p-Index From 2021 - 2026
10.627
P-Index
This Author published in this journals
All Journal ITEj (Information Technology Engineering Journals) Abdimas Umtas : Jurnal Pengabdian kepada Masyarakat J-Dinamika: Jurnal Pengabdian Kepada Masyarakat Jurnal Mantik Abdimas Toddopuli: Jurnal Pengabdian Pada Masyarakat Community Development Journal: Jurnal Pengabdian Masyarakat Jurnal Kajian Ilmiah Jurnal Informatika Dan Tekonologi Komputer (JITEK) Jurnal Teknologi dan Manajemen Industri Terapan Biner : Jurnal Ilmiah Informatika dan Komputer Madani: Multidisciplinary Scientific Journal JURNAL ILMIAH SAINS TEKNOLOGI DAN INFORMASI Jurnal Penelitian Sistem Informasi Jurnal Sistem Informasi dan Ilmu Komputer Jurnal Kendali Teknik dan Sains International Journal of Smart Systems Kohesi: Jurnal Sains dan Teknologi Educational Insights Jurnal Sains dan Teknologi JI-Tech Jurnal Penelitian Teknologi Informasi dan Sains Saber: Jurnal Teknik Informatika, Sains dan Ilmu Komunikasi DIGIBE: Digital Business and Entrepreneurship Journal Jurnal Riset Teknik Komputer Jurnal Riset Sistem Informasi Venus: Jurnal Publikasi Rumpun Ilmu Teknik Router : Jurnal Teknik Informatika dan Terapan Bridge: Jurnal Publikasi Sistem Informasi dan Telekomunikasi Merkurius: Jurnal Riset Sistem Informasi dan Teknik Informatika Neptunus: Jurnal Ilmu Komputer dan Teknologi Informasi Uranus: Jurnal Ilmiah Teknik Elektro, Sains dan Informatika Saturnus: Jurnal Teknologi dan Sistem Informasi Technology Sciences Insights Journal Jejak digital: Jurnal Ilmiah Multidisiplin Journal of System and Technology Router : Jurnal Teknik Informatika dan Terapan Jurnal Informatika Dan Tekonologi Komputer Jurnal Sistem Informasi dan Ilmu Komputer
Claim Missing Document
Check
Articles

Serangan dan Deteksi Port Scanning Menggunakan Wireshark dan Snort Rakhmadi Rahman; Abdul Khalik Hartono; Eka Tanduklangi
Jejak digital: Jurnal Ilmiah Multidisiplin Vol. 1 No. 4 (2025): JULI (Edisi Spesial)
Publisher : INDO PUBLISHING

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63822/2q8zwz85

Abstract

In the digital era, network security threats such as port scanning pose significant risks as they serve as reconnaissance for potential cyber attacks. This study evaluates the effectiveness of Wireshark (paket analysis tool) and Snort (Intrusion Detection System) in detecting and analyzing port scanning activities. Using Nmap (Zenmap) as an attack simulator, experiment were conducted on a local Wi-Fi network to capture TCP SYN scans and HTTP sniffing attemps. Wireshark successfully identified suspicious traffic patterns, icluding unacknowledged SYN packets and exposed HTTP login credentials, while Snort, configured with custom rules, generated real-time alert for scanning activities. The findings confirm the complementary roles validation. This study recommends regular Snort rule update, enabling promiscuous mode, and implementing HTTPS/VPN to mitigate sniffing risks. This integrates approach enhances early threat detection and strengthens network protection mechanisms.
Serangan Man-In-The-Middle (MITM) di Jaringan Publik: Studi dan Solusi Simulasi Serangan Password Cracking Menggunakan Hydra Rakhmadi Rahman; Abriel Yosua Nathanael Leksona; Afiqah
Jejak digital: Jurnal Ilmiah Multidisiplin Vol. 1 No. 4 (2025): JULI (Edisi Spesial)
Publisher : INDO PUBLISHING

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63822/np7skj98

Abstract

Perkembangan teknologi yang pesat telah mendorong berbagai sektor di Indonesia bergantung pada konektivitas Internet. Namun, seiring kemajuan ini, jaringan publik seperti wi-fi rentan menghadapi ancaman keamanan siber yang semakin kompleks, terutama serangan Man-In-The-Middle (MITM) dan Password Cracking. Penelitian ini bertujuan untuk mensimulasikan serangan MITM dengan teknik ARP Spoofing menggunakan tool Ettercap serta serangan Password Cracking menggunakan Hydra dalam lingkungan virtual terkontrol, sekaligus mengusulkan solusi mitigasi yang efektif. Metode eksperimen dilakukan dengan mengkonfigurasi dua mesin virtual, yaitu Kali Linux sebagai penyerang dan Ubuntu sebagai server web. Hasil simulasi menunjukkan bahwa serangan MITM mampu mengintersep kredensial pengguna melalui koneksi HTTP dalam waktu singkat, sementara serangan brute-force dengan Hydra berhasil mengungkap kata sandi dalam durasi kurang dari satu menit. Penerapan HTTPS dengan sertifikat self-signed sebagai langkah mitigasi terbukti mampu mencegah intersepsi data, meskipun ARP spoofing tetap aktif. Penelitian ini diharapkan mampu memberikan wawasan tentang kerentanan jaringan publik dan solusi praktis untuk memperkuat keamanan sistem autentikasi. Keamanan Jaringan.
Analisis Keamanan Layanan SSH terhadap Brute Force Attack Putri Balqis; Rakhmadi Rahman
Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 3 No. 4 (2025): Juli: Merkurius: Jurnal Riset Sistem Informasi dan Teknik Informatika
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/merkurius.v3i4.949

Abstract

To securely access servers remotely, an important protocol in the modern era is Secure Shell (SSH). However, brute force attacks, which are automated attempts to guess repeated username and password combinations, are often the main target of this service. The purpose of this research is to evaluate the vulnerability of SSH services to brute force attacks and evaluate how effective Fail2Ban is as a mitigation tool. This method uses simulated experiments with two virtual machines; Kali Linux is used as the attacker with the Hydra tool and Ubuntu Server is used as the target. The results show that SSH is highly vulnerable to brute force attacks if not protected. Hundreds of login failures from the same IP without restrictions show this. After using Fail2Ban, the system can automatically find and block the attacker IP after three unsuccessful logins. With easy configuration and fast threat detection, Fail2Ban has been proven to improve the security of SSH services. This study suggests using Fail2Ban to improve the defense of SSH services against cyberattacks, especially brute force attacks.
Peningkatan Kompatibilitas Sistem Operasi Windows di Berbagai Perangkat Rakhmadi Rahman; M Furqan Ramadhanu; Nurul Salsabillah
Saturnus: Jurnal Teknologi dan Sistem Informasi Vol. 2 No. 3 (2024): Juli: Saturnus: Jurnal Teknologi dan Sistem Informasi
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/saturnus.v2i3.274

Abstract

The goal of improving the compatibility of the Windows operating system with various devices is to ensure that Windows runs well on desktops, laptops, tablets, and mobile devices. Technical developments such as system modularization, performance optimization, and better driver integration are part of this effort. To expand the range of devices, Microsoft supports ARM architecture in addition to x86 architecture. Additionally, support for IoT technology, biometric sensors and touch screens has been improved. Maintaining a consistent user experience and expanding the ecosystem of Windows-compatible devices is the goal of this effort.
Analisis Perbandingan Framework Keamanan Jaringan(NIST CSF, CIS Controls, ISO 27001) Rahman, Rakhmadi; Ananta, Asti; Surianti, Besse
Technology Sciences Insights Journal Vol. 2 No. 1 (2025): Technology Sciences Insights Journal
Publisher : MID Publisher International

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.60036/z05cpv06

Abstract

Keamanan jaringan menjadi elemen krusial dalam mendukung keberlangsunganoperasional organisasi pada era digital saat ini. Riset ini mengkaji dan membandingkan tiga framework keamanan informasi terkemuka: NIST Cybersecurity Framework (CSF), CIS Controls, dan ISO/IEC 27001, untuk menentukan pendekatan yang paling sesuai berdasarkan skala dan kebutuhan organisasi. Metode deskriptif-komparatif digunakan dalam penelitian ini dengan mengandalkan data sekunder dari standar resmi, literatur akademik, dan studi kasus. Hasil studi menunjukkan bahwa NIST CSF unggul dalam fleksibilitas dan dapat diterapkansecara modular, CIS Controls efektif secara teknis untuk organisasi dengan sumber daya terbatas, sementara ISO/IEC 27001 menawarkan sistem manajemen keamanan informasi yang komprehensif dan bersertifikasi. Penelitian ini menyarankan kombinasi penggunaan framework agar dapat membentuk strategi keamanan informasi yang berkelanjutan dan kontekstual.
Security Analysis of the VoIP (Voice Over Internet Protocol) System wulan, alya; Rahman, Rakhmadi; Desvi
International Journal of Smart Systems Vol. 1 No. 3 (2023): August
Publisher : Etunas

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63876/ijss.v1i3.69

Abstract

Voice over Internet Protocol (VoIP) is a communication technology that enables voice transmission over IP-based networks, offering advantages such as cost efficiency, flexibility, and service integration. Despite its benefits, VoIP faces significant security vulnerabilities due to its open architecture and dependence on public internet infrastructure. This study presents a literature-based analysis of the primary security threats targeting VoIP systems, including eavesdropping, Denial of Service (DoS) attacks, spoofing, session hijacking, and Network Address Translation (NAT) traversal problems. The research also discusses a range of countermeasures, including Secure Real-time Transport Protocol (SRTP), Transport Layer Security (TLS), Intrusion Detection and Prevention Systems (IDS/IPS), adaptive firewalls, and robust authentication protocols such as STIR/SHAKEN. While these technical solutions are effective, their success depends on proper implementation and continuous system monitoring. Although there may be minor trade-offs in performance, particularly in latency, such compromises are acceptable under global standards to ensure secure communication. The findings underscore the importance of a layered security strategy that maintains both protection and Quality of Service (QoS), making VoIP a dependable solution for critical sectors such as government, finance, and business.
Optimasi dan Modifikasi Debian untuk Meningkatkan Kinerja Sistem Operasi Real-Time Rakhmadi Rahman; Reski Septiawan; Abriel Yosua Nathanael Leksona
Neptunus: Jurnal Ilmu Komputer Dan Teknologi Informasi Vol. 2 No. 3 (2024): Agustus: Neptunus: Jurnal Ilmu Komputer Dan Teknologi Informasi
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/neptunus.v2i3.280

Abstract

In today's digital era, operating systems play a crucial role in various technological devices. This paper discusses the optimization and modification of Debian, one of the most stable Linux distributions, to enhance its performance as a real-time operating system (RTOS). The primary objectives of this research are to improve the responsiveness, reliability, and stability of Debian in handling real-time tasks. The study involves modifying the kernel, adjusting scheduling settings, optimizing memory management, and integrating specific real-time software. The results of the tests show that the modified Debian provides lower and more stable task execution latency compared to the standard Debian. Tests were conducted using the cyclictest software to measure system latency and Htop to monitor CPU and memory performance. Additionally, the use of the VLC application as a real-world workload demonstrated that the optimized operating system could handle task priorities more efficiently, allocate resources as needed for real-time demands, and maintain stability under heavy workloads. This research significantly contributes to the development of Debian-based RTOS, which can be applied in fields such as industrial automation, robotics, and IoT devices. The optimizations ensure that the operating system can meet the high-performance and real-time reliability demands of these critical applications.
IMPLEMENTASI PROTONVPN UNTUK PENINGKATAN KEAMANAN AKSES ONEDRIVE PADA SISTEM OPERASI WINDOWS Rakhmadi Rahman; Murtafia Murtafia
Jurnal Riset Sistem Informasi Vol. 3 No. 1 (2026): Januari : Jurnal Riset Sistem Informasi
Publisher : CV. Denasya Smart Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69714/wf1ema03

Abstract

As reliance on cloud computing for data management grows, the issue of user data security when accessing services via public networks is a critical concern. This study investigates the implementation of the free-tier version of ProtonVPN on the Windows operating system as a mechanism to reinforce secure access to cloud platforms. ProtonVPN was selected for its offered high-level cryptographic protocols, user-friendly nature, and zero-cost availability. The methodology involved installation, connection configuration, and access testing on major cloud platforms (Google Drive and OneDrive). Results show that using the VPN effectively obfuscates the user's IP address and secures data traffic through encryption, significantly enhancing protection when interacting with cloud services. Despite limitations such as reduced speed performance and limited server choices, this solution proves efficient in elevating the security posture of cloud computing access on Windows devices.
Analisis Keamanan Jaringan Sosial Media Rahman, Rakhmadi; Kuncahya, Figra Dwi
Technology Sciences Insights Journal Vol. 1 No. 1 (2024): Technology Sciences Insights Journal
Publisher : MID Publisher International

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Pada era digital, penggunaan media sosial meningkat secara signifikan, namun hal ini juga meningkatkan risiko keamanan dan privasi. Penelitian ini menyajikan analisis keamanan jaringan media sosial yang berfokus pada perlindungan informasi pribadi pengguna. Penelitian menunjukkan bahwa sebagian besar pengguna tidak memahami kebijakan privasi media sosial dan bagaimana informasi pribadi mereka dilindungi. Oleh karena itu, penelitian ini dilakukan untuk menganalisis keamanan profil pengguna media sosial dari ancaman aktivitas pengumpulan informasi menggunakan metode intelijen sumber terbuka untuk membuat profil target. Hasil penelitian ini dapat membantu meningkatkan kesadaran pemilik data dan penyelenggara sistem elektronik untuk lebih memperhatikan keamanan sistem informasi terhadap data pribadi seseorang.
Keamanan Jaringan Cloud-Native dan Implementasi Solusi Keamanan Menggunakan Cloud Computing Rahman, Rakhmadi; Umi kalsum, Umi kalsum
Technology Sciences Insights Journal Vol. 1 No. 1 (2024): Technology Sciences Insights Journal
Publisher : MID Publisher International

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Studi ini menginvestigasi penerapan tentang keamanan jaringan cloud-native dan implementasi solusi keamanan yang efektif untuk melindungi aplikasi dan data dari ancaman-ancaman. Cloud-native telah menjadi suatu kebutuhan yang sangat penting dalam era digital saat ini, memungkinkan pengembangan aplikasi yang lebih cepat dan efisien. Namun, hal ini juga memerlukan strategi keamanan yang lebih efektif. Solusi keamanan cloud-native harus dapat menghadapi tantangan-tantangan keamanan yang terkait dengan penggunaan cloud computing, seperti manajemen identitas dan akses, keamanan jaringan, dan investigasi serta respons otomatis. Penelitian ini bertujuan untuk menganalisis dan mengembangkan cloud-native yang lebih aman untuk meningkatkan keamanan aplikasi. Implementasinya meliputi integrasi teknologi cloudnative dengan keamanan terbaik, seperti otomatisasi, microservices, dan kontainerisasi, untuk meningkatkan visibilitas, otomatisasi keamanan, skalabilitas, dan keandalan aplikasi. Hasil penelitian ini diharapkan dapat memberikan kontribusi dalam meningkatkan keamanan jaringan cloud-native dan implementasi solusi keamanan yang efektif.
Co-Authors A.Nurul Sairah Abdul Khalik Hartono Abdullah Abdullah Abdullah B Abdullah B Abriel Yosua Nathanael Leksona Achmad Haikal Fikri Adinda Aulia Rahmi Adwah , Farah Diyanah Afiqah Ahmad, Muhammad Adhi Fahriansyah Aisyah Aisyah Akmal Baharuddin Syam Al-Amin, Muh. Alif Imran Alif, Muh. Alvian Tri Putra Darti Akhsa Alya Putri Rahmadani Alya Wulan Apriliyani Amanda Putri Heryanti Amin, Widyah Putri Auliya Ananda Nabila Putri ANANTA, ASTI Andi Aulia Safirah Andi Maharani Andi Mahrani Anita Septiani Mustamin Antoni, Wahyudi Anugra, Ayu Anugrah Dwi Ansarna Apriliyani, Alya Wulan Arfika Amalia Suryadi Arthanty, Annisa Aspiani Putri Ashilah Aulia Rahmi, Adinda Awal Ramadhan Nasrun Azzahra, Maryam Baharuddin, Siti Hajar Barik Alfito, Ramadan Chintami Darti Akhsa, Amaliah Danang Fatkhur Razak Darti Akhsa, Alvian Tri Putra Dermawan, Rufaida Desvi Dwicki, Dwicki Herlambang Egi Fahrezi Iswan Eka Tanduklangi Fadhil Aditya Fanilda Damayanti Fathin Alwan Tahir Fathuresqi, Fathuresqi Fatkhur Razak, Danang Fatwa, Syafira Fikri, Achmad Haikal Furqan, M Furqan Ramadhanu Ghazali, M. Chaerul Ghina R.S Odja Gina Latifa Akmal Haikal Fikri, Achmad Hakim, Nur Fadillah Hamuddin, Humaera Haslinda Haslinda Hikma, Nurul I, Ikbal Ibrahim, Siti Nur Azizah Imamulkhair, Muhammad Januar Fahrisal Jesica Septiani Manurung Julistio Fadjar Anugrah Sao Kelsia Nelsia Khaera Tunnisa, Khaera Khalifah, Nur Ayu Khumaedi Khumaedi Kuncahya, Figra Dwi Kustanto , Prio Lia Kamila Kulsum Lukman Hakim Lukman Hakim M Furqan Ramadhanu M Yahtadi M. Faiz Ilyas Mar'atuttahirah, Mar'atuttahirah Maratuttahirah Maratuttahirah, Maratuttahirah Marwa Dinda Muchtar Mar’atuttahirah Mar’atuttahirah, Mar’atuttahirah Meiana Sahabuddin Meyrani R Moh. Farel Muh. Al Amin Muh.Daffa Nashwan Rasya Muhammad Akbar Fahrezi Muhammad Alfarizky Yusuf Muhammad Alfian Muhammad Arham Arsyad Muhammad Aril Muhammad Dirga Sopan Muhammad Hasyim Rusmin Muhammad Syawal Muhammad Yusuf Dzaky .J Mulyadi Mulyadi Murtafia Murtafia Nabilah Ramadhani Wowong Najwa, Hafizhah Natasya taslim Noel Ivander Pusung Nugrah Surya Pratama Nur Afiat Nur Azisah Basir Nur Fadillah Hakim Nurfaida Nurfaida Nurfauzi, Muhammad Aqmal Nurhalisah Ramli Nurhalizah, Siti Nurislamiyah Nurislamiyah Nurul Salsabillah Ome, Paulus Jemianus Pusung, Noel Ivander Putri Balqis Putri Dyananda Luqman Putri, Ananda Nabila Rahman, Aldi Fatur Rahmat Eka Putra R Palaloi Ramadhan, Syam Syahru Ramadhani, Alya Rasya, Muh. Daffa Nashwan Razak, Danang Fatkhur Redo Triansyah Reski Septiawan Retno Helviani Revan, Muh Rina Rina Rosmiati Rosmiati Rosmiati Rosmiati Safikah, Nur Saylandra Aulia Ramadhani Septian Rheno Widianto Sesa, Velita Rante Shalza Naya Dwi Fortuna Siti Nurhalizah Stepani Surianti, Besse Suryabuana, Andi Sahra Suryadi, Arfika Amalia Syaddad, Muhammad Shadiq Dzakwan Syafira Fatwa Syafira Fatwa Syam, Akmal Baharuddin Syifa Tri Agusriani taslim, natasya Tri Aditya, Muh Tri Putra Aditya Umi kalsum, Umi kalsum V, Viandra Wahyu Anwar Wildana, Andi Putri Wildana wulan, alya Yonatan Rannu Zahirah, Andi Riah Zulfattah, Abdul Khaliq