeteksi penyusupan dan memberikan hasil output berupa alert yang dapat diketahui melalui web. Untuk mengimplementasikan sistem deteksi diperlukan berbagai komponen agar kinerjanya lebih maksimal. Pada penelitian ini aplikasi snort digunakan sebagai sistem deteksi serangan. Basic Analysis and Security System (BASE) digunakan sebagai web interface. Media penyimpanan log serangan menggunakan MySQL. Bagian yang diberi sistem deteksi yaitu protokol ICMP,TCP dan UDP. Untuk tindak lanjut, digunakan iptables dan portsentry dalam melakukan pemblokiran IP address penyusup. Serangan yang terjadi dapat dianalisa menggunakan BASE, aplikasi ini dapat menunjukkan jenis serangan yang dilakukan serta dapat melihat rentang waktu serangan selama beberapa bulan. Dengan menganalisa jenis serangan yang terjadi, dapat membantu administrator memperkuat celah tersebut.
ENKRIPSI FILE MENGGUNAKAN METODE XML SERIALIZER UNTUK PENGAMANAN FILE TUGAS KULIAH Juliyanti, Nur Arifah; Lestari, Uning; Fatkhiyah, Erfanti
Jurnal Jarkom Vol 3 No 1 (2015): Juni 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

INTISARI Sistem dibangun untuk mengamanan file tugas kuliah mahasiswa agar tidak dapat terduplikasi oleh orang lain atau mahasiswa lain. Sistem ini memiliki beberapa fitur diantaranya adalah fitur registrasi mahasiswa dan dosen, login administrator, login mahasiswa, login dosen. Sedangkan untuk bagian administrator memiliki fitur untuk mengelola dan mengontrol seluruh data mahasiswa dan dosen, membuat user baru dan menghapus user yang ada, karena hak tersebut hanya dimiliki oleh administrator. Sistem enkripsi file xml serializer untuk pengamanan file tugas kuliah ini dibangun sesuai dengan rancangan sistem yang dipaparkan dan dilakukan berbagai pengembangan dari berbagai pengumpulan data sebelumnya yang dilakukan di kampus institut sains dan teknologi akprind Yogyakarta. Sistem ini dibangun menggunakan database MySql dan Php, hal tersebut bertujuan agar terjadi efisiensi pada saat implementasi agar lebih cepat dan mudah. Penelitian pembuatan sistem xml serialization ini untuk mengurangi resiko penduplikasi jawaban tugas dari setiap mahasiswa yang telah diupload dan dosen dapat memberika nilai yang sesuai dengan apa yang dikerjakan oleh mahasiswa.
OPTIMALISASI RANCANGAN JARINGAN KOMPUTER MENGGUNAKAN GOOGLE SKETCHUP Taufik Ardiantoro; Joko Triyono; Erfanti Fatkhiyah
Jurnal Jarkom Vol. 4 No. 2 (2016): Desember 2016
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

All the time, mapping of computer networks in a building is a visualization in the form of 2-dimensional. To increase the quality of mapping network computer then can be made in the form of visualization mapping that resembles to the real life. It use the form of 3-dimensional (3D).The scope of the problem in this research there are a few limitation such as data collection and the creation of 3D computer network on campus 3 IST AKPRIND Yogyakarta. Objects that are examined include lecture rooms, laboratories, faculty room, and another room in campus 3 of IST AKPRIND Yogyakarta. The process of creating 3D computer network uses software google sketchUp. The data used in the form of survey results of observations of some parts of the building and photographs of every room. Network mapping results in the form of 3D is an interesting media, easily understood by users, can be used as a reference for the maintenance and development of the network, it can even be used as a means of introduction to campus building 3 description thoroughly. 3D image of computer networks and the building of the campus 3 IST AKPRIND produces up to date information about the physical building at this time.
PERANCANGAN APLIKASI AUTOMATIC RESERVATION PADA UNIT PELAYANAN JASA BERBASIS MULTI CLIENT DENGAN SERVER STORAGE (Studi Kasus Unit Pelayanan Jasa Konveksi Toko Gorden Jogjakarta) Andrianto -; Erfanti Fatkhiyah; Suraya -
Jurnal Jarkom Vol. 3 No. 2 (2015): Desember 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Curtains vintage is one of the service providers tailor shop as well as sellers of goods curtains, Along with the order to make them quite overwhelmed in terms of bookkeeping. During this time they do the bookkeeping manually, only occasionally copied into the data-processing applications such as Microsoft Excel, which still must be input manually. Under these conditions, it will be created a booking system automatically and computerized, with the system expected to reduce the negligence of the officers, or the ambiguity of data. The system to be used is the customer data collection system, the cost calculation system, the date calculation system, as well as the entire financial report obtained from the service unit. The system uses the Delphi programming platform based on client server, so that each part will be getting its own computer to be able to access the menus on the UPJ. With the system described above, is expected to help employees to recapitalize the transaction and providing the speed and efficiency performance, while providing good service to customers
PERANCANGAN DAN IMPLEMENTASI MONITORING SERVER OWNCLOUD Jefrianto Tafonao; Erfanti Fatkhiyah; Rr. Yuliana Rachmawati
Jurnal Jarkom Vol. 7 No. 2 (2019): Desember 2019
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Semakin meningkatnya ukuran dan jumlah perangkat jaringan akan semakin kompleks masalah pada jaringan sehingga diperlukan adanya pengawasan terus-menerus untuk menjamin ketersediaan availability layanan. Cacti (Comman Agricurtural Customs Transmision of Information) merupakan salah satu software yang digunakan untuk keperluan monitoring yang banyak digunakan saat ini. Cacti menyimpan semua data atau informasi yang diperlukan untuk membuat grafik dan mengumpulkannya dengan database MySql. Kemudian dilakukan pengujian untuk mengetahui tampilan dan fungsi dari monitoring yang dibuat dan pengujian juga dilakukan terhadap aplikasi untuk mengetahui keakuratan. Hasil pengujian monitoring pada Server OwnCloud menunjukkan bahwa monitoring Cacti yang dibuat memiliki keakuratan dalam memonitoring Logged User, Ping Latency, Load Avarage, Monitoring Usage, dan disk space.
PERANCANGAN DAN IMPLEMENTASI SSO (SINGLE SIGN ON) MENGGUNAKAN PROTOKOL OAUTH 2.0 Agus Suhardi; Erfanti Fatkhiyah; muhammad Sholeh
Jurnal Jarkom Vol. 5 No. 2 (2017): Desember 2017
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Aplikasi yang dibangun berbasis web pada umumnya menuntut pengguna aplikasi untuk login sebelum melakukan transaksi, dengan demikian pengguna harus melakukan login secara berulang-ulang untuk dapat melakukan transaksi pada server yang berbeda sehingga hal ini tidak efisien karena harus melakukan hal yang sama. Pada basis data aplikasi juga akan memiliki data yang sama yaitu nama pengguna dan kata sandi pada server yang berbeda, sehingga akan mengakibatkan redudansi data. Penelitian ini membahas tentang bagaimana memisahkan informasi pengguna dengan data pada server yang berbeda, dengan SSO (Single Sign On) pengguna dapat melakukan sekali login untuk dapat mengakses server yang berbeda. Aplikasi web berbasis SSO menggunakan protokol OAuth 2.0 dapat memberi Authorization antara server data dan server pengguna, sehingga informasi pengguna tidak terduplikasi baik pada satu server maupun server lainnya.
Co-Authors -, Suraya Adina Sarmento Nunes Agradira Dwi Wahyuda Agus Suhardi Agus Suhardi, Agus Aldo Fiotama Josyaf Alfiandri - Amir Hamzah Andrianto - Andrianto . Andung Febi Prakoso Ardiansyah - Ariyana, Renna Yanwastika Arum Puspita Sari Asri Respti1 Azhar Munif Bima Gilang Pamukti Brilliani, Dhea Saintysta Catur Iswahyudi Catur Iswayudi Christina Anggreini Torar Cyrilla Indri Parwati Dadurrohman, Muhammad Iqbal Im Devi Iryanti Devi Iryanti, Devi Dian Anjarwati Dias Persada Dina Andayati Dina Mardiana Dody Pradana Edhy Sutanta (Jurusan Teknik Informatika IST AKPRIND Yogyakarta) Efendi, Endang Erma Susanti Evi Eltinah Fajar Febri Pratama Fikki Rian Irawan Galang Pratama Sukma Putra Hadi Prasetyo Suseno Haidar Ikram Ramadhan Haidar Ikram Ramadhan Hamdani . Harno Priyanto Indah Permata SarI Isa, Doddy Muhammad Isa, Doddy Muhammad Isworo Nugroho Jayanti, Laela Qodar Dwi Jefrianto Tafonao Joko Triyono Joko Triyono Joko Triyono Juewanto - Juliyanti, Nur Arifah Kartika Indayani Kurniawan, Widiharto Kusumaningsih, Rr. Yuliana Rachmawati Laksono Trisnantoro Lucio Almeida Da Costa Ludavikus Maturbongs Maria Ulfa Nofiani1 Mia Lusmiawati Muhammad Ardi Setiawan MUHAMMAD SHOLEH Muhammad Sholeh Muhammad Uwlinuha Muntaha Nega Naniek Widyastuti Niken Irawati Putri Nizar Izzuddin Yatim Fadlan Nizar Izzuddin Yatim Fadlan Nunes, Adina Sarmento Nurdiantoro Oktaviani Rahmita Putri Prita Haryani Pundha Kartika Putra, Galih Pradana Ramadhan, Renggana Surya Rifki Firdaus Kurniawan Rosalia Arum Kumalasanti Rosalina Elvideswita S. Sutysna Rr Yuliana Rachmawati Kusumaningsih RR. Yuliana Rachmawati Rr. Yuliana Rachmawati Rr. Yuliana Rachmawati Rr. Yuliana Rachmawati, Rr. Yuliana Rr.Yuliana Rachamawati, Rr.Yuliana Ryzka Rahmawati Sari, Indah Permata Sari1 Sholeh, Muhammad Siti Lestari Sukma Ageng Prihasmoro, Sukma Ageng Supariandi, Deddy Suraya Suraya - Suraya - Suraya - Suraya ., Suraya Suraya Suraya Suraya Suraya Suwanto Raharjo Taufik Ardiantoro Theresia Solot Diri Tri Romadhani Triyono Puji Pangestu Triyono, Joko Uning Lestari Uning Lestari Uning Lestari Utami, Annisaa Utomo, Hariyo Victor Motumona Waliadi, Julfikar Wibowo, Satrio Muslim Wirto Yoga Arjanggi Nofianto Yuliana Rachmawati