Claim Missing Document
Check
Articles

Analisis Serangan Web Defacement pada Situs Web Pemerintah Menggunakan ELK Stack Dedy Hariyadi
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 4 No. 1 (2019): Mei 2019
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (353.988 KB) | DOI: 10.14421/jiska.2019.41-01

Abstract

Web defacement merupakan serangan yang dikategorikan sebagai serangan siber yang berpotensi. Dampak dari serangan web defacement adalah proses pengembalian ke kondisi semula yang memerlukan mitigasi khusus. Pemantauan serangan web defacement dapat dilakukan dari dua sisi, yaitu sisi internal dan eksternal. Pada penelitian ini pemantauan dan analisis serangan web defacement dari sisi eksternal. Oleh sebab itu diperlukan aplikasi khusus untuk mendapatkan informasi dari OSINT Source penyedia informasi serangan web defacement yang merupakan hasil laporan dari peretas. Informasi yang didapatkan selanjutnya diolah menggunakan ELK Stack untuk mempermudah analisis dalam bentuk visualisasi pada Dashboard.Web defacement merupakan serangan yang dikategorikan sebagai serangan siber yang berpotensi. Dampak dari serangan web defacement adalah proses pengembalian ke kondisi semula yang memerlukan mitigasi khusus. Pemantauan serangan web defacement dapat dilakukan dari dua sisi, yaitu sisi internal dan eksternal. Pada penelitian ini pemantauan dan analisis serangan web defacement dari sisi eksternal. Oleh sebab itu diperlukan aplikasi khusus untuk mendapatkan informasi dari OSINT Source penyedia informasi serangan web defacement yang merupakan hasil laporan dari peretas. Informasi yang didapatkan selanjutnya diolah menggunakan ELK Stack untuk mempermudah analisis dalam bentuk visualisasi pada Dashboard.
BIZNET QUERY LANGUAGE PADA INFRASTRUCTURE AS CODE Eka Tresna Irawan; Dondy Bappedyanto; Dedy Hariyadi; Azzam Syawqi Aziz
Jurnal Teknomatika Vol 11 No 1 (2018): TEKNOMATIKA
Publisher : Fakultas Teknik dan Teknologi Informasi, Universitas Jenderal Achmad Yani Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Infrastructure as Code berdasarkan TOSCA yang dimplementasikan pada perusahaan penyedian layanan komputasi awan (Amazon Web Services, Azure, Google Cloud Platform, Alibaba Cloud) menggunakan format data JSON atau YAML. Format data JSON dan YAML hanya mendukung proses CREATE dan UPDATE dalam pengelolaan sumber daya infrastruktur komputasi awan. Proses CREATE dan UPDATE dirasa masih kurang mendukung manajemen sumber daya infrastruktur komputasi awan. Pada penelitian ini diusulkan penyempurnaan proses CREATE, READ, UPDATE dan DELETE pada Infrastructure as Code. Jadi pada Infrastructure as Code tidak hanya mendukung Markup Language namun juga mendukung Query Language untuk mengelola sumber daya infrastruktur komputasi awan.
ANALISIS KONTEN DUGAAN TINDAK KEJAHATAN DENGAN BARANG BUKTI DIGITAL BLACKBERRY MESSENGER Dedy Hariyadi; Wing Wahyu Winarno; Ahmad Luthfi
Jurnal Teknomatika Vol 9 No 1 (2016): TEKNOMATIKA
Publisher : Fakultas Teknik dan Teknologi Informasi, Universitas Jenderal Achmad Yani Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Barang bukti ponsel yang ditangani Pusat Laboratorium Forensik Kepolisian Republik Indonesia linier dengan pertumbuhan ponsel cerdas secara global. Hal ini menggambarkan tindak kejahatan menggunakan perangkat digital semakin banyak. Dalam penelitian ini mencoba melakukan analisis terhadap barang bukti digital berupa ponsel yang fokus pada percakapan antara pemilik ponsel dengan rekan-rekannya. Tidak hanya jumlah kontak dan komunikasi yang dianalisis namun percakapan teks menjadi petunjuk penting dalam analisis tindak kejahatan. Hasil analisis teks percakapan dengan visualisasi wordcloud diharapkan dapat dijadikan petunjuk pihak Kepolisian dalam menentukan keterkaitan pihak lain dalam dugaan tindak kejahatan yang memanfaatkan ponsel.
IMPLEMENTASI PI-HOLE UNTUK MEMBANGUN SISTEM PERTAHANAN JARINGAN DARI SERANGAN MALVERTISING Nindya Dwi Anggana; Dedi Hariyadi; Rama Sahtyawan; Alfun Roehatul Jannah
Jurnal Teknomatika Vol 15 No 1 (2022): TEKNOMATIKA
Publisher : Fakultas Teknik dan Teknologi Informasi, Universitas Jenderal Achmad Yani Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30989/teknomatika.v15i1.1104

Abstract

The Internet has revolutionized human activities in the digital era, providing new avenues for innovation and connectivity. Online advertising, a significant aspect of this digital landscape, enables advertisers to reach diverse audiences. However, this convenience has also attracted cybercriminals who exploit online advertisements to deploy malicious ads, commonly known as malvertising. This study focuses on implementing Pi-Hole, a network defense system, to combat web-based malvertising attacks and reduce associated risks. Utilizing a Raspberry Pi 3 model B+ device, the Pi-Hole system is deployed within the DMZ network at FTTI Universitas Jenderal Achmad Yani Yogyakarta. By capturing query logs, Pi-Hole effectively blocks malicious ads by employing an adlist. The research was conducted over a 14-day period, from July 26 to August 8, 2022. The results demonstrate the efficacy of the Pi-Hole defense system, with a remarkable 22.7% of the total captured queries, amounting to 895,077 queries, being successfully blocked. Additionally, testing from the client's perspective confirmed the system's ability to prevent ads from appearing on websites and mobile applications. The implementation of Pi-Hole on the FTTI network at Jenderal Achmad Yani Yogyakarta University provides a robust defense against malvertising attacks. By blocking malicious ads, Pi-Hole safeguards users' browsing experiences and reduces the risk of potential harm from online advertisements. This research contributes to the growing body of knowledge on network security and offers practical insights for organizations and individuals seeking effective measures to counter web-based malvertising attacks.
The Role of Digital Forensic Experts in Cybercrime Investigations in Indonesia Based on The Scopus Research Index Subektiningsih, Subektiningsih; Hariyadi, Dedy
Building of Informatics, Technology and Science (BITS) Vol 4 No 3 (2022): December 2022
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bits.v4i3.2638

Abstract

The development of information technology, besides having a positive impact, has negative impacts, such as an increase in cybercrime. Several parties are involved in handling cybercrimes in Indonesia, including expert witnesses in digital forensics. It is hoped that cybercrimes can be uncovered through a digital forensic approach. Research related to cybercrime and Digital Forensics in Indonesia is experiencing increasing growth from 2010 to 2021. A very rapid increase was shown in 2017. Through bibliometric analysis, you can analyze expert witnesses in the field of digital forensics by region in Indonesia, such as Sumatera, Western Java, Central Java, and Eastern Java. An expert witness in digital forensics must have technical skills in operating digital forensic tools and analysis and academic skills in uncovering crimes. The results of this study are very useful for law enforcement officers or lawyers in determining expert witnesses in the field of digital forensics. List of digital forensic experts in Indonesia who have been tested from their scientific studies by conducting various paper publications. So, law enforcement can synergize with digital forensic experts to solve cybercrime. One of the roles of a digital forensic expert is as an expert witness in court. Through research, it is hoped that there will be an increase in awareness of digital forensic experts to conduct scientific publications so that it is easier to be recognized by law enforcement and academics for updating methods and techniques of cybercrime investigation
Analisis kualitas udara menggunakan internet of things di pintu perlintasan kereta api Kusumaningrum, Evy; Hermawan, Heru Bagus; Sumarsono; Hariyadi, Dedy
Computer Science and Information Technology Vol 4 No 3 (2023): Jurnal Computer Science and Information Technology (CoSciTech)
Publisher : Universitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37859/coscitech.v4i3.6219

Abstract

The limited number of air quality sensors causes the presentation of Air Quality Index information to be not optimal. In principle, the installation of Air Quality Index sensors can provide input in air quality control and monitoring policies in an area. However, some places that have the potential to become local tourism or gathering places such as around the railroad crossing area do not have air quality sensors installed. Wind speed when trains pass can cause dust to scatter. Therefore, it is necessary to conduct further studies related to air quality around railroad crossings. Therefore, this research proposes to analyze and monitor air quality around railroad crossings in the Special Region of Yogyakarta based on the Internet of Things. In this study, the installed sensors functioned to monitor air quality at 3 locations that have different characteristics so that the data generated is also different. Based on the PM25 sensor, the air quality is categorized as Good 50% and Moderate 50%, while the PM10 sensor is categorized as Good 80% and Moderate 30%. The Internet of Things sensor built in this study is still not integrated in its recording between wind speed and air quality.
Pengujian sistem keamanan wireless router pada ekosistem rumah cerdas berbasis NIST sp800-115 Kusuma, Mandahadi; Hariyadi, Dedy; Kurniawan, Hendarto; Muttaqin, Filda Fikri Faizal
Computer Science and Information Technology Vol 4 No 3 (2023): Jurnal Computer Science and Information Technology (CoSciTech)
Publisher : Universitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37859/coscitech.v4i3.6315

Abstract

It is important to safeguard personal information captured by the device being used against theft or unauthorized use, which makes network design that is more resistant from hacking attempts. This includes personal information within the ecosystem of smart homes. A house that should be the most comfortable place should not be disturbed because of the wrong configuration of the smart home ecosystem. Several previous studies have discussed security configuration gaps in network infrastructure, but have not focused on the smart home ecosystem from the user's internal side. Therefore, in this research, a 2.4 GHz wireless network configuration testing model is proposed in a smart home ecosystem using an application developed specifically for checking misconfiguration security gaps, which is expected which is expected to expand research on network infrastructure security gaps based on the NIST 800-115 framework. The application's testing technique can reveal details about a wireless network ecosystem's safe and risky conditions. The results of these findings will provide recommendations to wireless network owners to take action to reconfigure their wireless networks to make them more secure.
Analisis Tingkat Security Awareness-Personal Threat Terhadap Ancaman Phishing Dengan Metode Technology Threat Avoidance Theory (TTAT) Daila Sari, Indah; Hariyadi, Dedy; Sahtyawan, Rama; Kusumaningtyas, Netania Indi
Jurnal Teknomatika Vol 16 No 2 (2023): TEKNOMATIKA
Publisher : Fakultas Teknik dan Teknologi Informasi, Universitas Jenderal Achmad Yani Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30989/teknomatika.v16i2.1250

Abstract

Phishing is a sort of cybercrime that involves obtaining sensitive information through the use of email, SMS, or compromised websites. The effects of phishing are caused by factors in the Technology Threat Avoidance Theory. The single best way to stop phishing attacks is to increase awareness of the risk of them happening among users or end users (human firewall). To determine the next steps in raising user knowledge, it is necessary to measure cybersecurity awareness, particularly against phishing assaults. Identify a few significant cybersecurity awareness of FTTI University of Jenderal Achmad Yani students in Yogyakarta. The investigation in this case included a phishing test and also employed online observation using observers who were asked questions based on the Technology Threat Avoidance Theory (TTAT). Using the MANOVA analysis method, factors influencing cybersecurity awareness analysis is conducted. Based on the analysis and testing of phishing tests as well as online questionnaires from the sample population, it shows that the sample is at a poor level of awareness. While the analysis of cybersecurity influence factors using the MANOVA analysis method shows that the results of the sig.> 0.05 value so that h0 is rejected. Based on the results of the study, it was concluded that FTTI students were still vulnerable to phishing attacks. Factor analysis using the MANOVA method shows that the dependent factor affects the level of cybersecurity awareness of the respondents but there is no significant difference between the dependent factors.
Analisis Insider Threat pada Sistem Keamanan Rumah Cerdas Menggunakan Malicious Traffic Monitoring Hariyadi, Dedy; Finansia, Cici
Jurnal Aplikasi Teknologi Informasi dan Manajemen (JATIM) Vol 4 No 2 (2023): Jurnal Aplikasi Teknologi Informasi dan Manajemen (JATIM) Oktober 2023
Publisher : Fakultas Teknik Universitas Islam Madura

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31102/jatim.v4i2.2287

Abstract

Ancaman serangan siber semakin banyak dan kompleks, berdasarkan catatan Badan Siber dan Sandi Negara (BSSN) bahwa di Indonesia pada tahun 2022 terdapat anomali trafik atau malicious traffic ratusan juta. Berdasarkan sumber ancaman maka dapat serangan siber dapat dikategorikan serangan siber yang bersumber dari internal (insider threat) dan serangan siber yang bersumber dari luar (outsider threat). Saat ini serangan siber tidak hanya dari luar atau outsider karena serangan siber dapat bersumber dari perangkat yang digunakan atau kebiasaan pengguna dalam mengakses internet. Untuk mendeteksi ancaman serangan siber pada ekosistem rumah cerdas menggunakan penelitian ini mengadopsi metode Network Development Life Cycle (NDLC). Berdasarkan hasil analisis pada ekosistem rumah memungkinkan diterapkan teknik port mirroring pada router. Sehingga pada perancangan mengggunakan Miktorik dan MalTrail sebagai sensor deteksi malicious traffic untuk mengetahui aktivitas anomali. Hasil dari penelitian ini menunjukan bahwa ancaman serangan siber yang bersumber dari internal dapat disebabkan dari kebiasaan pengguna dalam mengakses internet. Sedangkan perangkat cerdas yang terpasang dalam penelitian ini tidak ditemukan adanya malicious traffic atau aktivitas anomali. Maka penelitian ini masih perlu dilakukan improvisasi menggunakan teknik network packet capture.
Implementasi Healthy Building Berbasis Internet of Things pada Taman Kanak-kanak Al Baraakah, RA Kreatif Kusumaningrum, Evy; Sumarsono, Sumarsono; Setiawan, Chanief Budi; Hariyadi, Dedy
Computer Science and Information Technology Vol 5 No 3 (2024): Jurnal Computer Science and Information Technology (CoSciTech)
Publisher : Universitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37859/coscitech.v5i3.8093

Abstract

The limited availability of air quality sensors leads to potential exposure to pollution that poses health risks. Monitoring of crucial clean air indicators, such as ISPU standards and emission requirements, as well as management of important aspects of healthy buildings such as ventilation, temperature, humidity, and security, are also inadequate. As a solution, this article proposes the development of an Internet of Things (IoT)-based smart school that utilizes advanced sensor technology to monitor and manage the condition of the educational environment in accordance with the healthy building foundation proposed by the Harvard T.H. Chan School of Public Health. With the integration of Tuya-based sensors and the use of HomeAssistant platform for automation, the implementation of this system in educational institutions such as TK Al Baraakah, RA Kreatif successfully created a healthier environment. As a result, better building conditions are achieved through real-time monitoring of vital parameters, forming a structured approach to creating safer and more comfortable schools for students and faculty. Monitoring and management can be shown on the Dashboard of the HomeAssistant platform.
Co-Authors Abdul Rohman Supriyono Adkhan Sholeh Adri Priadana Ahmad Luthfi Akas Wisnuaji Akas Wisnuaji Akas Wisnuaji Alfirst Radena Julio Vanca Alfun Roehatul Jannah Anas Sufi Hasan Arief Ikhwan Wicakasono Arief Ikhwan Wicaksono Arif Akbarul Huda Asnawi, Choerun Azzam Syawqi Aziz Barep Setiyadi Burhan Alfironi Muktamar Chanief Budi Setiawan Choerun Asnawi Daila Sari, Indah Dewi , Grita Supriyanto Dewi, Grita Supriyanto Dia Putera Idiana Kusuma Dondy Bappedyanto Eka Tresna Irawan Evy Kusumaningrum Faulinda Ely Nastiti Fazal, Ahmad Fazlurrahman Bima Fazlurrahman Fazlurrahman Fazlurrahman, Fazlurrahman Finansia, Cici Grinaldy Yafi’ Rasyad Hendro Wijayanto Hendro Wijayanto Hermawan, Heru Bagus Ike Yunia Pasa Imam Ahmad Subhan Imam Puji Santoso Indah Daila Sari Irmma Dwijayanti Kharisma Kurniawan, Hendarto Kusumaningtyas, Kartikadyota Kusumaningtyas, Netania Indi Lahitani, Alfirna Rizqi M. Roykhul Jinan M. Wahyu Indriyanto Mandahadi Kusuma, Mandahadi Mardhani Riasetiawan Ma’rifat Ma’rifat Mei Purweni Muhammad Habibi Muhammad, Abdul Haris Muttaqin, Filda Fikri Faizal Nakulo, Bambang Nasution, Annio Indah Lestari Nindya Dwi Anggana Ningrat, Aditya Wahyu Nugroho, Muhammad Agung Nur Hikmatul Maulida Nur Seto Bayuaji Puji Winar Cahyo Purweni, Mei Rama Sahtyawan Ramadhana Saputra Ramadhani, Erika Rizdqi Akbar Ramadhan Rosid , Ibnu Abdul Saputri, Yerly Ania Sari, Indah Daila Setiyadi, Barep Subektiningsih Subektiningsih Sumarsono Sumarsono Sumarsono Sumarsono Tri Febrianto Tri Febrianto Ulfi Saidata Aesyi Wing Wahyu Winarno