Articles
Aplikasi Pembelian Air Minum Isi Ulang Berbasis Android
Fajar Ratnawati;
Muhamad Azren;
Agus Tedyyana
Digital Zone: Jurnal Teknologi Informasi dan Komunikasi Vol. 10 No. 1 (2019): Digital Zone: Jurnal Teknologi Informasi dan Komunikasi
Publisher : Publisher: Fakultas Ilmu Komputer, Institution: Universitas Lancang Kuning
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (535.154 KB)
|
DOI: 10.31849/digitalzone.v10i1.2347
Pembelian air minum isi ulang sebagaimana diketahui adalah salah satu usaha jasa pengisian air minum yang semakin lama semakin banyak dikenal, pada saat ini para pembeli air minum isi ulang harus mendatangi depot hanya untuk membeli air minum isi ulang sehingga membuat masyarakat kesulitan untuk mencari air minum isi ulang, karena pembeli harus mencari lokasi depot terlebih dahulu dan membutuhkan waktu yang cukup lama hanya untuk membeli air minum isi ulang. Oleh sebab itu berdasarkan masalah yang terjadi saat ini, dibuat aplikasi pembelian air minum isi ulang berbasis android. Aplikasi ini untuk melayani masyarakat dalam pembelian air minum isi ulang, dan pengusaha depot untuk membuka peluang usahanya melalui aplikasi tersebut. Aplikasi pembelian air minum isi ulang berbasis android ini dibangun menggunakan bahasa pemrograman Java, PHP dan Database MySQL. Dengan adanya aplikasi ini dapat membantu dalam proses pembelian air minum isi ulang dan memilih jenis air dari depot. Aplikasi ini dapat berjalan dengan baik pada smartphone Android mulai dari versi 4.4.4 (Lollipop) hingga versi 8.0 (Oreo). Selain itu aplikasi ini juga dapat mempermudah kurir depot mengantar air minum isi ulang dengan tracking lokasi konsumen. Kata kunci: : Aplikasi, Android, Pemesanan air minum Abstract The purchase of refill drinking water as it is known is one of the drinking water filling services businesses that are increasingly known, nowadays the buyers of refill drinking water must go to the depot only to buy refill drinking water which makes it difficult for people to find drinking water repeat, because the buyer must look for a depot location first and need a long time just to buy refill drinking water. Therefore, based on the problems that occur at this time, an application for purchasing refillable drinking water based on Android is made. This application is to serve the community in purchasing refill drinking water, and the depot businessman to open his business opportunities through the application. This Android-based refill drinking water purchase application was built using the Java programming language, PHP and MySQL Database. With this application can help in the process of purchasing water to drink refills and choose the type of water from the depot. This application can run well on Android smartphones ranging from version 4.4.4 (Lollipop) to version 8.0 (Oreo). In addition this application can also make it easier for depot couriers to deliver refill drinking water with the location tracking of consumers. Keywords: Application, Android, Ordering drinking water
Implementasi Secure Socket Layer Pada Aplikasi Computer Assisted Test Komisi Pemilihan Umum Bengkalis
Agus Tedyyana
Digital Zone: Jurnal Teknologi Informasi dan Komunikasi Vol. 11 No. 1 (2020): Digital Zone: Jurnal Teknologi Informasi dan Komunikasi
Publisher : Publisher: Fakultas Ilmu Komputer, Institution: Universitas Lancang Kuning
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (824.831 KB)
|
DOI: 10.31849/digitalzone.v11i1.3859
Sistem ujian menggunakan kertas yang selama ini biasa digunakan sering mengalami banyak masalah dalam pelaksanaanya, misalnya dalam pembulatan lingkaran, peserta terkadang sulit untuk melingkari dengan baik, kertas yang sensitif juga bisa rusak atau kotor karena harus mengganti jawaban lingkaran apabila salah saat melingkarinya. Faktor kecurangan merupakan kendala yang paling besar, seiring dengan perkembangan teknologi, untuk mengatasi kendala semua itu penulis merancang suatu sistem yang jauh lebih mudah dalam pelaksanan proses ujian yaitu dengan membuat sistem secara komputerisasi. Metode Computer Assisted Test didefinisikan sebagai tes atau penilaian yang diberikan oleh komputer baik yang bersifat stand-alone maupun yang bersifat dedicated network. Penggunaan Secure Socket Layer (SSL) bertujuan untuk menjaga informasi atau data selama dalam proses pengiriman melalui Internet dengan cara mengenkripsi sehingga hanya penerima informasi yang dapat memahami dari hasil enkripsi tersebut, ini sangat penting karena informasi yang dikirimkan diiInternet membutuhkan proses perjalanan dari komputer ke komputer sampai mencapai server tujuan.Tujuan dari penelitian ini adalah membuat sambuangan secara aman Aplikasi Computer Assisted Test Komisi Pemilihan Umum Bengkalis menggunakan SSL Abstract The examination system uses paper which has been commonly used often to experience many problems in its implementation, for example in rounding circles, participants sometimes find it difficult to circle well, sensitive paper can also be damaged or dirty because they have to replace the circle's answers if it is wrong when circling them. The cheating factor is the biggest obstacle, along with the development of technology, to overcome these obstacles, the authors design a system that is much easier in carrying out the examination process, namely by making a computerized system. The Computer Assisted Test method is defined as a test or assessment given by a computer that is both stand-alone and dedicated network. The use of Secure Socket Layer (SSL) aims to safeguard information or data during the process of sending over the Internet by encrypting it so that only the recipient of the information can understand the encryption results, this is very important because the information sent on the Internet requires a process of traveling from computer to computer until reach the destination server. The purpose of this research is to make a safe discharge of Computer Assisted Test Application Bengkalis General Election Commission using SSL
Threat modeling in application security planning citizen service complaints
Agus Tedyyana;
Fajar Ratnawati;
Elgamar Syam;
Fajri Profesio Putra
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 2: November 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v28.i2.pp1020-1027
The mobile-based service complaint application is one way to implement good governance today. Public facilitated to make complaints without going through a complicated process. Security aspects must be considered to protect user privacy. The security design must be considered so that no one is harmed by the application's users damaged in the application's use. This study used threat modeling during the planning stage of developing a citizen service complaint application to obtain information about vulnerabilities. The researcher uses the threat modeling process that the open web application security project (OWASP) organization has formulated as a framework. The researchers took steps to describe application information, determine and rank threats, countermeasures, and mitigation. In the final stage, the spoofing, tampering, repudiation, information disclosure, denial of service and elevation of privilege (STRIDE) threat modeling methodology is used to analyze and assess mitigation actions against threats in the application. The researcher gets a defense strategy to reduce the danger based on the threat analysis results. Threat modeling in the early phase software development life cycle process is constructive in ensuring that software is developed with adequate security based on threat mitigation from the beginning.
Machine learning for network defense: automated DDoS detection with telegram notification integration
Agus Tedyyana;
Osman Ghazali;
Onno W. Purbo
Indonesian Journal of Electrical Engineering and Computer Science Vol 34, No 2: May 2024
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v34.i2.pp1102-1109
As the prevalence and sophistication of distributed denial of service (DDoS) attacks escalate, the imperative for advanced defense mechanisms becomes paramount, especially in rapidly growing digital landscapes like Indonesia. This research presents the development of an innovative intrusion detection system (IDS) that harnesses machine learning (ML) algorithms to automate the detection of DDoS attacks in real time. By monitoring TCP streams, the system utilizes ML-enhanced IDS components to identify malicious traffic patterns indicative of DDoS activities. An automatic alert is dispatched to network administrators via Telegram upon detection, ensuring immediate awareness and facilitating swift countermeasures. Additionally, the system embodies a self-improving architecture by retraining its ML model with newly encountered attack data, thus continuously refining its detection capabilities. The system's efficacy, marked by its adaptive learning and proactive notification system, not only contributes to the fortification of network security but also underscores the potential for ML in cybersecurity within Indonesia’s expanding digital domain. The deployment of this system is anticipated to significantly bolster cybersecurity infrastructure by addressing the urgent need for advanced and responsive defense strategies against the evolving landscape of cyber threats.
MEMBUAT WEB SERVER MENGGUNAKAN DINAMIC DOMAIN NAME SYSTEM PADA IP DINAMIS
Tedyyana, Agus;
Kurniati, Rezki
Digital Zone: Jurnal Teknologi Informasi dan Komunikasi Vol. 7 No. 1 (2016): Digital Zone: Jurnal Teknologi Informasi dan Komunikasi
Publisher : Publisher: Fakultas Ilmu Komputer, Institution: Universitas Lancang Kuning
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (357.993 KB)
|
DOI: 10.31849/digitalzone.v7i1.554
Abstrak -Web server adalah suatu perangkat yang digunakan untuk menjadi server tidak terbatas hanya untuk publikasi situs web dalam World Wide Web, pada prakteknya server web banyak pula digunakan dalam perangkat-perangkat keras lain seperti printer, router yang menyediakan akses layanan http dalam jaringan lokal. Untuk memiliki sebuah web server yang bisa diakses melalui jaringan dibutuhkan sebuah alamat (IP Address) yang bisa diakses melalui internet berupa Domain Name System. Dinamic Domain Name System adalah solusi bagi yang mengiginkan alamat tersendiri melalui internet Kata kunci: Web server, World Wide Web, IP Address, Domain Name System Abstract- Web server is a device used to be a server is not limited only to the publication of a web site on the World Wide Web , in practice the web server being used in hardware devices such as printers , routers provide access http services in the local network . To have a web server that can be accessed over a network needs an address or IP Addressthat can be accessed via the internet in the form of the Domain Name System. Dynamic Domain Name System is the solution for those who mengiginkan own address via the internet. Keywords: Web server, World Wide Web, IP Address, Domain Name System
Revamp Keamanan Web Service Milik PT XYZ Menggunakan REST API
Tedyyana, Agus;
Fauzi, Muhammad;
Ratnawati, Fajar
Digital Zone: Jurnal Teknologi Informasi dan Komunikasi Vol. 12 No. 1 (2021): Digital Zone: Jurnal Teknologi Informasi dan Komunikasi
Publisher : Publisher: Fakultas Ilmu Komputer, Institution: Universitas Lancang Kuning
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.31849/digitalzone.v12i1.6378
Keamanan data merupakan hal paling utama yang harus dijaga oleh perusahaan guna mendapatkan kepercayaan lebih dari pelanggan. Web service merupakan salah satu teknologi yang rentan terhadap kebocoran data jika tidak dirancang dengan benar. PT. XYZ pada kasus ini telah memiliki web service yang sedang berjalan di sisi production. Namun dari segi keamanan masih ada celah yang harus diperbaiki. Dari hasil studi literatur yang dilakukan, peneliti melakukan rancang ulang dari web service dengan menggunakan REST API yang dibangun pada framework Lumen dengan pertimbangan dari kecepatan load data dan kemudahan deploy di shared hosting. Penelitian dilakukan dengan melakukan melakukan analisis terhadap sistem yang sedang berjalan kemudian dilakukan rancang ulang, implementasi ke sistem, dan pengujian API menggunakan Postman. Dari hasil penelitian didapatkan hasil bahwa Lumen mampu digunakan untuk membangun REST API sesuai dengan rancangan guideline dan mampu mengamankan data-data pelanggan dari akses pihak yang tidak berkepentingan dengan menerapkan token saat pengguna melakukan request ke REST API. Dengan rancang ulang REST API ini, membuat keamanan data pelanggan PT. XYZ lebih menjadi aman lagi, karena tidak bisa diakses secara sembarangan. Abstract Data security is the most important thing that must be maintained by companies to get more trust from customers. Web service is a technology that is prone to data leakage if it is not designed properly. PT. XYZ in this case already has a web service running on the production side. However, from a security point of view, there are still gaps that need to be fixed. From the results of the literature study conducted, researchers redesigned the web service using the REST API which was built on the Lumen framework with consideration of data load speed and ease of deployment on shared hosting. The research was conducted by analyzing the running system and then redesigning it, implementing it to the system, and testing the API using Postman. The results showed that Lumen can be used to build a REST API following the draft guidelines and can secure customer data from unauthorized access by applying a token when the user requests the REST API. With this REST API redesign, making customers data of PT. XYZ is even more secure because it cannot be accessed carelessly.
Platform Monitoring Berbasis Web untuk Sistem Stabilitas dan Pelacakan Kapal Nelayan
Tedyyana, Agus;
Ratnawati, Fajar;
Danuri, Danuri
Digital Zone: Jurnal Teknologi Informasi dan Komunikasi Vol. 14 No. 2 (2023): Digital Zone: Jurnal Teknologi Informasi dan Komunikasi
Publisher : Publisher: Fakultas Ilmu Komputer, Institution: Universitas Lancang Kuning
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.31849/digitalzone.v14i2.16419
Fishing activities in the waters of Bengkalis Island face a number of serious problems, including a lack of data during fishing activities and ship accidents caused by delays in information. In response to this problem, this research proposes the development of a "Web-Based Monitoring Platform for the Stability and Tracking System for Fishing Vessels on Bengkalis Island", or also known as the SMARST tool. Safety is the top priority. SMARST is equipped with an early warning system that uses predictive algorithms to identify potential dangers, such as bad weather conditions. If an emergency occurs, fishermen can immediately contact the authorities via the integrated emergency communications facility. This tool is designed to monitor fishing activities, including monitoring the safety of ships when operating at sea. The implementation of the SMARST tool is expected to increase the success of fishing activities at sea and ensure the safety of fishermen and their vessels. This innovation offers an integrated solution to support the sustainability and efficiency of the fishing industry on Bengkalis Island. The SMARST tool will be able to identify the location of vessels in real-time, ensure their safety from threats such as conflicts with Malaysian authorities and assist in mitigating the risk of accidents. The system was built using an Agile approach, which allows for iterative development and is responsive to user needs. Key functionalities of SMARST include real-time tracking of vessel locations, monitoring vessel conditions, and providing the latest information relevant to fishing activities. From a non-functional perspective, this system emphasizes reliability, ease of use, and scalability.
Enhancing intrusion detection system using rectified linear unit function in pigeon inspired optimization algorithm
Tedyyana, Agus;
Ghazali, Osman;
W. Purbo, Onno
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 2: June 2024
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijai.v13.i2.pp1526-1534
The increasing rate of cybercrime in the digital world highlights the importance of having a reliable intrusion detection system (IDS) to detect unauthorized attacks and notify administrators. IDS can leverage machine learning techniques to identify patterns of attacks and provide real-time notifications. In building a successful IDS, selecting the right features is crucial as it determines the accuracy of the predictions made by the model. This paper presents a new IDS algorithm that combines the rectified linear unit (ReLU) activation function with a pigeon-inspired optimizer in feature selection. The proposed algorithm was evaluated on network security layer - knowledge discovery in databases (NSL-KDD) datasets and demonstrated improved performance in terms of training speed and accuracy compared to previous IDS models. Thus, the use of the ReLU activation function and a pigeon-inspired optimizer in feature selection can significantly enhance the effectiveness of an IDS in detecting unauthorized attacks.
Analisis Efektivitas Rule Snort dalam Mendeteksi Serangan Jaringan
Suci Sekar Sari;
Agus Tedyyana
Repeater : Publikasi Teknik Informatika dan Jaringan Vol. 2 No. 4 (2024): Oktober: Repeater : Publikasi Teknik Informatika dan Jaringan
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.62951/repeater.v2i4.194
The effectiveness of snort rules in detecting network attacks is still a question that needs further research. Although snort rules have been developed and updated regularly, network attacks also continue to evolve and may have patterns that have not been detected by existing snort rules. The main objective is to develop and analyze the effectiveness of snort rules in detecting attack patterns on the network. Benefits Provides a better understanding of the effectiveness of snort rules in detecting network attacks. The result of this research is that the development of snort rules that have been carried out is able to filter attack patterns that were previously undetectable such as DDoS attacks and is able to provide telegram notifications.
Implementasi dan Analisa Sistem Pencegahan Intrusi pada Aplikasi Web Menggunakan Web Application Firewall
Deski Ari Sandi;
Agus Tedyyana
Repeater : Publikasi Teknik Informatika dan Jaringan Vol. 2 No. 4 (2024): Oktober: Repeater : Publikasi Teknik Informatika dan Jaringan
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.62951/repeater.v2i4.196
In the era of information technology advancement, web applications have become a means of seeking information. However, with technological progress, they have become increasingly vulnerable to cyber attacks such as SQL Injection and Cross-Site Scripting (XSS). This research aims to implement the Teler-waf Web Application Firewall (WAF) to protect web applications from such attacks. The research methodology includes the implementation of the Teler-waf WAF, analysis of web application security, and testing the speed of attack detection. The results show that Teler-waf is effective in preventing attacks, and its integration with Telegram bots provides real-time notifications to system administrators, enhancing security responsiveness. This research contributes to strengthening web application security and understanding the role of the Teler-waf WAF in addressing cyber threats.