Claim Missing Document
Check
Articles

Found 7 Documents
Search

Software Security Hardening Pada Virtual Private Server Berdasarkan NIST SP 800-123 di Universitas XYZ Faishal Rizqi Irfandi; Umar Yunan Kurnia Septo Hedianto; Ahmad Almaarif
Journal of Information System Research (JOSH) Vol 4 No 1 (2022): October 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (450.574 KB) | DOI: 10.47065/josh.v4i1.2299

Abstract

The current level of technological development is very rapid. The most prominent example is the use of websites in industry and government environments. The website provides convenience in supporting ongoing business processes and can assist work in solving problems that occur in an organization. In using the website, of course, a server is needed to process data requests or provide information to users. The XYZ Faculty at XYZ University has a virtualxyz server which contains a website that is used to support academic and administrative activities. However, the development of technology will of course be accompanied by the development of vulnerabilities or attacks against these applications. Therefore, on the virtualxyz server, it is necessary to carry out a Security Hardening process based on the National Institute of Standards and Technology (NIST) Special Publication 800-123. This is done because the virtualxyz server has never done a security check based on certain standards on the server software. The purpose of this research is to analyze the security of the virtualxyz software server to minimize attacks that occur. The results of this study can be used as a reference to strengthen the security of the server software on the virtualxyz server. The results obtained from the analysis on the server software based on NIST SP 800-123 found 6 procedures that have not been implemented on the virtualxyz server.
Analisis Vulnerability Management Pada Container Docker Menggunakan Opensource Scanner Berdasarkan Standar Cyber Resilience Review (CRR) Milenia Oktaviana; Adityas Widjajarto; Ahmad Almaarif
Jurnal Sistem Komputer dan Informatika (JSON) Vol 4, No 1 (2022): September 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v4i1.4787

Abstract

One of the most widely used container technologies to provide IT services is Docker. The vulnerability in container technology, namely Docker, requires special management. Management of this vulnerability can be done technically with a software vulnerability scanner and standard Cyber Resilience Review (CRR) guidelines. Experiments were carried out with Aquasec and Anchore scanners that performed vulnerability scanning on two Docker Images systems. The two vulnerable systems have different versions, namely version – 1 and version – 2. The software elements in version – 2 have a higher versioning level than version – 1. Experimental data in the form of vulnerability reports are analyzed based on Cyber Resilience Review (CRR) which focuses on four stages namely Define a Strategy, Develop a Plan, Implement the Capability, Assess and Improve the Capability. So that the results of Category Vulnerability are obtained, namely 30 Closed Vulnerability, 10 Open Vulnerability, and 13 Newly Vulnerability. Continuation of this research can use aspects of Patch Management with more varied software tools.
Vulnerability Management Pada Vulnerable Docker Menggunakan Clair Scanner Dan Joomscan Berdasarkan Standar GSA CIO-IT Security-17-80 Ryan Supriadi Ramadhan; Adityas Widjajarto; Ahmad Almaarif
Jurnal Sistem Komputer dan Informatika (JSON) Vol 4, No 1 (2022): September 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v4i1.4789

Abstract

Vulnerabilities in Docker need to be managed considering that this vulnerability is one of the potentials for exploitation, this can happen because Docker is a container related to application and system security. This study analyzes the vulnerability management process in Docker Images and Docker Images Applications using the GSA CIO-IT Security-17-80 standard. This vulnerability search uses two scanning tools, namely Clair Scanner and JoomScan. Vulnerabilities in Docker Images and Docker Images application version - 1, were overcome by creating a new system, namely version - 2 which upgrades the Docker Images software and Docker Images application. The test scenario is run by scanning for vulnerabilities in two versions of the trial system, in the form of a vulnerability report. The data was analyzed using the GSA CIO-IT Security Standard-17-80 which was limited to the stages of Scanning Capabilities, Vulnerability Scanning Process, Vulnerability Scan Reports, Remediation Verification, and Re-Classification of Known Vulnerabilities. The result is the fastest scanning time is in version - 2, the results of the comparison of vulnerabilities obtained are 44.45% on Docker Images and 77.78% on Joomla. So that the contribution that can be given is to provide an overview of the use of the GSA CIO-IT Security-17-80 standard as a guide for managing the security of an IT asset based on the stages carried out. Continuation of research can be in the form of using the 6 stages of GSA with the support of adequate vulnerability data from the right scanner software.
Analisis Karakteristik Antivirus Berdasarkan Aktivitas Malware menggunakan Analisis Dinamis Ma'arij Haritsah; Adityas Widjajarto; Ahmad Almaarif
Journal of Information System Research (JOSH) Vol 4 No 2 (2023): January 2023
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/josh.v4i2.2908

Abstract

Malware, short for “Malicious Software”, is a program specifically designed to perform an activity that can harm software on a victim's device. Examples of commonly found malware include trojans, ransomware and downloaders. It is important for computer users to recognize and avoid malware when using computer devices. Therefore, computer users can overcome malware attacks by using protection software specifically for computer devices using Antivirus software designed to prevent, find, detect, and remove the types of malware that have been mentioned previously. In this study, the dynamic analysis method is used to determine malware activity by running it and monitoring the activity that occurs. This method is usually used to identify the actions that malware performs when it runs. The results showed that the higher the number of malware activities, the higher the metrics tested on the antivirus, such as CPU, memory, disk, and scan time. Regarding the removable drive protection feature, Avast antivirus is relatively more efficient compared to other antiviruses because it has an average CPU usage, low memory, a fairly high detection rate, and fast scan times. Kaspersky Antivirus is relatively the most effective in detecting malware samples with the highest detection rate of 100%. Meanwhile, the Windows Defender antivirus is relatively the weakest in terms of detection rate because it has the lowest detection rate.
Analisis Malware Pada Sistem Operasi Android Menggunakan Metode Network Traffic Analysis Achmad Farhan Febrianto; Avon Budiyono; Ahmad Almaarif
eProceedings of Engineering Vol 6, No 2 (2019): Agustus 2019
Publisher : eProceedings of Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstrak Malware bisa disebut juga malicious software merupakan perangkat lunak yang diciptakan untuk menyusup atau merusak sistem komputer dan juga dapat mempengaruhi network traffic. Dengan meningkatnya penyebaran malware pada sistem operasi android saat ini. Untuk itu dilakukanya malware analysis pada android, Malware analysis pada sistem operasi android ini ada dua cara yaitu Static Analysis dan Dynamic Analysis. Static analysis dilakukan tanpa menjalankan malware tersebut dan hanya melihat segmen code pada aplikasi. Dynamic Analysis mengeksekusi program dan mengamati hasilnya Metode statik yang digunakan pada penelitian ini adalah reverse engineering. Reverse engineering digunakan untuk ekstraksi aplikasi kedalam source code, data tersebut akan dihasilkan informasi bahwa malware tersebut mengakses jaringan, Kemudian metode selanjutnya untuk mendekteksi malware-nya adalah network traffic analysis. Kelebihan network traffic analysis ini yaitu dapat mengetahui malware yang terhubung langsung dengan website dan dengan analisis ini juga dapat mengetahui aktivitas malware terhadap network traffic dari melihat bandwitdh, time since request dan payload yang dimiliki malware. Dari hasil analisis, informasi yang didapat adalah malicious activity yang mempengaruhi network traffic. Kata kunci : malware, malware analysis, static analysis, dynamic analysis, network traffic analysis Abstract Malware can also be called malicious software which is software that is created to infiltrate or damage computer systems and can also affect network traffic. With the increasing spread of malware on the current Android operating system. For this reason, malware analysis is done on android, Malware analysis on the Android operating system has two ways, namely Static Analysis and Dynamic Analysis. Static analysis is done without running the malware and only looks at the segment code in the application. Dynamic Analysis executes the program and observes the results Static method used in this study is reverse engineering. Reverse engineering is used for extracting applications into the source code, the data will be generated information that the malware is accessing the network, then the next method to detect malware is network traffic analysis. The advantage of this network traffic analysis is that it can find out malware that is directly connected to the website and with this analysis can also find out malware activity against network traffic from seeing bandwidth, time since request and payload owned by malware. From the results of the analysis, the information obtained is a malicious activity that affects network traffic. Keywords: malware, malware analysis, static analysis, dynamic analysis, network traffic analysis
Analisis Dan Perancangan Cooling Management Data Center Berdasarkan Standar Tia-942 Menggunakan Ppdioo Life-cycle Approach Di Pemerintahan Kabupaten Bandung Barat Yoga Sakti Pratama; Avon Budiono; Ahmad Almaarif
eProceedings of Engineering Vol 7, No 2 (2020): Agustus 2020
Publisher : eProceedings of Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstrak Pemerintah Kabupaten Bandung Barat adalah salah satu instansi pemerintahan di bawah pemerintah Provinsi Jawa Barat yang mempunyai tugas melayani urusan administrasi masyarakat di wilayah Kabupaten Bandung Barat. Saat ini Pemerintah Kabupaten Bandung Barat mempunyai data center yang dikelola oleh Dinas Komunikasi, Informatika dan Statistika (Diskominfo) yang berfungsi sebagai sistem pengolahan data mulai dari pengumpulan, penyimpanan hingga pengelolaan data. Saat ini data center yang ada pada Pemerintah Kabupaten Bandung Barat khususnya Cooling Management masih dalam tahap pengembangan, perangkat yang digunakan untuk mengelola data center masih sangat minim dan tidak memiliki standar. Dibutuhkan rancangan untuk mengelola Cooling Management data center berdasarkan Standar TIA-942. Rancangan ini menggunakan pendekatan PPDIOO Life-Cycle Approach pada tiga tahapan awal, yaitu prepare, plan, design. Penggunaan metode ini cocok dengan pengembangan data center Pemerintah Kabupaten Bandung Barat karena terdapat tahap optimize dan memiliki fase yang berkepanjangan. Tujuan dari penelitian ini adalah menghasilkan rancangan desain Cooling Management Data Center Pemerintah Kabupaten Bandung Barat yang sesuai dengan standar TIA-942. Hasil akhir dari penelitian ini berupa perancangan sistem pendingin usulan untuk data center Pemerintah Kabupaten Bandung Barat. Kata kunci : Data Center, Pemerintah Kabupaten Bandung Barat, PPDIOO Life-Cycle Approach, Cooling Management, Standard TIA-942. . Abstract West Bandung District Government is one of the government agencies under the government of West Java Province which has the task of serving the affairs of community administration in the area of West Bandung District. Currently West Bandung District Government has a data center that is managed by the Office of Communication, Information and Statistics (Diskominfo) which functions as a data processing system from collection, storage to data management. Currently the existing data center in West Bandung District Government, especially Cooling Management is still in the development stage, the tools used to manage the data center are still very minimal and do not have standards. A design is needed to manage the Cooling Management data center based on TIA-942 Standards. This design uses the PPDIOO Life-Cycle Approach in three initial stages, namely prepare, plan, design. The use of this method is suitable with the development of West Bandung District Government data center because there is an optimization stage and has a prolonged phase. The purpose of this study was to produce a design of the Cooling Management Data Center of West Bandung District Government in accordance with TIA-942 standards. The final result of this research is in the form of a proposed cooling system design for West Bandung District Government data center. Keywords: Data Center, West Bandung District Government, PPDIOO Life-Cycle Approach, Cooling Management, Standard TIA-942.
Analysis of Malware Impact on Network Traffic using Behavior-based Detection Technique Adib Fakhri Muhtadi; Ahmad Almaarif
International Journal of Advances in Data and Information Systems Vol. 1 No. 1 (2020): April 2020 - International Journal of Advances in Data and Information Systems
Publisher : Indonesian Scientific Journal

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25008/ijadis.v1i1.14

Abstract

Malware is a software or computer program that is used to carry out malicious activity. Malware is made with the aim of harming user’s device because it can change user’s data, use up bandwidth and other resources without user's permission. Some research has been done before to identify the type of malware and its effects. But previous research only focused on grouping the types of malware that attack via network traffic. This research analyzes the impact of malware on network traffic using behavior-based detection techniques. This technique analyzes malware by running malware samples into an environment and monitoring the activities caused by malware samples. To obtain accurate results, the analysis is carried out by retrieving API call network information and network traffic activities. From the analysis of the malware API call network, information is generated about the order of the API call network used by malware. Using the network traffic, obtained malware activities by analyzing the behavior of network traffic malware, payload, and throughput of infected traffic. Furthermore, the results of the API call network sequence used by malware and the results of network traffic analysis, are analyzed so that the impact of malware on network traffic can be determined.