Claim Missing Document
Check
Articles

Found 11 Documents
Search

Analysis of Android Malware "Undangan Pernikahan.Apk" Using Static and Dynamic Methods Muhammad Syafa Asgani; Raphael Bianco Huwae; Andy Hidayat Jatmika
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 8 No 1 (2024): Juni 2024
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v8i1.599

Abstract

This research aims to analyze Android malware "UndanganPernikahan.apk" using static methods with reverse engineering techniques and dynamic analysis. The analysis process uses several tools to understand the characteristics, behavior, and impact of the malware after installation on an Android device. The research shows that this malware covertly steals user credentials through several vulnerabilities. The "UndanganPernikahan" malware is a type of spyware disguised as a wedding invitation and runs in the background without the user's knowledge. To avoid similar malware infections, it is recommended to always update the system and applications, only download applications from trusted sources, and conduct digital security training.
Android-Based Porang Cultivation Application Design for North Lombok District Porang Farmers Raphael Bianco Huwae; Andy Hidayat Jatmika; Moh. Ali Albar; Ahmad Zafrullah Mardiansyah; Noor Alamsyah
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 8 No 2 (2024): Desember 2024
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v8i2.600

Abstract

Porang is a plant that has the potential to be developed as an export commodity as a food ingredient or industrial ingredient (i.e., food, cosmetics, medicine, or health). North lombok regency location is one of the districts in ntb that currently has potential for developing porang farming businesses. Porang farming is currently carried out in 2 subdistricts, namely gangga and bayan, and has 800 farmer members with a land area of 1000 ha. Having an android-based application will help with the management of farmer administration. Based on the results of black-box testing, all features were confirmed to function properly. Additionally, the System Usability Scale (SUS) evaluation involving 30 users yielded an average score of 74.16, placing it within the acceptable category).
Server Performance Analysis Against Distributed Denial of Service (DDoS) Attacks (Case Study: Mataram University Academic Information System) Rafli Gunawan Hadi; Ahmad Zafrullah Mardiansyah; Raphael Bianco Huwae
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 8 No 2 (2024): Desember 2024
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v8i2.609

Abstract

Information technology advancement has significantly impacted Indonesia's education sector, including the University of Mataram. The university relies on the Sistem Informasi Akademik (SIA) for various academic activities. However, increasing users has led to challenges such as excessive traffic and server downtime. This research analyzes the impact of DDoS attacks on the SIA server's performance and utilizes Zabbix for server monitoring. The results show that DDoS attacks mainly burden the network traffic component, with a significant increase compared to normal conditions. CPU and RAM resources also increased but less significantly. Monitoring with Zabbix improves the efficiency of performance management, enabling real-time monitoring and easy-to-understand visualization. The findings help administrators identify the need to increase server capacity and implement DDoS detection and mitigation systems to maintain the quality and availability of academic services.
OPTIMASI PROTOKOL ROUTING DSDV MENGGUNAKAN ALGORITMA TIME PREDICTION PADA JARINGAN MANET Rabiah Adawiyah, Baiq Safitri; Andy Hidayat Jatmika; Raphael Bianco Huwae
TEKNIMEDIA: Teknologi Informasi dan Multimedia Vol. 6 No. 1 (2025): Juni 2025
Publisher : Badan Penelitian dan Pengabdian Masyarakat (BP2M) STMIK Syaikh Zainuddin NW Anjani

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46764/teknimedia.v6i1.253

Abstract

The rapid movement of nodes and signal interference in Mobile Ad Hoc Networks (MANETs) cause communication routes to become unstable and often lead to packet loss. One of the major drawbacks of the Destination Sequenced Distance Vector (DSDV) protocol is its inability to maintain optimal network performance under such conditions. To address this issue, this study proposes a modification of the DSDV protocol by implementing a node's residual time prediction algorithm, named TimePrediction-DSDV, to enhance route stability and reduce the impact of signal interference. Simulations were conducted using Network Simulator version 2.35 on the Linux Ubuntu 14.04 operating system, with node density scenarios of 25, 50, and 100 nodes, and speeds of 30, 60, and 90 m/s in a 1500x1500 meter squared area. The performance parameters tested included throughput, end-to-end delay, and packet delivery ratio (PDR). The simulation results show that TimePrediction-DSDV significantly improves performance across all scenarios. For the throughput test, the average increase was 15% for 25 nodes, 14.5% for 50 nodes, and 13% for 100 nodes. For the end-to-end delay test, the decrease was 22% for 25 nodes, 20.8% for 50 nodes, and 19.5% for 100 nodes. For the Packet Delivery Ratio (PDR) test, the increase was 12.5% for 25 nodes, 11.6% for 50 nodes, and 10.67% for 100 nodes. Although network performance decreases with increased node density and speed, TimePrediction-DSDV consistently shows better results compared to the standard DSDV in all tested scenarios.
MENINGKATKAN KINERJA PROTOKOL ROUTING AOMDV UNTUK MENCARI RUTE BERDASARKAN PERGERAKAN NODE DAN MENGURANGI BROADCAST STORM DALAM JARINGAN MANET Mei Sukriani; Andy Hidayat Jatmika; Raphael Bianco Huwae
TEKNIMEDIA: Teknologi Informasi dan Multimedia Vol. 6 No. 1 (2025): Juni 2025
Publisher : Badan Penelitian dan Pengabdian Masyarakat (BP2M) STMIK Syaikh Zainuddin NW Anjani

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46764/teknimedia.v6i1.254

Abstract

Rapid topology changes in Mobile Ad Hoc Networks due to node movement often cause network instability. Each node in the network can move freely with varying speeds in different directions. As a result, the connection between devices can be disconnected or reconnected depending on the different communication ranges. Node movement causes constraints on the communication path created by AOMDV, because it does not take into account node mobility, so AOMDV has difficulty in maintaining route stability. This study aims to improve the performance of the AOMDV routing protocol in MANET by using the TimePrediction algorithm to improve the calculation of node movement during the route search process. This approach involves modifying the "Hello" message so that the position and speed information of neighboring nodes, which will be sent gradually to ensure communication between nodes. adding location and speed information of each device into the message that will be sent by each other. The TimePrediction protocol was created to overcome the problem of a constantly changing network. By predicting where nodes in the network will move, this protocol can also create a more stable communication path. The results showed that the TimePrediction AOMDV protocol successfully increased the average throughput by 5.39% for 50 nodes, 6.48% for 75 nodes, and 6.87% for 100 nodes. In addition, the average end-to-end delay decreased by 5.39% for 50 nodes, 6.48% for 75 nodes, and 6.87% for 100 nodes. The packet delivery ratio also increased by an average of 7.19% for 50 nodes, 8.80% for 75 nodes, and 12.70% for 100 nodes.
PENCARIAN RUTE BERDASARKAN PERGERAKAN NODE TETANGGA PADA PROTOKOL ROUTING AODV UNTUK MENEMUKAN RUTE YANG HANDAL DI JARINGAN MANET Azahra, Novita Mabruka; Andy Hidayat Jatmika; Raphael Bianco Huwae
TEKNIMEDIA: Teknologi Informasi dan Multimedia Vol. 6 No. 1 (2025): Juni 2025
Publisher : Badan Penelitian dan Pengabdian Masyarakat (BP2M) STMIK Syaikh Zainuddin NW Anjani

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46764/teknimedia.v6i1.255

Abstract

The movement of nodes in a Mobile Ad Hoc Network (MANET) is very dynamic and unpredictable. Each node in this network moves freely at different speeds and directions, which causes continuous changes in the network topology. The movement of nodes affects the communication path between nodes, as connec-tions between nodes are lost or re-established according to the position of the node whether it is still with-in communication range or not. In addition, the movement of nodes also affects the performance of rout-ing protocols used in finding routes, such as AODV (Ad hoc On-Demand Distance Vector). The AODV routing protocol does not take into account the movement of neighboring nodes in finding routes, so the route found can be quickly disconnected because the nodes involved in the route move away, out of range of the communication signal. This research aims to improve the performance of the AODV routing proto-col by considering the movement of nodes in the route finding process using the TimePrediction algorithm. The approach used includes modifications to Hello messages, so that they also include position and ve-locity information of neighboring nodes. Hello messages are packets sent periodically by each node in a MANET network to inform neighboring nodes of its presence. The results show that from a given node speed variation, TimePrediction-AODV routing protocol is able to provide better average throughput im-provement of 8.63% for 20 nodes, 29.10% for 40 nodes, and 60.70% for 60 nodes, better average PDR improvement of 6.06% for 20 nodes, 20.54% for 40 nodes, and 27.50% for 60 nodes, and average end-to-end delay reduction of 31.53% for 20 nodes, 28.86% for 40 nodes, and 43.98% for 60 nodes compared to standard AODV.
PENCARIAN RUTE BERDASARKAN JARAK NODE TERDEKAT DAN EFISIENSI ENERGI PADA PROTOKOL ROUTING AOMDV DI JARINGAN MANET Muhamad Rizqi Duha Pramudya; Andy Hidayat Jatmika; Raphael Bianco Huwae
TEKNIMEDIA: Teknologi Informasi dan Multimedia Vol. 6 No. 1 (2025): Juni 2025
Publisher : Badan Penelitian dan Pengabdian Masyarakat (BP2M) STMIK Syaikh Zainuddin NW Anjani

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46764/teknimedia.v6i1.256

Abstract

The distance of nodes when communicating is a major challenge in route finding. The long distance of nodes will consume a lot of energy in the routing process so that the occurrence of failure or disconnection of the routing path becomes a problem that needs to be considered. One of the weaknesses in the AOMDV protocol is that it does not pay attention to node distance and node energy in the routing process. Therefore, this research proposes to modify the standard AOMDV routing protocol by adding the Preserving Energy Optimization Algorithm to identify node selection based on the node's distance to the source node by considering the node's energy in the routing process. The approach used includes modifications to the Hello message, so that the message has a geographic location based on x and y coordinates. The simulation was conducted using NS-2.35 on Linux Ubuntu operating system. The test parameters include energy consumption, end-to-end delay and packet delivery ratio (PDR). The simulation results of applying the PEO-AOMDV algorithm provide significant performance on all tested parameters. In terms of energy consumption, there is a saving of 16.04%. In addition, there is a decrease in average end-to-end delay by 43.08% to an increase in PDR percentage by 15.17% at various node density variations.
Analisis Kerentanan SQL Injection, Cross Site Scripting, Dan Insecure Direct Object Reference Pada Website Perguruan Tinggi Di Nusa Tenggara Barat Menggunakan Metode Pengujian Penetrasi Dhira Wahyu Febrian; Raphael Bianco Huwae; Ahmad Zafrullah Mardiansyah
Jurnal Bumigora Information Technology (BITe) Vol. 7 No. 1 (2025)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/bite.v7i1.5032

Abstract

Background: In the digital era, cybersecurity is important for universities in protecting academic information and user data. The focus of this research is to identify and analyze the security vulnerabilities of higher education websites in West Nusa Tenggara against three types of attacks, namely SQL Injection, Cross Site Scripting (XSS), and Insecure Direct Object Reference (IDOR), which can compromise the integrity of higher education data and information systems.Objective: This research aims to evaluate the level of vulnerability and severity of the risk of the three types of attacks on the websites of higher education institutions.Methods: This research uses penetration testing methods, and assesses the severity of vulnerabilities based on the Common Vulnerability Scoring System (CVSS) version 3.1.Result: This research results show that 50% of the ten college websites tested are vulnerable to XSS attacks, 30% to SQL Injection, and 20% to IDOR. The highest severity was found in the SQL Injection vulnerability with a CVSS score of 9.0 critical category.Conclusion: The implications of the results of this study indicate that higher education institutions need to immediately strengthen system security with strict input validation, WAF implementation, and adequate authorization mechanisms to prevent future exploitation of similar vulnerabilities.
Information Systems Security Risk Management Using the COBIT 2019 Framework and NIST 800-30 on the Website People's Representative Council NTB Alvionita Safira Wahab; Raphael Bianco Huwae; Andy Hidayat Jatmika
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 9 No 1 (2025): Juni 2025
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v8i1.617

Abstract

This research analyzes information security risk management on the website of the Regional People's Representative Council (DPRD) of West Nusa Tenggara (NTB) using the COBIT 2019 and NIST 800-30 frameworks. The main objective of this research is to identify weaknesses in existing security controls and provide recommendations for improvements to deal with cyber threats, specifically DDoS, cross-site scripting (XSS), deface, and SQL injection attacks, which can disrupt service availability and data security. The research methods included interviews with five key stakeholders who have responsibilities in information security, as well as the distribution of questionnaires to ten IT staff. Data from the interviews and questionnaires were analyzed using risk mapping according to the COBIT 2019 framework and NIST 800-30 to identify capability gaps. The results showed specific weaknesses in the management of controls against XSS and DDoS threats, especially in the aspects of monitoring and incident response. The research conclusions emphasize the need to improve risk management through the addition of more up-to-date security technology, increased security awareness and training for staff, and regular security audits to ensure the sustainability of risk management. Recommendations include the implementation of a more sophisticated threat detection system, periodic training for staff, and a more structured incident response procedure to improve security and ensure continuity of public services through the DPRD NTB website.
Security Audit and Analysis of High School Websites Using Cross Site Scripting (XSS) Method and Insecure Direct Object Reference (IDOR) Penetration Test Muhammad Kholilul Adrian; Raphael Bianco Huwae; Ahmad Zafrullah Mardiansyah
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 9 No 1 (2025): Juni 2025
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v9i1.611

Abstract

This study investigates security vulnerabilities in secondary school PPDB websites, focusing on Structured Query Language (SQL) Injection and Cross Site Scripting (XSS) techniques. The research aims to conduct a security audit and analysis using XSS methods and Insecure Direct Object References (IDOR) penetration tests. The primary objectives are to identify existing security gaps, provide recommendations for improvement, and enhance the overall security of these websites. By addressing these vulnerabilities, the study seeks to make PPDB websites more secure and reliable in protecting users' personal data and maintaining system integrity. Additionally, this research aims to raise awareness among PPDB system managers and schools about the importance of cybersecurity in website development and management, offering practical solutions and serving as a reference for improving website security in the educational sector.