Claim Missing Document
Check
Articles

Pengembangan Mobile Sandbox Berbasis Cyberdeck Untuk Pengujian Keamanan Pada Ponsel Android Menggunakan DNS Proxy dan Port Mirroring Hariyadi, Dedy; Rosid , Ibnu Abdul; Dewi , Grita Supriyanto
Computer Science and Information Technology Vol 5 No 3 (2024): Jurnal Computer Science and Information Technology (CoSciTech)
Publisher : Universitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37859/coscitech.v5i3.7763

Abstract

The increase in internet usage in Indonesia has an impact in the form of potential cyber attacks such as malvertising, which is inserting malicious code or malware into advertisements when accessing the internet. In addition to malvertising, other malware activities are also detected in Badan Siber dan Sandi Negara (BSSN) malicious traffic monitoring system. The increase in internet access in Indonesia is also influenced by the growth of smartphone users who are always connected to the internet. The connection of digital devices such as smartphones requires testing of their activities. This study proposes testing the security of internet access on smartphones using the sandbox method. To facilitate testing, a cyberdeck-based mobile sandbox with integrated sensors was developed. The sensors used are malvertising sensors and anomalous traffic. Based on testing of mobile phone activity using the mobile sandbox, smartphones with the vanilla version of the Android operating system have fewer malvertising attacks than those operating systems that have been redeveloped by manufacturers. Although the malvertising attacks are the lowest, they have the potential for anomalous traffic caused by internet access by users or the installation of additional applications.
Analisis Bibliometrika: 4 Dekade Penelitian Cyber Weapon dalam Peperangan Modern Hariyadi, Dedy
Cyber Security dan Forensik Digital Vol. 7 No. 1 (2024): Edisi Bulan Mei Tahun 2024
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2024.7.1.4860

Abstract

Dibalik serangan siber terdapat metode baru dalam peperangan modern, yaitu pemanfaatan cyber weapon. Artikel ini menggunakan analisis bibliometrika untuk memetakan tren dan kesenjangan dalam studi tentang cyber warfare, dengan data yang diambil dari sistem indeks Scopus. Dokumen yang digunakan adalah daftar indeks artikel dari Scopus sebanyak 565 artikel. Hasil analisis menunjukkan peningkatan signifikan dalam publikasi terkait cyber weapon sejak tahun 2018, Amerika Serikat sebagai negara kontributor terbesar yang diikuti oleh negara-negara lain seperti India, Britania Raya, Cina, dan Korea Selatan. Selain itu, penelitian ini mengidentifikasi tiga kluster utama: ancaman siber terhadap infrastruktur kritis, strategi pertahanan siber, dan peran spionase dalam serangan siber. Artikel ini juga menyoroti pentingnya pemetaan penelitian untuk mengembangkan strategi mitigasi yang lebih efektif terhadap ancaman cyber weapon dan meningkatkan kesadaran global tentang perang siber. Penelitian lebih lanjut diperlukan untuk mengeksplorasi peran kecerdasan buatan dalam taktik cyber weapon yang terus berkembang, serta untuk memahami dampak sosial dan ekonomi dari serangan siber. Kata kunci: cyber warfare, cyber weapon, analisis bibliometrika, serangan siber, pertahanan siber -------------------------------------- Behind cyber attacks is a new method in modern warfare, namely the utilization of cyber weapons. This article uses bibliometric analysis to map trends and gaps in the study of cyber warfare, with data taken from the Scopus index system. The document used is the index list of 565 articles from Scopus. The results of the analysis showed a significant increase in cyber weapon-related publications since 2018, with the United States as the main contributor, followed by countries such as India, the United Kingdom, China, and South Korea. Additionally, the research identified three main clusters: cyber threats to critical infrastructure, cyber defense strategies, and the role of espionage in cyber attacks. The article also highlights the importance of research mapping to develop more effective mitigation strategies against cyber weapon threats and raise global awareness of cyber warfare. Further research is needed to explore the role of artificial intelligence in evolving cyber weapon tactics, as well as to understand the social and economic impacts of cyber attacks. Keywords: cyber warfare, cyber weapon, bibliometrics analysis, cyber attack, cyber defense
A Bibliometrics Analysis of Multimedia Forensics and Deep Learning Research Based on Scopus Index Erika Ramadhani; Dedy Hariyadi
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 4 No 3 (2023)
Publisher : SOTVI - Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/jitsi.4.3.187

Abstract

Forensics of digital data are concerned with identifying, acquiring, processing, analysing, and reporting on electronic data. Multimedia forensics focuses on investigating computer crimes using forensic methods. The analysis of multimedia evidence is the role of multimedia forensics, on the other hand. In the analysis, digital evidence is evaluated scientifically to maintain its integrity, to find its source, and to authenticate it. There are several methods in multimedia forensics, such as the implementation of deep learning. The purpose of this research is to conduct bibliometric analysis in multimedia forensics and deep learning by using the data gathered from Scopus index on the keyword “multimedia forensics and deep learning”. The result is 68 relevant papers were found in the range of 2017-2022. The results of this research can be used by researchers as a reference when conducting research and determining the research themes to be pursued.
Pengembangan Sistem Informasi Geografi Untuk Pemantauan Jaringan Irigasi Menggunakan LeafletJS Sumarsono, Sumarsono; Asnawi, Choerun; Kusumaningrum, Evy; Hariyadi, Dedy
Jurnal Kajian Ilmiah Vol. 23 No. 1 (2023): January 2023
Publisher : Lembaga Penelitian, Pengabdian Kepada Masyarakat dan Publikasi (LPPMP)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/et38bn80

Abstract

The distribution or flow of water in irrigation networks that are not good can have an impact on air demand on agricultural land. This is due to the air volume that is not optimal due to damage to the irrigation network. Each irrigation network has a level of disturbance which is measured by the level of damage to the irrigation network based on the channel and building arrangement. Efforts to anticipate the level of damage to the wider irrigation network that can harm farmers, it is necessary to have a system that makes it easier for air interpreters to provide reports. Based on the report, the water interpreter will be followed up and processed by the team regarding more handling. In the ease of reporting, water interpreters need a location-based reporting system. Therefore, the right approach in reporting damage to irrigation networks is using a geographic information system. With the development of internet communication, geographic information systems have been developed that can be implemented on smartphones with the Android operating system.
PENINGKATAN KEWASPADAAN TERHADAP KEJAHATAN SIBER PADA APLIKASI WHATSAPP DI KALURAHAN BANGUNJIWO Hariyadi, Dedy; Lahitani, Alfirna Rizqi; Dwijayanti, Irmma; Kusumaningtyas, Kartikadyota; Dewi, Grita Supriyanto
Jurnal Pengabdian Masyarakat - Teknologi Digital Indonesia. Vol 4, No 2 (2025): Oktober 2025
Publisher : Lembaga Penelitian dan Pengabdian Masyarakat - Universitas Teknologi Digital Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26798/jpm.v4i2.1476

Abstract

Potensi serangan siber yang semakin kompleks memberikan dampak peningkatan kejahatan di ruang siber dengan \textit{initial access}  pada pengguna perangkat digital. Aplikasi whatsapp sebagai produk perkembangan teknologi memberikan ruang baru bagi penjahat siber untuk melakukan penipuan \textit{online} dan pencurian informasi. Untuk mengatasi masalah ini, sebuah inisiatif Pengabdian kepada Masyarakat dari Universitas Jenderal Achmad Yani Yogyakarta bersama Desa Mitra, Kalurahan Bangunjiwo, Kabupaten Bantul, Daerah Istimewa Yogyakarta memberikan pendampingan untuk peningkatan kesadaran tentang ancaman ruang siber dan melatih warga tentang langkah-langkah keamanan dasar, seperti \textit{Multi Factor Authentication} (MFA) dan \textit{Two-step Verification}. Inisiatif ini terdiri dari beberapa fase, termasuk koordinasi, observasi, sosialisasi, evaluasi, dan pelaporan, yang bertujuan untuk meningkatkan pemahaman masyarakat tentang praktik keamanan siber. Sebagai hasil dari program ini, para peserta menunjukkan peningkatan yang signifikan dalam pengetahuan mereka tentang ancaman serangan siber dan penerapan langkah-langkah keamanan. Upaya penting dalam pendidikan dan dukungan berkelanjutan untuk memperkuat ketahanan masyarakat dalam menghadapi kejahatan siber. Selain itu inisiatif yang berkelanjutan sangat penting untuk menjaga kesadaran dan melindungi warga di ruang siber. Inisiatif ini tidak hanya memberdayakan masyarakat dengan informasi penting tetapi juga menumbuhkan pendekatan proaktif terhadap keamanan siber dengan harapan kontribusi pada ruang siber yang lebih aman bagi masyarakat.
Pengembangan Sistem Pemantauan dan Deteksi Serangan pada Ekosistem Rumah Cerdas Hariyadi, Dedy; Setiawan, Chanief Budi; Setiyadi, Barep
Jurnal Komtika (Komputasi dan Informatika) Vol 5 No 2 (2021)
Publisher : Universitas Muhammadiyah Magelang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31603/komtika.v5i2.5861

Abstract

It is predicted that the growth of smart devices installed in the smart home ecosystem will increase in the future. Smart devices that are connected to each other using wired or wireless networks that have the potential for security holes are attacked by threat actors. Whereas a house is a place that provides comfort for its residents. An attack on the smart home ecosystem allows the operation of the smart home ecosystem to be disrupted or personal information stolen to be used by irresponsible parties. To face the high wave of smart home implementation in the future with potential security holes that always accompany it. This is in accordance with the principle that no system is 100% secure. In this study, attacks on wireless networks can be detected as anomalous traffic. Monitoring and detection in the smart home ecosystem involves supporting components such as sensors, access points, gateway collectors and analysis stacks.
Model Inspeksi Keamanan Jaringan Nirkabel Dengan Teknik Wardrving Berbasis ChatBot Purweni, Mei; Hariyadi, Dedy; Nastiti, Faulinda Ely; Fazlurrahman, Fazlurrahman
Jurnal Komtika (Komputasi dan Informatika) Vol 6 No 2 (2022)
Publisher : Universitas Muhammadiyah Magelang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31603/komtika.v6i2.7943

Abstract

Penggunaan perangkat jaringan nirkabel seperti Access Point perlu dianalisis untuk menghindari serangan intersep ataupun bypass oleh pelaku kejahatan. Kegiatan inspeksi keamanan jaringan nirkabel dalam inspeksi/operasi intelligen harus dilakukan secara rahasia, akurat dan cepat. Penelitian ini mengusulkan pengembangan aplikasi pengumpulan informasi dan pemetaan perangkat jaringan access point dalam operasi intelijen oleh petugas lapangan sebagai bahan rujukan dalam penyajian laporan saat proses penyidikan. Pengumpulan informasi pada penelitian ini dilakukan dengan pendekatan Signal Intelligence yang telah diselaraskan dengan model Signal Intelligence dan Intelligence Collection System. Penelitian ini telah menggunakan kedua cabang tersebut dikolaborasikan dengan komunikasi chatbot untuk mempermudah proses analisis petugas lapangan yang disertai dengan aktivitas menyaru data jaringan di tengah-tengah masyarakat.
Analisis dan Penanganan Insiden Siber SQL Injection Menggunakan Kerangka NIST SP 800-61R2 dan Algoritma Klusterisasi K-Means Asnawi, Choerun; Hariyadi, Dedy; Aesyi, Ulfi Saidata; Cahyo, Puji Winar
Jurnal Komtika (Komputasi dan Informatika) Vol 7 No 2 (2023)
Publisher : Universitas Muhammadiyah Magelang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31603/komtika.v7i2.10527

Abstract

Based on the OWASP Top Ten document in 2021, attacks or vulnerabilities in an application in the form of injection still rank in the top 3. SQL Injection attacks are still classified as injection vulnerabilities so they need special attention from Information & Communication Technology Managers. Badan Siber dan Sandi Negara (BSSN) has published a document related to preventing SQL Injection attacks. However, the document has not included a cyber attack analysis process that uses the K-Means clustering approach. So in this research, a collaborative method of handling cyber attacks in the form of SQL Injection is proposed using the NIST SP 800-61R2 framework as a fundamental for handling cyber attacks and K-Means clustering. Before analyzing cyber attacks, it is better to use a framework or standardization that applies globally. Based on the research conducted, the K-Means clustering algorithm can help cybersecurity analysts in the process of analyzing cyber attacks that occur. The result of this research is that the optimal value is obtained that cyber attacks in the form of SQL Injection, namely 3 clusters. The hope of the research can facilitate cybersecurity analysts in analyzing cyber attacks that are poured into reports to parties in need
Digital Forensic Analysis of Hybrid Scooter Motors using Smart Flow and Integrated Digital Forensics Standard Saputri, Yerly Ania; Fazal, Ahmad; Ningrat, Aditya Wahyu; Hariyadi, Dedy
Compiler Vol 14, No 2 (2025): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28989/compiler.v14i2.3211

Abstract

This research addresses the challenges of digital forensics for connected hybrid vehicles, focusing on the Yamaha Fazzio hybrid scooter. The study highlights how limited collection methods and mobile device encryption often compromise the integrity of electronic evidence. To address these issues, a five-stage framework was developed, combining guidelines from NIST SP 800-101 Rev.1 and ISO/IEC 27037:2012. This comprehensive framework includes data collection, evidence identification, forensic acquisition, examination and analysis, and final reporting. The framework's effectiveness is boosted by Smart Flow automation on Cellebrite UFED devices, which automates the identification of Android devices, extraction of Y-Connect App databases, GPS logs in JSON, and travel route thumbnails. This automation significantly enhances the efficiency of the acquisition and analysis processes while maintaining evidence integrity. Evaluations showed successful data acquisition from a Xiaomi Mi 5s Plus with the Y-Connect App. Details from the riding_log table were extracted, providing information on travel routes, distance, average and maximum speeds, and estimated fuel consumption during a Yogyakarta - Klaten travel test scenario. These results are crucial for developing digital forensics SOPs for other connected hybrid vehicles in future research.
Co-Authors Abdul Rohman Supriyono Adkhan Sholeh Adri Priadana Ahmad Luthfi Akas Wisnuaji Akas Wisnuaji Akas Wisnuaji Alfirst Radena Julio Vanca Alfun Roehatul Jannah Anas Sufi Hasan Arief Ikhwan Wicakasono Arief Ikhwan Wicaksono Arif Akbarul Huda Asnawi, Choerun Azzam Syawqi Aziz Barep Setiyadi Burhan Alfironi Muktamar Chanief Budi Setiawan Choerun Asnawi Daila Sari, Indah Dewi , Grita Supriyanto Dewi, Grita Supriyanto Dia Putera Idiana Kusuma Dondy Bappedyanto Eka Tresna Irawan Evy Kusumaningrum Faulinda Ely Nastiti Fazal, Ahmad Fazlurrahman Bima Fazlurrahman Fazlurrahman Fazlurrahman, Fazlurrahman Finansia, Cici Grinaldy Yafi’ Rasyad Hendro Wijayanto Hendro Wijayanto Hermawan, Heru Bagus Ike Yunia Pasa Imam Ahmad Subhan Imam Puji Santoso Indah Daila Sari Irmma Dwijayanti Kharisma Kurniawan, Hendarto Kusumaningtyas, Kartikadyota Kusumaningtyas, Netania Indi Lahitani, Alfirna Rizqi M. Roykhul Jinan M. Wahyu Indriyanto Mandahadi Kusuma, Mandahadi Mardhani Riasetiawan Ma’rifat Ma’rifat Mei Purweni Muhammad Habibi Muhammad, Abdul Haris Muttaqin, Filda Fikri Faizal Nakulo, Bambang Nasution, Annio Indah Lestari Nindya Dwi Anggana Ningrat, Aditya Wahyu Nugroho, Muhammad Agung Nur Hikmatul Maulida Nur Seto Bayuaji Puji Winar Cahyo Purweni, Mei Rama Sahtyawan Ramadhana Saputra Ramadhani, Erika Rizdqi Akbar Ramadhan Rosid , Ibnu Abdul Saputri, Yerly Ania Sari, Indah Daila Setiyadi, Barep Subektiningsih Subektiningsih Sumarsono Sumarsono Sumarsono Sumarsono Tri Febrianto Tri Febrianto Ulfi Saidata Aesyi Wing Wahyu Winarno