Claim Missing Document
Check
Articles

Found 17 Documents
Search
Journal : Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA)

Implementation of Live Forensic Virtual Router for Network Traffic Comparison Firmansyah Firmansyah; Bayu Wibisana; Hendri Purnomo
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 1 No. 2 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36679/s4kira.v1i2.9

Abstract

An entrepreneur or a service provider in the internet network world, will certainly find clients with different characters. Clients who are not technology blind, especially routers, sometimes want full access to the router, or some clients who ask to add a router to be able to directly access the router in full. Virtual Router allows clients to process their own network, as if the client has a router. Network forensics has the ability to reconstruct events using a system that stores all data traffic activities on the network, so that investigations can be carried out by looking back at events that have occurred and analyzing events that occurred in the past. Wireshark can review data packages in real time. This means that the wireshark application will monitor all incoming and outgoing data packets through a predefined interface and the next will display the results of the data package
Implementation of Virtual Routers for Network Simulation Purposes in Simulated Internet Firmansyah Firmansyah; Yusuf Hendra Pratama; Hendri Purnomo
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 1 No. 2 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36679/s4kira.v1i2.10

Abstract

This research aims to implement a virtual router as a network simulation solution in an artificial internet environment. Artificial internets have become important in developing and testing applications and network protocols without the need for expensive physical infrastructure. In this study, researchers used virtual router software to create a network environment that can be customized according to user needs. Researchers evaluated the performance of virtual routers in simulating various network scenarios, including reliability, scalability, and security testing. The methods used include installing and configuring virtual routers, as well as using network simulation tools to build complex topologies. Researchers also carried out performance measurements to evaluate the latency, throughput and stability of the virtual router. The research results show that the virtual router is able to simulate the network environment well, providing complete flexibility and control to the user. Although there are some limitations, such as high resource consumption in some configurations, the advantages in terms of efficiency and ease of use make virtual routers an attractive option for network simulation on artificial internet. This research is expected to contribute to the development of more effective and efficient network simulation environments, as well as assist researchers and developers in testing and developing network technology without having to rely on expensive physical infrastructure
Building Virtual Local Area Network (VLAN) for Self-Attendance Using Manageable Switch at Institut Sains & Teknologi Akprind Yogyakarta Firmansyah Firmansyah; Bayu Wibisana; Hendri Purnomo; Yusuf Hendra Pratama
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 1 No. 2 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36679/s4kira.v1i2.31

Abstract

Building a manageable network to support the implementation of Virtual Local Area Network (VLAN) in independent attendance for students and lecturers, which can avoid individuals entrusting attendance, is part of today's technological developments, so that it is hoped to produce an individual who is independent, intelligent and supported. with a high level of technological mastery. The AKPRIND Yogyakarta Institute of Science & Technology has implemented this technology on the main server, but the VLAN implementation is specifically designed for Presence Mandiri in the west and east buildings on campus 1. Each building is designed to have 2 broadcast domains and use 2 switches to be able to produce communications. data between buildings that have the same broadcast domain. The switch on the Presence Mandiri VLAN network at the AKPRIND Yogyakarta Institute of Science & Technology has 2 VLAN IDs with the configuration used being VLAN Trunking (VTP). The IP addressing provided is DHCP from each switch, which can divide the network on each available port. This VLAN configuration is all done using a network simulation tool, namely Cisco Packet Tracert 6.1.0 in ICMP testing, with the protocol used is Internet Protocol version 4 or IPv4
Analisis QoS (Quality Of Service) Pada Jaringan Rt/Rw Net Untuk Peningkatan Efisiensi Dan Produktivitas Layanan Muhammad Jordan; Khairul Warisin Hammami; Firmansyah Firmansyah
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 2 No. 1 (2024): Multimedia Integration and computer networks in the Development of Modern Infor
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36679/s4kira.v2i1.32

Abstract

In an increasingly advanced digital era, computer networks play an important role in supporting various activities, including in the community-initiated RT/RW Net environment. This research aims to analyze Quality of Service (QoS) on the RT/RW Net network to improve service efficiency and productivity. The research method used is the experimental method, which involves data collection through the Mikhmon application to monitor network performance. QoS measurements were made based on four main parameters: throughput, delay, jitter, and packet loss.The results show that the RT/RW Net network has excellent throughput with a value of 1471 Kb/s, average delay of 3.623 ms, jitter of 3.63 ms, and packet loss of 0%, all of which fall into the "Very Good" category according to Tiphon standards. Security testing was also conducted by simulating a brute force attack, which revealed several weaknesses in the security system that require improvement.The conclusion of this study is that the RT/RW Net network has a very good quality of service, but needs improvement in the security aspect. Suggestions include increasing bandwidth capacity, implementing stricter security policies, and improving connection stability.
Designing a Multimedia-Based Tourism Information System for Tetebatu Village Using the Design Thinking Approach Ahmad Arfin; Wahyu Saputra; Firmansyah Firmansyah
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 2 No. 2 (2024): Optimizing Multimedia for Education, Design, and Tourism in the Digital Era
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36679/s4kira.v2i2.22

Abstract

One of the communities in the East Lombok area that has a lot of tourism potential is Tetebatu Village. Unfortunately, lack of awareness and promotion has hindered the full realization of this potential. A tourism information system application is needed that can provide accurate and comprehensive information and marketing to tourists to overcome these problems. The user interface and user experience of the Jepara Regency tourism information system application were created using the design thinking process in this research. This approach was chosen because it allows users to be involved in the design process, resulting in a product tailored to the user's needs and preferences. Research findings show that the Tetebatu Village tourism information system application was created with an intuitive and adaptable user interface. Apart from that, this application has a number of features that can facilitate tourists' access to information and promotions related to tourism in Tetebatu Village.
Implementation of a Blockchain-Based IDS for Cloud Infrastructure Putrawan Hadi; M. Hidayaturrahman; Firmansyah
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 3 No. 2 (2025): Digital Transformation and Its Impact on Behavior, Literacy, and Information Se
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36679/s4kira.v3i2.52

Abstract

Data security in cloud computing environments has become a major concern as system architectures grow increasingly complex, distributed, and open to external access. One of the essential components in maintaining system security is the Intrusion Detection System (IDS), which is responsible for identifying suspicious activities and cyberattacks. However, traditional IDS implementations face several limitations, including the vulnerability of log integrity, limited scalability in dynamic cloud environments, and reliance on centralized architectures that are prone to single points of failure and internal threats. To address these challenges, the integration of blockchain technology into IDS has emerged as an innovative solution. Blockchain offers decentralization, transparency, and immutability of records, which are highly relevant for strengthening IDS reliability and trust.This study employs a literature review methodology by examining scholarly articles, academic journals, and real-world case studies focusingon blockchain-based IDS implementations within cloud computing infrastructure. The findings suggest that using blockchain—particularly permissioned frameworks such as Hyperledger Fabric—can significantly enhance the integrity of IDS logs, enable transparent and verifiable audit trails, and support secure multi-tenant collaboration in both public and private cloud settings. Furthermore, the combination with machine learning techniques, federated learning, and Zero Trust Architecture (ZTA) increases the detection accuracy and responsiveness of the system. Nevertheless, several challenges remain, including transaction efficiency, computational overhead, and system integration complexity. Therefore, a carefully designed and optimized architecture is required tomaximize the benefits of blockchain-based IDS in cloud environments.
Wireshark Implementation to Monitor Security on Wifi Indihome Rizki Ananta; Firmansyah Firmansyah; Muh. Fadli Hasa
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 3 No. 01 (2025): The Role of Digital Technology in Enhancing Education, Security, and Business
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36679/s4kira.v3i1.29

Abstract

The increasing use of wireless networks, such as Indihome WiFi, raises significant concerns regarding network security. Cyber threats like data theft, unauthorized access, and malware attacks can compromise user privacy and data integrity. Therefore, monitoring network traffic is essential to detect and mitigate potential security risks. This study explores the implementation of Wireshark, a widely used network protocol analyzer, to monitor security on Indihome WiFi networks. Wireshark enables real-time packet capture and analysis, allowing for the inspection of data traffic, detection of suspicious activities, and identification of vulnerabilities. This research focuses on analyzing network protocols, identifying anomalies such as unauthorized access attempts, and evaluating encryption effectiveness. The methodology involves capturing WiFi packets, filtering data based on protocols (e.g., TCP, UDP, HTTP), and analyzing potential security threats like ARP spoofing or DNS hijacking. The results indicate that Wireshark effectively detects irregular traffic patterns, unencrypted data transmissions, and potential intrusion attempts. However, its effectiveness depends on proper configuration and user expertise in interpreting packet data. The study concludes that Wireshark is a valuable tool for enhancing Indihome WiFi security but should be complemented with other security measures such as firewalls, strong encryption (e.g., WPA3), and regular network audits. Future research could explore automated threat detection integration with Wireshark to improve real-time response capabilities.