p-Index From 2021 - 2026
6.936
P-Index
This Author published in this journals
All Journal ComEngApp : Computer Engineering and Applications Journal Transmisi: Jurnal Ilmiah Teknik Elektro Jurnal Ilmiah Teknik Elektro Komputer dan Informatika (JITEKI) PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic Jurnal technoscientia Prosiding SNATIF Teknika: Jurnal Sains dan Teknologi Prosiding Semnastek Scientific Journal of Informatics Proceeding SENDI_U SMATIKA Jurnal Ampere JURNAL NASIONAL TEKNIK ELEKTRO PROtek : Jurnal Ilmiah Teknik Elektro ITEj (Information Technology Engineering Journals) JETT (Jurnal Elektro dan Telekomunikasi Terapan) JURNAL MEDIA INFORMATIKA BUDIDARMA VOLT : Jurnal Ilmiah Pendidikan Teknik Elektro Indonesian Journal of Artificial Intelligence and Data Mining INOVTEK Polbeng - Seri Informatika Jurnal Teknologi Sistem Informasi dan Aplikasi Jurnal RESISTOR (Rekayasa Sistem Komputer) Patria Artha Technological Journal EDUMATIC: Jurnal Pendidikan Informatika Jurnal Qua Teknika Jurnal Fokus Elektroda : Energi Listrik, Telekomunikasi, Komputer, Elektronika dan Kendali Building of Informatics, Technology and Science Jurnal Informatika dan Rekayasa Elektronik JURNAL TEKNOLOGI TECHNOSCIENTIA Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Jurnal Teknik Informatika (JUTIF) Fokus Elektroda: Energi Listrik, Telekomunikasi, Komputer, Elektronika dan Kendali) Jurnal Pendidikan dan Teknologi Indonesia Aptekmas : Jurnal Pengabdian Kepada Masyarakat Jurnal Ilmiah Teknik Elektro Jurnal Ecotipe (Electronic, Control, Telecommunication, Information, and Power Engineering) Emitor: Jurnal Teknik Elektro INOVTEK Polbeng - Seri Informatika Smatika Jurnal : STIKI Informatika Jurnal
Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : ITEj (Information Technology Engineering Journals)

Sharing SSH Threat Intelligence across Multiple Servers using WebSocket and Fail2Ban Tely, Aristo; Aryanti, Aryanti; Soim, Sopian
ITEJ (Information Technology Engineering Journals) Vol 10 No 2 (2025): December
Publisher : Pusat Teknologi Informasi dan Pangkalan Data IAIN Syekh Nurjati Cirebon

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24235/itej.v10i2.270

Abstract

This study presents a lightweight prototype designed to improve SSH brute-force defense by enabling collaborative IP blocking across multiple servers. The system integrates Fail2Ban with WebSocket to distribute banned IP addresses in real-time among trusted nodes eliminating the need for centralized infrastructure. The experiment was conducted on 3 virtual private servers (VPS), where one acted as the WebSocket server and the others as clients equipped with Fail2Ban. When an SSH brute-force attack is detected, the source IP is automatically shared across the network and blocked on all connected nodes. A qualitative observational approach was used to evaluate the system’s feasibility. Log data from the clients and server was analyzed to confirm the accuracy and consistency of IP synchronization. The results showed that banned IPs were propagated and enforced on all nodes within seconds of detection. These findings demonstrate the potential for decentralized, lightweight collaboration among SSH servers to enhance security without introducing complex infrastructure or external dependencies.
Performance Evaluation of Modulation and Power Allocation Effects on BER in NOMA with SIC over AWGN Channels Apriliani, Defina; Soim, Sopian; Sholihin, Sholihin
ITEJ (Information Technology Engineering Journals) Vol 11 No 1 (2026): In Progress
Publisher : Pusat Teknologi Informasi dan Pangkalan Data IAIN Syekh Nurjati Cirebon

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24235/itej.v11i1.257

Abstract

This study evaluates the performance of a Non-Orthogonal Multiple Access (NOMA) system implementing Successive Interference Cancellation (SIC) over Additive White Gaussian Noise (AWGN) channels, focusing on the effects of modulation schemes and power allocation on Bit Error Rate (BER). Three modulation schemes BPSK, QPSK, and 16QAM are studied in combination with different power allocation configurations (e.g., α = 0.1, 0.3) for two users in an OFDM-based NOMA downlink scenario. The signal superposition process is performed at the transmitter side, while SIC is applied at the receiver side to separate the user signals. The simulation results show that the BER performance is greatly affected by the modulation level and power allocation ratio. Lower-order modulations (such as BPSK and QPSK) provide better performance at low SNR, especially for users with poorer channel quality. On the other hand, improper power distribution can cause error propagation in the SIC process, degrading the demodulation accuracy. This study emphasizes the importance of selecting adaptive modulation schemes and power allocation strategies in NOMA system design. These findings provide important contributions to the development of future wireless communication systems, especially 5G and later generations, which demand high spectral efficiency and multi-user service reliability.
Implementation of Ethereum-Based Blockchain Technology for ADS-B Data Security and Validation Rabbaniansyah, Kgs Muhammad Farhan; Lindawati, Lindawati; Soim, Sopian
ITEJ (Information Technology Engineering Journals) Vol 11 No 1 (2026): In Progress
Publisher : Pusat Teknologi Informasi dan Pangkalan Data IAIN Syekh Nurjati Cirebon

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24235/itej.v11i1.271

Abstract

Automatic Dependent Surveillance–Broadcast (ADS-B) has significantly enhanced air traffic monitoring by enabling real-time broadcasting of aircraft positions and identifiers. However, its lack of cryptographic safeguards makes it inherently vulnerable to spoofing, replay, and tampering attacks. This study presents a blockchain-based ADS-B validation framework that leverages Ethereum smart contracts and MetaMask for secure, decentralized data authentication. The proposed system validates incoming flight messages by enforcing logical constraints on altitude changes, timestamp order, and geographic displacement using Solidity-coded rules. Each data transaction is subject to a dual-layer security model: automated detection by the smart contract and manual authorization via MetaMask. This ensures that even flagged anomalies cannot be committed without human approval, thus combining operational oversight with blockchain's immutability. The system was tested using flight data from the OpenSky Network, with 56 attack simulations performed across spoofing, replay, and tampering categories. The contract achieved a 92.9% detection rate, with all accepted anomalies intentionally approved to test forensic transparency. Ethereum’s transparent ledger preserved all transaction details, reinforcing its potential for regulatory compliance and incident investigation. The results affirm blockchain’s suitability in protecting aviation telemetry against unauthorized modifications. Future enhancements may include machine learning for anomaly detection, stricter timestamp controls, and integration with global aircraft registries to improve spoofing detection. This implementation bridges theoretical blockchain benefits with operational air traffic requirements.
Co-Authors Abu Hasan Ade Silvia Handayani Adewasti Adewasti Adewasti, Adewasti Agung, Muhammad Zakuan Ahmad Adriansyah Ahmad Jazuli Ahmad Taqwa Ali Nurdin Alpharisy, Kevin Farid Alqhaniyyu, Faris Amiza, Ibel Dwi Amperawan Amperawan Amperawan Amperawan, Amperawan Anisah, Masayu APRILIANI, DEFINA Aryanti Aryanti . Aryanti Aryanti Ciksadan, Ciksadan Damsi, Faisal Deta Mediana, Salwa Diraputra, M Yoga Azto Dody Novriansyah Fadhli, Mohammad Fahrudin, Gantar Fitra Faisal Damsi, Faisal Farhan, Novendra Fathria Nurul Fadillah Fatimatuzzahra Fatimatuzzahra Fistania Ade Putri Maharani Frenica, Agnes Garnis, Aishah Garnis, Aishah Gusni Amini Siagian Hafizh Ulwan Handayani, Kurnia Wati Pascitra Hj. Lindawati Humairoh, Sherina Husni, Nyayu Latifah Ihsan Mustaqiim Irawan Hadi Irawan Hadi Irma Salamah Irma Salamah Jami, Nurlita Joni, Bahri Joni, Bahri Junaidi Junaidi Junaidi Junaidi Junaidi, Junaidi Khairunnisa Khairunnisa L. Lindawati LINDAWATI Lindawati Lindawati Lindawati Lindawati Lindawati Lindawati M Yoga Azto Diraputra Maharani, Fistania Ade Putri Martinus Mujur Rose Mohammad Fadhli Mujur Rose Nabila, Puspita Aliya Nadiah Nadiah Nakiatun Niswah Nasron Nasron Nisa, Suci Lutfia Novianda, Nabila Rizqi Novianda, Nabila Rizqia Novriansyah, Dody Nurhajar Anugraha Nurul Fadhilah Oktariani Oktariani Oktariani, Oktariani Oktavia Manalu, Ria Pipit Wulandari Putri Andela Putri Vandalis, Yoke Annisa Putri, Alda Nabila Rabbaniansyah, Kgs Muhammad Farhan Raihanah, Adinda Ramadhan, Muhammad Fadli Rani Purnama Sari Repi, Intan Putri Ayu Agita Respati, Rayhan Dhafir Riona Alpeni Rivaldo Arviando Rizky, Putri Alifia Rodicky, Nadio Rose, Mujur Rumiasih Rumiasih Salsabila Dina Sari Sari, Rani Purnama Sarjana Sarjana Sarjana, Sarjana Savitri, Yulivia Rhadita Seliana, Imalda Septiani, Dinda Sholihin Sholihin Sholihin Sholihin Subianto, Cahyo Bayu Sudirman Yahya Suroso Suroso Suroso Suroso suzan zefi Tarnita Rizky Prihandhita Tely, Aristo Theresia Enim Agusdi Trisa Azahra Wulandari, Pipit Yanziah, Asma Zakuan Agung, Muhammad