Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Format : Jurnal Imiah Teknik Informatika

Penerapan Fault Injection based Security Testing untuk Menemukan Potensi Celah Keamanan Indor pada Platform XYZ Purnomo, Andi; Hanafi, Faiz
FORMAT Vol 14, No 1 (2025)
Publisher : Universitas Mercu Buana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22441/format.2025.v14.i1.001

Abstract

Security Disclosure has become an important program in identifying and addressing vulnerabilities in software systems across various organizations and institutions by providing an opportunity for system testing through collaboration with external parties. This research aims to provide a deeper understanding of security disclosure through the Security Disclosure program on Platform XYZ, with a focus on Fault Injection techniques through parameter manipulation to discover IDOR (Insecure Direct Object Reference) vulnerabilities. The research begins by explaining the importance of the Security Disclosure program in the context of software security and system improvement. Furthermore, this study conducts testing on Fault Injection techniques through parameter manipulation, which is used to search for IDOR vulnerabilities on Platform XYZ. By manipulating input parameters, researchers can test the system by inducing unexpected behavior that can reveal sensitive information or grant unauthorized access to permissions. Case studies and real-world examples are used to demonstrate the effectiveness and impact of Fault Injection techniques in enhancing system security. The research findings have shown a high level of IDOR vulnerability with an impact on thousands of users. This research also highlights the importance of broader understanding of software security and security awareness for organizations and individual users. It is expected that this research will contribute to improving understanding of security disclosure and Fault Injection techniques through parameter manipulation, as well as promoting higher security awareness in protecting software systems from attacks and safeguarding sensitive user data on Platform XYZ.
Penerapan Algoritma SVM pada Software Define Network untuk Mendeteksi dan Mitigasi Serangan DDOS pada Server Jaringan purnomo, andi; Achyar, Avrijsto Amandri
FORMAT Vol 14, No 2 (2025)
Publisher : Universitas Mercu Buana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22441/format.2025.v14.i2.001

Abstract

Software Defined Network (SDN) is a network architecture that is very useful in the future where SDN can be used to manage network traffic on server networks. SDN can be implemented using a variety of controllers. In the controller the developer can configure it with various algorithms or other functions. At present, cyber crimes are increasingly numerous and dangerous. One of the most dangerous cyber attacks that is mostly carried out by both novice and professional hackers is the DDoS attack. DDoS attacks are aimed at crippling servers with server administration with multiple streams and packets. SDN as an architect for managing networks can be used to detect and counteract DDoS attacks so that servers are protected from these attacks. In this study researchers used SDN configured using the SVM algorithm to detect and mitigate DDOS attacks. In this study, the researchers obtained results where SDN with the SVM algorithm configuration obtained an accuracy rate of 99.67%. The SDN speed configured with the SVM algorithm does not exceed 0.30ms. Wireshark statistics show that SDN with the SVM algorithm configuration can stabilize and mitigate packets detected as DDOS.