p-Index From 2021 - 2026
10.627
P-Index
This Author published in this journals
All Journal ITEj (Information Technology Engineering Journals) Abdimas Umtas : Jurnal Pengabdian kepada Masyarakat J-Dinamika: Jurnal Pengabdian Kepada Masyarakat Jurnal Mantik Abdimas Toddopuli: Jurnal Pengabdian Pada Masyarakat Community Development Journal: Jurnal Pengabdian Masyarakat Jurnal Kajian Ilmiah Jurnal Informatika Dan Tekonologi Komputer (JITEK) Jurnal Teknologi dan Manajemen Industri Terapan Biner : Jurnal Ilmiah Informatika dan Komputer Madani: Multidisciplinary Scientific Journal JURNAL ILMIAH SAINS TEKNOLOGI DAN INFORMASI Jurnal Penelitian Sistem Informasi Jurnal Sistem Informasi dan Ilmu Komputer Jurnal Kendali Teknik dan Sains International Journal of Smart Systems Kohesi: Jurnal Sains dan Teknologi Educational Insights Jurnal Sains dan Teknologi JI-Tech Jurnal Penelitian Teknologi Informasi dan Sains Saber: Jurnal Teknik Informatika, Sains dan Ilmu Komunikasi DIGIBE: Digital Business and Entrepreneurship Journal Jurnal Riset Teknik Komputer Jurnal Riset Sistem Informasi Venus: Jurnal Publikasi Rumpun Ilmu Teknik Router : Jurnal Teknik Informatika dan Terapan Bridge: Jurnal Publikasi Sistem Informasi dan Telekomunikasi Merkurius: Jurnal Riset Sistem Informasi dan Teknik Informatika Neptunus: Jurnal Ilmu Komputer dan Teknologi Informasi Uranus: Jurnal Ilmiah Teknik Elektro, Sains dan Informatika Saturnus: Jurnal Teknologi dan Sistem Informasi Technology Sciences Insights Journal Jejak digital: Jurnal Ilmiah Multidisiplin Journal of System and Technology Router : Jurnal Teknik Informatika dan Terapan Jurnal Informatika Dan Tekonologi Komputer Jurnal Sistem Informasi dan Ilmu Komputer
Claim Missing Document
Check
Articles

Meningkatkan Responsivitas Pada Sistem Operasi Android Melalui Implementasi Algoritma Penjadwalan Mutakhir Rakhmadi Rahman; Shalza Naya Dwi Fortuna; Redo Triansyah; Muhammad Akbar Fahrezi
Router : Jurnal Teknik Informatika dan Terapan Vol. 2 No. 3 (2024): September : Router : Jurnal Teknik Informatika dan Terapan
Publisher : Asosiasi Profesi Telekomunikasi dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/router.v2i3.146

Abstract

This research aims to analyze the performance of various CPU scheduling algorithms in increasing the responsiveness of the Android operating system. Using algorithms such as First Come First Served (FCFS), Shortest Job First (SJF), Shortest Remaining Time First (SRTF), and Round Robin, this study evaluates the advantages and disadvantages of each in terms of average waiting time, throughput, and power consumption. Research methods include literature study, algorithm selection and implementation, as well as data testing and analysis. The research results show that choosing the right scheduling algorithm can increase system efficiency and responsiveness, as well as provide recommendations for Android operating system developers and the application developer community. It is hoped that these findings will help in determining the optimal solution for improving the performance of the Android operating system.
Strategi Manajemen Memori pada Sistem Operasi Android untuk Smartphone Kelas Menengah Tri Putra Aditya; Aisyah Aisyah; Rakhmadi Rahman
Router : Jurnal Teknik Informatika dan Terapan Vol. 2 No. 3 (2024): September : Router : Jurnal Teknik Informatika dan Terapan
Publisher : Asosiasi Profesi Telekomunikasi dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/router.v2i3.165

Abstract

In the context of rapidly evolving mobile technology, memory management has become an important aspect that determines the efficiency and effectiveness of Android operating systems, particularly on mid- range smartphones. The objective of this research is to identify, analyze and develop memory management strategies that can improve the performance of the Android operating system on resource-constrained devices. Using an experimental approach, this study evaluates various memory management techniques, including the use of optimized caches, memory compression, and page replacement algorithms, to determine the most effective combination to improve system responsiveness and performance. The results show that the implementation of appropriate memory management strategies can significantly improve operating system performance and user experience while extending battery life. These findings provide valuable information for application developers and device manufacturers to optimize their products for mid-range smartphone competition.
ENTERPRISE ARCHITECTURE POS (EAPOS) Rakhmadi Rahman
Jurnal Informatika Dan Tekonologi Komputer (JITEK) Vol. 3 No. 1 (2023): Maret : Jurnal Informatika dan Tekonologi Komputer
Publisher : Pusat Riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jitek.v3i1.1729

Abstract

PT Pos Indonesia (Persero) is a State-Owned Enterprise (BUMN), in 2018 in line with KD72/2018 concerning the Organizational Structure of PT Pos Indonesia (Persero) and KD.35/2018 concerning the Transition Period of Information and Technology Organizations, the IT function organization has smelting is carried out to enter the business unit for the core system, so a guideline is needed for information technology governance or IT management, which is currently decentralized. To be able to standardize the structure and operation of technology support in all overall company functions, including business, data, applications and technology, a simple study is needed in the form of a blueprint or company blueprint which consists of information technology management components so that it can provide an overview and steps steps to assist in formulating EAPOS which bridges business in harmony with IT governance at PT Pos Indonesia (Persero).
IMPLEMENTASI SISTEM MONITORING KEAMANAN JARINGAN MENGGUNAKAN LOG ANALYSIS Rakhmadi Rahman; A.Nurul Sairah; Amanda Putri Heryanti
Jurnal Riset Sistem Informasi Vol. 3 No. 2 (2026): April : Jurnal Riset Sistem Informasi
Publisher : CV. Denasya Smart Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69714/fqg13p25

Abstract

Network infrastructure security has become a crucial necessity due to the increasing complexity of cyber attacks such as Distributed Denial of Service (DDoS) and illegal intrusions that are difficult to detect conventionally. This study aims to build a comprehensive log monitoring system using the integration of Wazuh SIEM and Elastic Stack to collect, standardize, and identify threats in real-time within LAN/WAN network environments. The methodology follows the PPDIOO cycle (Prepare, Plan, Design, Implement, Operate, Optimize), which includes stages of agent installation on servers, configuration of detection rules, and testing through direct attack simulations. The results show that the system successfully identified 42 security threats with an accuracy rate of 95%. Furthermore, the system is capable of providing alert responses in less than 5 seconds while maintaining stable server performance with latency below 100ms. These findings prove that SIEM-based monitoring is significantly more efficient than traditional manual monitoring methods in terms of detection speed and data visibility. This integration of open-source solutions is proven reliable for proactively strengthening network defenses. For further development, it is recommended to integrate machine learning technology to automatically predict more complex threat patterns.
ANALISIS KEAMANAN JARINGAN WI-FI PUBLIK TERHADAP SERANGAN EVIL TWIN Rakhmadi Rahman; Nurhalisah Ramli; Alya Putri Rahmadani
Jurnal Riset Sistem Informasi Vol. 3 No. 2 (2026): April : Jurnal Riset Sistem Informasi
Publisher : CV. Denasya Smart Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69714/vzqtrw67

Abstract

Public wireless networks (Wi‑Fi) are widely used in educational institutions, offices, and public areas due to their ease of access and flexibility. However, this convenience is accompanied by significant security risks, particularly Man‑In‑The‑Middle (MITM) attacks using the Evil Twin technique. This attack exploits fake access points that imitate legitimate networks to deceive users into connecting and transmitting sensitive data. This study aims to analyze the characteristics of Evil Twin attacks on public Wi‑Fi networks, evaluate the effectiveness of Deauthentication and Web Phishing techniques, and assess network monitoring tools in detecting traffic anomalies. The research method applied is an experimental approach using penetration testing in a controlled environment. Several tools such as Aircrack‑ng, Hostapd‑WPE, Wireshark, Zui, and Wi‑Fi Analyzer were utilized. The results indicate that Evil Twin attacks are highly effective in intercepting HTTP traffic and potentially compromising HTTPS sessions when users ignore digital certificate warnings. Monitoring based on metadata successfully detects abnormal traffic patterns, while the implementation of a Resilient Certificate Management System (RCMS) significantly improves network security by rejecting unauthorized certificates. This research provides practical recommendations for administrators and users to enhance public Wi‑Fi security.
IMPLEMENTASI HARDENING SERVER LINUX UNTUK MENGURANGI RISIKO SERANGAN SIBER Rakhmadi Rahman; Moh. Farel; Muhammad Dirga Sopan
Jurnal Riset Sistem Informasi Vol. 3 No. 2 (2026): April : Jurnal Riset Sistem Informasi
Publisher : CV. Denasya Smart Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69714/c4atnn70

Abstract

Ubuntu 22.04 LTS Linux servers running default configurations are highly vulnerable to cyber threats including ransomware, cryptojacking, and SSH brute force attacks due to 22+ unnecessary open ports, active root login, and weak password authentication on standard port 22. This research implements systematic hardening through Agile Development methodology comprising 4 iterative phases (assessment, implementation, testing, audit) following CIS Ubuntu Linux Benchmark v2.0.0 guidelines. Results demonstrate Lynis security score improvement from 40/100 (medium risk) to 85/100 (good) representing +112.5% enhancement, 86.4% attack surface reduction (22→3 essential ports: SSH 2222, HTTP 80, HTTPS 443), and complete elimination of critical vulnerabilities. Brute force testing using Hydra (1000 attempts) achieved 95% mitigation within <30 seconds through Fail2Ban automated IP blocking via iptables rules. Defense-in-depth architecture comprises UFW default-deny firewall policy, SSH RSA 4096-bit key authentication, AIDE file integrity monitoring, and automated Lynis auditing via cron jobs. The implementation produces production-ready hardened servers with high availability, replicable Standard Operating Procedures (SOP), and addresses Indonesian cybersecurity research literature gaps.
ANALISIS KEAMANAN FILE SERVER BERBASIS LINUX TERHADAP AKSES TIDAK SAH Rakhmadi Rahman; Nurfaida Nurfaida; Muhammad Hasyim Rusmin
Jurnal Riset Sistem Informasi Vol. 3 No. 2 (2026): April : Jurnal Riset Sistem Informasi
Publisher : CV. Denasya Smart Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69714/38pr8578

Abstract

In organizational environments, file servers function as centralized platforms for data storage and sharing, making system security a critical requirement. Inadequate security configurations may increase the risk of unauthorized access and data breaches. This study analyzes the security of a Linux-based file server through experimental testing of layered security mechanisms. The experiment was conducted on an Ubuntu Server configured with Samba and Network File System services. The applied security mechanisms include user and group management, Discretionary Access Control, Mandatory Access Control using AppArmor, and network access restrictions through a firewall. Security evaluation was performed using authorized and unauthorized access scenarios, including network scanning and authentication attempts. The results demonstrate that implementing layered security mechanisms significantly enhances protection against unauthorized access compared to basic permission settings alone. This research contributes practical guidance for strengthening Linux file server security in organizational environments.
PENERAPAN ACCESS CONTROL LIST (ACL) DALAM PENGAMANAN JARINGAN KOMPUTER Rakhmadi Rahman; Meyrani R; Wahyu Anwar
Jurnal Riset Sistem Informasi Vol. 3 No. 2 (2026): April : Jurnal Riset Sistem Informasi
Publisher : CV. Denasya Smart Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69714/tjzsbn24

Abstract

Computer networks supporting organizational operations are increasingly vulnerable to unauthorized access as connectivity grows. This study aims to analyze the effectiveness of Access Control List implementation in securing computer networks through a segmented network simulation approach. A simulated network environment was constructed to evaluate the ability of ACL to distinguish between permitted and unauthorized traffic. The results indicate that ACL successfully blocks unauthorized access while maintaining legitimate network services. These findings confirm that ACL remains an effective basic access control mechanism in controlled network environments.
PENGUJIAN KEAMANAN APLIKASI BERBASIS WEB TERHADAP SERANGAN PARAMETER TAMPERING Rakhmadi Rahman; Yonatan Rannu; Marwa Dinda Muchtar
Jurnal Riset Sistem Informasi Vol. 3 No. 2 (2026): April : Jurnal Riset Sistem Informasi
Publisher : CV. Denasya Smart Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69714/7eb4g917

Abstract

The abstract contains a = Web application security is a critical aspect in ensuring the confidentiality and integrity of user data. One of the most common attack vectors is parameter tampering, which involves manipulating parameter values transmitted between the client and the server to alter application logic. This study aims to analyze the level of vulnerability of web applications to parameter tampering attacks and to identify the resulting security impacts. The research adopts a qualitative approach using a case study method through web application security testing based on black-box testing techniques. The testing process is conducted using tools such as Burp Suite and OWASP ZAP to observe application responses to parameter modifications. The results indicate that weaknesses in server-side parameter validation mechanisms still exist and may be exploited by attackers. Therefore, the implementation of strict server-side parameter validation and regular security testing is essential to enhance the overall security of web applications.
Peran Sistem Operasi Seluler dalam Meningkatkan Efisiensi Energi dan Keamanan Mobile Banking untuk Perekonomian Berkelanjutan Rakhmadi Rahman; Retno Helviani; Nur Afiat
Uranus: Jurnal Ilmiah Teknik Elektro, Sains dan Informatika Vol. 2 No. 3 (2024): September: Uranus: Jurnal Ilmiah Teknik Elektro, Sains dan Informatika
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/uranus.v2i3.282

Abstract

In the digital era, mobile operating systems (OS) play a pivotal role beyond mere application execution platforms. They are essential for optimizing energy efficiency and enhancing security, particularly in the realm of mobile banking. This paper explores the critical role of mobile OS in supporting sustainable economic growth through efficient energy use and robust security measures in mobile banking transactions. The focus is on how these OS advancements contribute to a secure and environmentally responsible digital economy. Key aspects covered include energy optimization strategies, security enhancements such as data encryption and multi-factor authentication, and the integration of these technologies into mobile banking applications. By addressing these challenges, mobile OS not only ensures sustainable economic development but also fosters financial inclusivity and security in an increasingly digital world.
Co-Authors A.Nurul Sairah Abdul Khalik Hartono Abdullah Abdullah Abdullah B Abdullah B Abriel Yosua Nathanael Leksona Achmad Haikal Fikri Adinda Aulia Rahmi Adwah , Farah Diyanah Afiqah Ahmad, Muhammad Adhi Fahriansyah Aisyah Aisyah Akmal Baharuddin Syam Al-Amin, Muh. Alif Imran Alif, Muh. Alvian Tri Putra Darti Akhsa Alya Putri Rahmadani Alya Wulan Apriliyani Amanda Putri Heryanti Amin, Widyah Putri Auliya Ananda Nabila Putri ANANTA, ASTI Andi Aulia Safirah Andi Maharani Andi Mahrani Anita Septiani Mustamin Antoni, Wahyudi Anugra, Ayu Anugrah Dwi Ansarna Apriliyani, Alya Wulan Arfika Amalia Suryadi Arthanty, Annisa Aspiani Putri Ashilah Aulia Rahmi, Adinda Awal Ramadhan Nasrun Azzahra, Maryam Baharuddin, Siti Hajar Barik Alfito, Ramadan Chintami Darti Akhsa, Amaliah Danang Fatkhur Razak Darti Akhsa, Alvian Tri Putra Dermawan, Rufaida Desvi Dwicki, Dwicki Herlambang Egi Fahrezi Iswan Eka Tanduklangi Fadhil Aditya Fanilda Damayanti Fathin Alwan Tahir Fathuresqi, Fathuresqi Fatkhur Razak, Danang Fatwa, Syafira Fikri, Achmad Haikal Furqan, M Furqan Ramadhanu Ghazali, M. Chaerul Ghina R.S Odja Gina Latifa Akmal Haikal Fikri, Achmad Hakim, Nur Fadillah Hamuddin, Humaera Haslinda Haslinda Hikma, Nurul I, Ikbal Ibrahim, Siti Nur Azizah Imamulkhair, Muhammad Januar Fahrisal Jesica Septiani Manurung Julistio Fadjar Anugrah Sao Kelsia Nelsia Khaera Tunnisa, Khaera Khalifah, Nur Ayu Khumaedi Khumaedi Kuncahya, Figra Dwi Kustanto , Prio Lia Kamila Kulsum Lukman Hakim Lukman Hakim M Furqan Ramadhanu M Yahtadi M. Faiz Ilyas Mar'atuttahirah, Mar'atuttahirah Maratuttahirah Maratuttahirah, Maratuttahirah Marwa Dinda Muchtar Mar’atuttahirah Mar’atuttahirah, Mar’atuttahirah Meiana Sahabuddin Meyrani R Moh. Farel Muh. Al Amin Muh.Daffa Nashwan Rasya Muhammad Akbar Fahrezi Muhammad Alfarizky Yusuf Muhammad Alfian Muhammad Arham Arsyad Muhammad Aril Muhammad Dirga Sopan Muhammad Hasyim Rusmin Muhammad Syawal Muhammad Yusuf Dzaky .J Mulyadi Mulyadi Murtafia Murtafia Nabilah Ramadhani Wowong Najwa, Hafizhah Natasya taslim Noel Ivander Pusung Nugrah Surya Pratama Nur Afiat Nur Azisah Basir Nur Fadillah Hakim Nurfaida Nurfaida Nurfauzi, Muhammad Aqmal Nurhalisah Ramli Nurhalizah, Siti Nurislamiyah Nurislamiyah Nurul Salsabillah Ome, Paulus Jemianus Pusung, Noel Ivander Putri Balqis Putri Dyananda Luqman Putri, Ananda Nabila Rahman, Aldi Fatur Rahmat Eka Putra R Palaloi Ramadhan, Syam Syahru Ramadhani, Alya Rasya, Muh. Daffa Nashwan Razak, Danang Fatkhur Redo Triansyah Reski Septiawan Retno Helviani Revan, Muh Rina Rina Rosmiati Rosmiati Rosmiati Rosmiati Safikah, Nur Saylandra Aulia Ramadhani Septian Rheno Widianto Sesa, Velita Rante Shalza Naya Dwi Fortuna Siti Nurhalizah Stepani Surianti, Besse Suryabuana, Andi Sahra Suryadi, Arfika Amalia Syaddad, Muhammad Shadiq Dzakwan Syafira Fatwa Syafira Fatwa Syam, Akmal Baharuddin Syifa Tri Agusriani taslim, natasya Tri Aditya, Muh Tri Putra Aditya Umi kalsum, Umi kalsum V, Viandra Wahyu Anwar Wildana, Andi Putri Wildana wulan, alya Yonatan Rannu Zahirah, Andi Riah Zulfattah, Abdul Khaliq