Claim Missing Document
Check
Articles

Media Pembelajaran Interaktif Enkripsi Caesar Cipher, Vigenere Cipher, Dan Algoritma Rsa Wina Ayu Lestari; Rohmat Tulloh; Atik Novianti
eProceedings of Applied Science Vol 5, No 3 (2019): Desember 2019
Publisher : eProceedings of Applied Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstrak Salah satu contoh penyalahgunaan teknologi adalah pencurian data atau informasi oleh pihak yang tidak diizinkan. Maka dari itu, terciptalah metode enkripsi untuk melindungi informasi tesebut. Enkripsi dibagi menjadi beberapa metode diantaranya adalah Caesar Cipher, Vigenere Cipher, dan algoritma RSA. Pentingnya enkripsi harus diketahui oleh pengguna internet. Enkripsi memiliki perhitungan yang rumit sehingga tidak semua orang bisa memahaminya dengan baik termasuk bagi mahasiswa D3 Teknik Telekomunikasi di Universitas Telkom yang mengambil mata kuliah Keamanan Jaringan. Berdasarkan kuesioner yang telah disebarkan, sebanyak 80% responden kesulitan untuk mempelajari metode Caesar Cipher, Vigenere Cipher, dan algoritma RSA yang berkaitan dengan kelengkapan materi, sumber materi hingga teknik penjelasannya. Maka pada Proyek Akhir ini dibuat media pembelajaran interaktif mengenai algoritma Caesar Cipher, Vigenere Cipher dan RSA menggunakan software Adobe Flash Professional CS6 dan MATLAB R2017a. Didalamnya memuat materi, video penjelasan, beberapa latihan soal hingga aplikasi konverter. Hasil dibuatnya media pembelajaran ini adalah meningkatkan pemahaman pada setiap pelajar serta meningkatkan motivasi dan keinginan belajar pada materi enkripsi khususnya algoritma Caesar Cipher, Vigenere Cipher dan RSA. Media pembelajaran yang telah dibuat dari hasil pengujian yang dilakukan menunjukan pada pengujian fungsionalitas dimana semua fungsi berjalan 100% sebagaimana mestinya. Berdasarkan kuisioner, tampilan dari media pembelajaran mendapatkan nilai rata-rata sebesar 4.36 dari skala 1-5 yang artinya tampilan pada media pembelajaran tergolong baik. kata kunci : media pembelajaran interaktif, Caesar Cipher, Vigenere Cipher, Algoritma RSA, MATLAB R2017a. Abstract One example of misuse of technology is theft of data or information by unauthorized parties. Therefore, it creates an encryption method to protect the information. Encryption is divided into several methods including Caesar Cipher, Vigenere Cipher, and RSA algorithm. The importance of encryption must be known by internet users. Encryption has complex calculations so that not everyone can understand it well, including for D3 Telecommunications Engineering students at Telkom University who take Network Security courses. Based on the questionnaire that was distributed, as many as 80% of respondents had difficulty learning the Caesar Cipher method, Vigenere Cipher, and RSA algorithm related to the completeness of the material, the source of the material to the explanation technique. So in this Final Project an interactive learning media was created regarding the Caesar Cipher, Vigenere Cipher and RSA algorithm using Adobe Flash Professional CS6 and MATLAB R2017a software. It contains material, explanatory videos, some practice questions to the converter application. The result of this learning media is to increase the understanding of each student as well as increase motivation and desire to learn on encryption materials, especially the Caesar Cipher algorithm, Vigenere Cipher and RSA. Learning media that have been made from the results of tests carried out show the functionality testing where all functions run 100% as they should. Based on the questionnaire, the display of the learning media got an average value of 4.36 from a scale of 1-5, which means the display on the learning media was good. keywords: interactive learning media, Caesar Cipher, Vigenere Cipher, RSA Algorithm, MATLAB
Diversifikasi produk Bakso Empal Genton dan Pemanfaatan E-Commerce untuk Meningkatkan Daya Saing Usaha Kecil dan Menengah di Tengah Pandemi Covid 19 Rohmat Tulloh; Atik Novianti; Dendi Gusnadi
J-ABDIPAMAS (Jurnal Pengabdian Kepada Masyarakat) Vol 7, No 1 (2023): April 2023
Publisher : IKIP PGRI Bojonegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30734/j-abdipamas.v7i1.2470

Abstract

UMKM Sakinah, Cimahi City, West Java, as a partner in community service activities, is engaged in snack and preserved food products. However, there are two main problems faced. First, currently UMKM do not have superior products that can help increase sales turnover again. Second, the distribution of products affected by the COVID-19 pandemic. The marketing area for UMKM Sakinah's products is currently still around Bandung Raya, where sales are made directly and leave goods in other business places, such as cake shops or minimarkets. In the conditions of the COVID-19 pandemic, where many tourist attractions, schools, offices and shops were closed causing sales to drop drastically. The solution to overcome this problem is to diversify the products produced by UMKM by providing training on making new research products in the form of instant Bakso Empal Gentong (Baktong) until they are ready to be marketed. The second is product marketing through e-commerce methods in the form of website creation and the use of online marketplaces to expand the market. This community service activity has been able to produce a new superior product that has passed the laboratory test process, market test and is proven to be able to increase sales turnover in the short term. The use of e-commerce has proven to be able to expand the market for UMKM Sakinah products. UMKM Sakinah Kota Cimahi Jawa Barat sebagai mitra kegiatan pengabdian masyarakat bergerak di bidang produk makanan ringan dan awetan. Namun ada dua permasalahan utama yang dihadapi. Pertama, saat ini UMKM belum memiliki produk unggulan yang dapat membantu meningkatkan kembali omset penjualan. Kedua, pendistribusian produk terdampak pandemi COVID 19. Area pemasaran produk UMKM Sakinah saat ini masih di sekitar Bandung Raya, di mana penjualan dilakukan secara langsung dan menitipkan barang di tempat usaha lainnya misalkan toko kue atau minimarket. Pada kondisi pandemi COVID 19, di mana banyak tempat wisata, sekolah, kantor dan toko yang tutup menyebabkan penjualan menurun drastis. Solusi untuk mengatasi permasalahan tersebut dengan melakukan diversifikasi produk yang dihasilkan oleh UMKM dengan cara memberikan pelatihan pembuatan produk baru hasil penelitian berupa Bakso Empal Gentong (Baktong) instan hingga siap untuk dipasarkan. Kedua adalah pemasaran produk melalui metode e-commerce berupa pembuatan website dan pemanfaatan online marketplace untuk memperluas pasar. Kegiatan pengabdian masyarakat ini sudah dapat menghasilkan satu produk unggulan baru yang sudah melewati proses uji laboratorium, uji pasar dan terbukti mampu meningkatkan omset penjualan dalam jangka pendek. Pemanfaatan e-commerce terbukti mampu memperluas pasar produk-produk UMKM Sakinah.
Prototipe Robot Kapal Pengukur Tingkat PH dan Turbiditas Air Berbasis Metode Modified Fuzzy Firman Al Rahmat; Unang Sunarya; Rohmat Tulloh
Jurnal Rekayasa Elektrika Vol 14, No 1 (2018)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1277.034 KB) | DOI: 10.17529/jre.v14i1.9771

Abstract

The quality of lake or pond water is usually determined through testing of several water samples in the laboratory. This certainly takes time especially when the place of measurement is wide enough. This research designed a water quality gauge control based on the Modified Fuzzy method and equipped with pH sensors and turbidity sensors to measure the potential of Hydrogen (pH) and turbidity of water. The Graphical User Interface (GUI) on a laptop was used to control the ship manually and display the measurement results. Wireless control through Bluetooth communication was used to set up the two DC motor as the driving force of the ship. The modified Fuzzy method was used to divide water quality into 3 categories that are good, not good, and poor. The test results proved that every command on the GUI can be run by the ship and the measurement results can be displayed directly to the user. The maximum distance measurement using Bluetooth was 28 meters. The pH sensors and turbidity sensors were able to measure at any specified location point. The pH value of lake water was measured at each point varies from 6.5 to 8, while the measured turbidity values ranged from 5 NTU (Nephelometric Turbidity Unit) to 49 NTU.
Analisis Konsumsi Bandwidth pada Komunikasi Address Resolution Protocol dalam Jaringan I Gede Agus Surya Negara; Arifiana Satya Nastiti; Ridha Muldina Negara; Rohmat Tulloh
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 5 No 4: November 2016
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1026.299 KB)

Abstract

Telecommunication grows rapidly as the need of good quality network service increases. This is also followed by the increasing number of customers, and consequently the increasing number of connected devices in the communication and data networks. Each device in a network can recognize and communicate with each other using ARP MAC address translation mechanism which will consume a certain amount of network bandwidth, thus, will affect the quality of network services. This research analyze the consumption of network bandwidth due to MAC address translation mechanism against the number of devices connected to the network, using Spirent Test Center as the ARP traffic generator in the network. The result shows that bandwidth consumption increases as the number of connected devices increases. When the number reaches 20000 or more, bandwidth consumption increases significantly.
Simulasi Virtual Local Area Network (VLAN) Berbasis Software Defined Network (SDN) Menggunakan POX Controller Rohmat Tulloh; Ridha Muldina Negara; Arif Nur Hidayat
JURNAL INFOTEL Vol 7 No 2 (2015): November 2015
Publisher : LPPM INSTITUT TEKNOLOGI TELKOM PURWOKERTO

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20895/infotel.v7i2.40

Abstract

VLAN (Virtual LAN) merupakan sebuah teknologi yang dapat mengkonfigurasi jaringan logis independen dari struktur jaringan fisik. Hasil dari penelitian sebelumnya sudah diprediksi bahwa dibutuhkan Virtual Network yang akhirnya terciptalah VLAN. Namun paradigma jaringan saat ini tidak flexible, ketergantungan terhadap vendor sangat besar karena fungsi data plane dan control plane berada dalam satu paket device. SDN (Software defined network) yang merupakan salahsatu evolusi teknologi jaringan sesuai dengan tuntutan yang berkembang dimana memisahkan fungsi data plane dan control plane pada suatu perangkat. POX Controller digunakan untuk men-simulasikan dan menguji Platform SDN (Software defined network). Pada penelitian ini menggunakan Openflow versi 1.0 untuk memasang header VLAN sehingga penelitian ini difokuskan untuk mengevaluasi performa forwarding VLAN yang memanfaatkan Openflow sebagai control plane dapat berfungsi dengan baik. Hasil penelitian ini mengusulkan penerapan karakteristik teknologi VLAN pada SDN karena telah berjalan dengan benar sesuai hasil pengujian konektifitas, verifikasi dan keamanan. Kemudian hasil pengujian lanjutan untuk melihat pengaruh SDN dengan skenario penambahan jumlah VLAN ID didapatkan bahwa set-up time akan bertambah seiring meningkatnya jumlah host dan dengan menggunakan protokol OpenFlow, latency yang terjadi di jaringan dapat dipantau dengan parameter round trip time (RTT) yang stabil direntang 0,2 sampai 6 second walaupun jumlah vlan_id dan background traffic bertambah.
Analisis Simulasi Penerapan Algoritma OSPF Menggunakan RouteFlow pada Jaringan Software Defined Network (SDN) Ridha Muldina Negara; Rohmat Tulloh
JURNAL INFOTEL Vol 9 No 1 (2017): February 2017
Publisher : LPPM INSTITUT TEKNOLOGI TELKOM PURWOKERTO

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20895/infotel.v9i1.172

Abstract

Pada jaringan konvensional, konfigurasi protocol routing sangat tidak fleksibel, tidak efisien dan konfigurasi dilakukan pada tiap perangkat. Hal ini tentu saja tidak dapat memenuhi tuntutan operasional saat ini yang rata-rata memiliki jaringan yang besar dan perangkat jaringan yang memiliki spesifikasi berbeda. Software Defined Network (SDN) muncul sebagai harapan untuk permasalahan kompleksitas jaringan konvensional. Paradigma baru SDN melakukan pemisahan antara control plane dan forwarding plane. RouteFlow merupakan salah satu komponen berbasis software yang dapat mengaplikasikan protocol routing konvensional pada jaringan SDN. Open Shortest Path First (OSPF) merupakan sebuah protokol routing konvensional yang memiliki kemampuan untuk mendeteksi perubahan topologi jaringan dengan cepat dalam sebuah jaringan yang besar. Protokol routing OSPF diterapkan pada teknologi SDN menggunakan RouteFlow dengan tujuan untuk mempermudah dalam mengontrol jaringan dengan sistem terpusat. Convergence time dan parameter Quality of Service (Throughput, Delay, Jitter dan Packet Loss) diukur dengan skenario pemutusan link, penambahan jumlah switch dan background traffic. Hasil pengukuran convergence time menunjukan bahwa penambahan jumlah switch mempengaruhi pertambahan waktu konvergensi, sedangkan untuk parameter Quality of Service (QoS) pada peningkatan topologi switch didapatkan hasil yang masih sesuai dengan standar ITU-T G.1010 namun apabila ditambahkan background traffic yang memenuhi 50% bandwidth jaringan maka QoS memburuk.
Analisis Performansi VLAN Pada Jaringan Software Defined Network (SDN) Rohmat Tulloh
JURNAL INFOTEL Vol 9 No 4 (2017): November 2017
Publisher : LPPM INSTITUT TEKNOLOGI TELKOM PURWOKERTO

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20895/infotel.v9i4.319

Abstract

Software defined network (SDN) adalah sebuah paradigma baru dalam dunia jaringan yang mampu memusatkan fungsi beberapa control plane pada layer 2 maupun di layer 3 secara terprogram, hal tersebut menyebabkan jaringan akan bersifat lebih fleksibel dan terskala. Dengan jumlah pertumbuhan pengguna internet yang semakin tinggi maka hal tersebut akan berbanding lurus terhadap kompleksitas dari jaringan internet itu sendiri. Sehingga paradigma SDN ini menjadi salah satu solusi yang muncul. Penerapan Virtual Local Area Network (VLAN) pada jaringan tradisional telah menjadi hal yang penting dan banyak diterapkan. Fungsi VLAN adalah untuk membatasi broadcast trafik dari suatu host, sehingga hanya dapat mengirim data kepada VLAN ID yang sama. Penelitian ini menganalisis performansi VLAN di jaringan SDN. Terjadi penurunan angka jumlah paket yang dapat terkirim (data transfer) dan nilai throughput pada sebuah VLAN ID karena terdapat pengaruh dari VLAN ID yang berbeda. Pada pengujian membandingkan VLAN dengan non VLAN over Netwok Functions Virtualization (NFV) didapatkan bahwa nilai data transfer dan throughput yang diperoleh pada VLAN lebih besar. Hasil analisis dari seluruh pengujian penambahan traffic terlihat bahwa kinerja VLAN pada SDN akan membebani kinerja jaringan pada VLAN yang berbeda
Implementasi Web Application Firewall untuk Melindungi Aplikasi Web dari Serangan Malware Muhamad Fahrizal Rizqi; Rohmat Tulloh; Nazel Djibran
Jurnal Informatika Universitas Pamulang Vol 8, No 2 (2023): JURNAL INFORMATIKA UNIVERSITAS PAMULANG
Publisher : Teknik Informatika Universitas Pamulang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32493/informatika.v8i2.33691

Abstract

At this time Internet services have become a necessity no longer to provide information services, but have become important so there are many cases of websites being hacked by attackers, for that network security is very important to avoid theft of important data Security in a web application is a important aspect to have. Securing a web application can be done by installing a firewall that is connected directly to the server network. Security for a web application usually uses a web application firewall installed on a web server. To overcome a security problem in Web Applications and minimize losses caused by SQL Injection and XSS attacks, we need a way to overcome these attacks. Several security measures have been used, such as the use of fortiweb to set the traffic destination for a web application. In this study, we will use a Web Application Firewall (WAF) device. Because it can protect Web applications from existing malware attacks and zero day malware. This final project will implement a Web Application Firewall (WAF). By way of device configuration and will use DVWA for malware testing. The technology that will be used to monitor malware logs will use VMware. From the results of testing a web application firewall, it is hoped that it can implement and prevent various malware attacks that attack web applications and can monitor the logs of an attacking malware.
Implementasi Perangkat Next Generation Firewall untuk Melindungi Aplikasi dari Serangan Malware Herika Andini Putri; Rohmat Tulloh; Nazel Djibran
Jurnal Informatika Universitas Pamulang Vol 8, No 2 (2023): JURNAL INFORMATIKA UNIVERSITAS PAMULANG
Publisher : Teknik Informatika Universitas Pamulang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32493/informatika.v8i2.33656

Abstract

Based on the rapid development of technology, which has positive and negative impacts, one of the negative impacts is data leakage, called cybercrime. This is very dangerous and causes huge losses. In addition, the most commonly found cybercrimes are malware threats, phishing, DDoS, and others. In this study, the implementation of the Paloalto firewall is carried out by configuring the firewall, as is the attack testing stage using malware such as Eicar, ransomware, Trojans, Dos, and web filtering. The results of this test aim to prevent the risk of data loss, material loss, and the paralysis of public services. And to be efficient and effective in scanning for a variety of attacks without affecting network performance. The implications of the results found are expected to solve the problem at hand perfectly. NGFW performs prevention by blocking access to malware that enters its network traffic. This research also implements NGFW, where firewall configuration is carried out, namely by creating a rule policy on the firewall. In this study, an evaluation of network performance was carried out after the implementation of NGFW and firewall configuration. The results show that the use of NGFW and rule policies on firewalls can improve network security efficiently and effectively. It is hoped that these results can overcome the paralysis of public services due to malware attacks and improve network performance.
Implementasi Anti-DDOS Menggunakan Intrusion Prevention System (IPS) terhadap Serangan DDOS Kevin Jorenta Surbakti; Rohmat Tulloh; Muhammad Nazel Djibran
Jurnal Informatika Universitas Pamulang Vol 8, No 2 (2023): JURNAL INFORMATIKA UNIVERSITAS PAMULANG
Publisher : Teknik Informatika Universitas Pamulang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32493/informatika.v8i2.33685

Abstract

Distributed Denial of Service (DDoS) is a type of attack that can exhaust server resources. This attack results in a decrease in server quality so that it cannot be accessed by authorized users. Servers that are commonly victimized by this attack belong to companies from various sectors. PT Datacomm Diangraha provides solutions to these problems. As PT Datacomm Diangraha will do to Company X, which is to implement an Intrusion Prevention System (IPS) device as Anti-DDoS on its customers according to the customer's needs. This paper will test IPS devices in preventing DDoS attacks such as TCP Flood, UDP Flood, and ICMP Flood. The test is conducted by connecting the attacker and victim to the IPS device in the local network. The analysis will be done by comparing the network traffic and throughput of the victim when the attack is carried out when protected by IPS, no protection, and when traffic is normal. Experiments were conducted by performing a one-minute attack. The results of the experiments show that the traffic when protected by an IPS is similar to that during normal traffic. In addition, tests were conducted to prevent XSS malware to prove that IPS can prevent other attacks besides DDoS. From the test results, it was found that IPS can prevent DDoS attacks with 100% accuracy. The throughput data obtained when a DDoS attack occurs without IPS protection is 260978.9 - 1080732.32 bps. Throughput data when a DDoS attack occurs with IPS protection of 42.55 - 49.95 bps, which shows similarity in value with throughput during normal traffic which is 43.43 bps.