Claim Missing Document
Check
Articles

Spanning Tree Protocol (STP) Based Computer Network Performance Analysis on BPDU Config Attacks and Take Over Root Bridge Using the Linear Regression Method Yuliani Indrianingsih; Hero Wintolo; Eviana Yulianti Saputri
JOIN (Jurnal Online Informatika) Vol 6 No 2 (2021)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v6i2.703

Abstract

Spanning Tree Protocol (STP) is used in manageable switch devices that apply more than one path to the connection between switches. This study aims to assist engineer staff in improving STP network security. Furthermore, the benefit is to improve the STP network security system by using the Spanning Tree Protocol and Virtual Local Area Network (VLAN) trunking mitigation techniques. The results of testing data before STP is attacked, after STP attacked, and anticipatory data. Then a simple linear regression analysis is carried out by the result of that there is not a significant relationship between time and size in the DoS attack, which  48.6% of the time variable is influenced by the size of  variable, while  the remaining 51.4% by other variables. Root attack is 43.8%-time variable is influenced by size variable, the remaining 56.2% by other variables. Correlation between Karl Pearson DoS and root, there is a significant relationship between time and size, with the DoS correlation coefficient (-0.697) in contrast root (-0.662), and paired sample t-test (paired sample t-test) can be concluded the anticipation which is done by using BPDU guard and root guard mitigation.
PENERAPAN ALOGRITMA LIPAT PADA STEGANOGRAFI YANG MEMANFAATKAN RMS ( RECORD MANAGEMENT SYSTEM ) DI J2ME Wintolo, Hero; Retnowati, Nurcahyani Dewi; Fendriyanto, Prasetyo
SENATIK STT Adisutjipto Vol 1 (2013): Kreativitas Anak Bangsa untuk Kemajuan Teknologi dan Informasi
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28989/senatik.v1i0.38

Abstract

The continued development of technology driven by the growing digital media facilities. A digital device in particular should pay attention to the level of security. Ease of sending messages in both text and image becomes very easy. However, one thing is important in the information, which can be performed using encryption steganography. In this thesis, steganography implemented by utilizing the mobile phone messaging facilities. The process of insertion into the text is converted into a binary image first, then take the final bit of the binary to insert text to be inserted. After the insertion process, the message to be sent by using the provider as the link destination address. The process of sending a message that has been tested on several telecommunication provider in Indonesia indicates the existence of different delivery success rate, but the message until it can not be opened unless the application has been made.
Use of Lipat Algorithm on Android to Secure Data Communication in Social Media Wintolo, Hero; Pujiastuti, Asih; Imam, Muhammad
SENATIK STT Adisutjipto Vol 4 (2018): Transformasi Teknologi untuk Mendukung Ketahanan Nasional [ ISBN 978-602-52742-0-6 ]
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28989/senatik.v4i0.138

Abstract

Cryptography is one of science that learn about securing a message. Message security is done by randomizing the message (encryption) and returned to it’s original form (description). In this study, the designer of the system first and build an application to secure the message by using the Lipat Algorithm method that aims to secure messages consisting of letters, numbers, or symbols. Applications are designed and built running on Mobile Android. The Lipat Algorithm Method applies a fourfold system in the encryption process and the description of the message to be encrypted and in the description will advance 4 (four) characters forward or backward. Based on testing done the application managed to perform the encryption process and description correctly, ranging from short messages to messages as much as 2305 characters.
PENERAPAN GRID COMPUTING UNTUK MENGKOMPILASI PROGRAM BERBAHASA C/C++ Indrianingsih, Yuliani; Wintolo, Hero; Sari, Ika Kartika
SENATIK STT Adisutjipto Vol 1 (2013): Kreativitas Anak Bangsa untuk Kemajuan Teknologi dan Informasi
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28989/senatik.v1i0.41

Abstract

Grid computing is a group of computers that connected to computer network and working together to complete a certain task. The computers inside must be coheren so the processors can work evenly when given a task from server. Grid computing can be used in many areas and purpopes, and in this research it will be used to compile C/C++ program. Compilation is a process to transform a human readable source code into a computer readable code. The compilation process will take place in a personal computer (PC). By using grid system in compilation process, the waiting time of a source code will be reduced as the compilation task will be divided among the computers. For that reason a C/C++ compiler software that using grid computing will be made. The task will be distributed among the computers inside the grid. It can also help someone who want to compile C/C++ source code but he doesn’t have the compiler on his PC. 
Layanan Cloud Computing untuk Mendukung Kinerja Administrasi Database Tanpa Menggunakan Perintah SQL Wintolo, Hero; Retnowati, Nurcahyani Dewi; Ibrahim, Andi Ahmad Iswar
Jurnal ELTIKOM : Jurnal Teknik Elektro, Teknologi Informasi dan Komputer Vol. 4 No. 2 (2020)
Publisher : P3M Politeknik Negeri Banjarmasin

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31961/eltikom.v4i2.174

Abstract

Penelitian ini memiliki tujuan untuk menyediakan layanan dalam bentuk aplikasi untuk melakukan kegiatan Database Manipulation Language (DML) yang diterapkan dalam bentuk cloud computing . Sebanyak tiga buah computer dimanfaatkan untuk memberikan layanan pemrosesan dan penyimpanan database tanpa menggunakan perintah yang ada pada Structure Query Language (SQL) dan satu buah computer digunakan sebagai server yang melayani pengguna untuk melakukan kegiatan DML tanpa menggunakan perintah SQL . Dengan menggunakan teknologi cloud pengelolaan database berbasis SQL yang biasanya menggunakan perintah berbasis command line dapat dilakukan dengan cara yang lebih mudah. Layanan yang diberikan oleh cloud untuk mengelola database berbasis SQL khususnya fungsi DML. Hasil dari implementasi layanan pada jaringan internet, Wireless lan, dan LAN dapat berjalan dengan baik dengan kasus pengujian fungsi pada ketiga media jaringan tersebut. Dengan demikian para pengguna yang sama sekali tidak mengerti bahasa SQL dapat menggunakan layanan ini dengan mudah untuk mengolah database SQL secara mandiri.
ANALISIS DETEKSI PENYUSUP PADA LAYANAN OPEN JOURNAL SYSTEM MENGGUNAKAN METODE NETWORK FORENSIC DEVELOPMENT LIFE CYCLE Wintolo, Hero; Riadi, Imam; Yudhana, Anton
SKANIKA: Sistem Komputer dan Teknik Informatika Vol 8 No 1 (2025): Jurnal SKANIKA Januari 2025
Publisher : Universitas Budi Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36080/skanika.v8i1.3284

Abstract

This study aims to detect intruders on a server computer used for Open Journal System (OJS) services. The server is connected to the internet via a router, making it vulnerable to external attacks. In this research, the tool used is Tripwire, installed on the server computer as the main object. Tripwire functions as a change detection tool for the file system, identifying suspicious activities and recording valid file hashes, verifying file integrity against this record periodically. The system is operated by journal managers from computers connected to the server within the same network address providing OJS services. The method used in this research is the Network Forensic Development Life Cycle (NFDLC), which consists of several stages: initiation, acquisition, implementation, operation, and disposition. Each stage is applied systematically to facilitate the forensic analysis of attacks. The research results show that the NFDLC method is effective in analyzing and detecting intruders in the network. Based on forensic analysis using Tripwire, 12 data losses were found in 7 attack incidents identified on the OJS service. This study successfully demonstrates that the NFDLC method and Tripwire tool are effective in detecting and analyzing intruders attempting to access the OJS service server computer.
The CNN Model with YOLO Architecture for Ultrasonography Images in Early Breast Cancer Detection Ayuningtyas, Astika; Wintolo, Hero; Sumari, Arwin Datumaya Wahyudi; Setyaningsih, Emy; Pujiastuti, Asih; Honggowibowo, Anton Setiawan; Nuryatno, Edi Triono; Kusumaningrum, Anggraini
Journal of Applied Data Sciences Vol 6, No 2: MAY 2025
Publisher : Bright Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/jads.v6i2.587

Abstract

The rapid development of object detection technology has opened new opportunities in the healthcare sector, especially in early cancer detection. This paper presents a deep learning-based breast cancer detection system using ultrasound images. The primary goal of this study is to create a model that can effectively differentiate between malignant and benign breast tumors, assisting in early diagnosis. The proposed system employs the Convolutional Neural Network (CNN) algorithm with You Only Look Once version 5 (YOLOv5) architecture, which is renowned for its high speed and accuracy in object detection tasks. A dataset comprising 10,954 ultrasound images was used to train the model, with 70% allocated for training, 20% for validation, and 10% for testing. The study reveals that the model achieves a high accuracy rate of 92.8% for malignant tumor detection and 99.1% for benign tumors, with precision rates of 99.6% for malignant tumors and 97.5% for benign tumors. These results demonstrate the feasibility of the proposed model as a reliable tool for early breast cancer detection. The findings highlight the potential of deep learning in medical image processing, suggesting that this technology could be further developed into an accessible, efficient early detection system for breast cancer in clinical settings. Future research could explore the integration of additional imaging modalities and the application of this model in real-world healthcare environments
Peningkatan Reputasi Sekolah Melalui Pelatihan Penulisan Artikel Ilmiah Bagi MGBK Madrasah Aliyah Wintolo, Hero; Kusumaningrum, Anggraini; Alriavindra Funny, Rindu; Mulyani, Sri; Triono Nuryatno, Edi
ABDI: Jurnal Pengabdian dan Pemberdayaan Masyarakat Vol 7 No 1 (2025): Abdi: Jurnal Pengabdian dan Pemberdayaan Masyarakat
Publisher : Labor Jurusan Sosiologi, Fakultas Ilmu Sosial, Universitas Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24036/abdi.v7i1.1077

Abstract

Tujuan dari pengabdian ini adalah untuk memberikan pendampingan dalam penulisan artikel ilmiah bagi guru-guru MGBK MA. Pendampingan ini dirancang untuk meningkatkan kemampuan menulis dan publikasi ilmiah para guru, sehingga mereka dapat berkontribusi dalam pengembangan ilmu pengetahuan dan pendidikan di Indonesia. Metode yang digunakan dalam pendampingan ini meliputi pelatihan, workshop, dan bimbingan individu yang dilakukan secara intensif. Pelatihan efektif dalam meningkatkan pemahaman teori dan dasar-dasar penulisan ilmiah. Workshop sangat efektif dalam membantu peserta memahami struktur jurnal dan teknik penulisan. Pendampingan Individu sangat efektif untuk memastikan keberhasilan penulisan artikel karena memberikan bimbingan langsung sampai tahap akhir. Hasil dari kegiatan ini menunjukkan peningkatan signifikan dalam kualitas dan kuantitas artikel ilmiah yang dihasilkan oleh para guru. Berdasarkan hasil evaluasi pre-test dan post-test, terjadi peningkatan pemahaman peserta mengenai struktur dan kaidah penulisan artikel ilmiah, di mana seluruh peserta mengalami perbaikan skor setelah mengikuti pelatihan. Selain itu, 100% artikel yang dihasilkan oleh para guru sebagai peserta pengabdian ini telah berhasil diunggah ke Cakrawala Jurnal Ilmiah Bidang Sains. Partisipasi aktif dalam pendampingan ini juga meningkatkan motivasi dan kepercayaan diri guru dalam menulis dan mempublikasikan karya ilmiah, sebagaimana dibuktikan dengan peningkatan jumlah peserta yang berhasil memahami teknik sitasi, penggunaan referensi berbasis database akademik, serta format penulisan yang sesuai dengan standar jurnal ilmiah. Dengan demikian, program pendampingan ini terbukti menjadi model yang efektif untuk diterapkan di institusi pendidikan lainnya guna meningkatkan budaya menulis dan penelitian di kalangan para guru, serta berkontribusi pada peningkatan reputasi akademik sekolah.
Post Attack Mitigation on Open Journal System Services using Knowledge Understanding Assessment Defense (KUAD) Method Wintolo, Hero; Riadi, Imam; Yudhana, Anton
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 10, No. 4, November 2025 (Article in Progress)
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v10i4.2279

Abstract

This study was conducted to find evidence of attacks and restore data after an attack on the Open Journal System (OJS) service hosted on a computer server. The method used in this research is a new approach developed from the previous Network Forensic Digital Life Cycle (NFDLC) method. This new method, KUAD, consists of several stages for collecting evidence of cyber attacks and restoring data post-attacks. The stages in the KUAD method include initiation, acquisition, execution, mitigation, and disposition. Compared to the previous one, the novelty of this method lies in the mitigation phase, which aims to restore data or documents after an attack. The tool used to detect attacks and gather evidence is Tripwire, while the tool used to recover lost data is Crontab, which executes backup commands using rsync in four steps. Tripwire detects attacks by displaying the number of files added, deleted, or modified. This backup technique successfully recovered a hundred deleted files in .docx, .pdf, and .jpg formats. The success rate of this technique in performing post-cyber attack mitigation reaches 100%.
Co-Authors . Sudaryanto Addiwinoto, Gunawan Aditya Wisnu Pratama Aditya, Reza Aditya, Reza Aji, Bimio Wahyu Alriavindra Funny, Rindu Amalia Farhati Aminuyati Anggaraini Kusumaningrum Anggit Tri Widiastuti Anggit Tri Widiastuti, Anggit Tri Anggraini Kusumaningrum Anggraini Kusumaningrum Anggraini Kusumaningrum, Anggraini Anton Setiawan Honggowibowo Anton Setiawan Honggowibowo Anton Setiawan Honggowibowo Anton Yudhana Arief Dwi Nugroho ARIF HIDAYATULLAH Arwin Datumaya Wahyudi Sumari Astika Ayuningtyas Astika AyuningTyas, Astika Astuti, Ellyana Mega Dewantri Bambang Sudibya Bambang Sudibya, Bambang Basuki Nugroho Susanto Basuki Nugroho Susanto, Basuki Nugroho Bimio Wahyu Aji Chris Tri Widyarto Christoporus Galih Pramudito Deny Hp., Fathul Fata Derry Purnamasari Derry Purnamasari, Derry Devia Tito Setyaningsih Dwi Nugrahenny Dwi Nugrahenny, Dwi Dwi Nugraheny Dwi Nugraheny Dwi Nugraheny Dwi Nugraheny, Dwi Dwi Paradita, Lalu Septian Emy Setyaningsih Evi Wahyuningsih Eviana Yulianti Saputri Fathul Fata Deny Hp. Fera Suprapti Friska Ayu Dhawara Galih Andita Sukma Gilang Wiratmaja Gregorius Ferdian F.D.Setyawan Gunawan Addiwinoto Habib Satrio Atmojo Handoko Widya Kusuma Harliyus Agustian HARLIYUS AGUSTIAN Haruno Sajati Hasibuan, Piniel Romulia Ibrahim Saleh Ibrahim, Andi Ahmad Iswar Ida Ayu Putu Sri Widnyani Imam Riadi Irawaty, Mardiana Khairur Razikin Lalu Septian Dwi Paradita Lalu Suwandi Yusuf Moh.Bambang Haryo Seto Muhamad Hafish Muhammad Imam, Muhammad Muhammad Rivai Ngadiyono Ngadiyono, Ngadiyono Nurcahyani Dewi Retnowati Nurcahyani Dewi Retnowati Nuryatno, Edi Triono Omara, Safik Piniel Romulia Hasibuan Pradana Nur Prasetya Pramudito, Christoporus Galih Prasetya, Pradana Nur Prasetyo Fendriyanto, Prasetyo Pratama, Aditya Wisnu Prayogi, Yogi Priyo Pujiastuti, Asih Qurniawan, Wawan Razikin, Khairur Rivcky Septianto RIYAN ANDRIYANTO Safik Omara Saiful Bahri Salam Aryanto Saleh, Ibrahim Septianto, Rivcky Setyaningsih, Devia Tito Setyoadi, Wangsit Sri Mulyani Sudaryanto Sudaryanto Suhirman Sukma, Galih Andita Sumarsono Sumarsono Sumarsono Sumarsono Suprapti, Fera SUWITO SUWITO Suwito Suwito Syafrudin Abdie Triono Nuryatno, Edi Wahyu Hamdani Wangsit Setyoadi Wawan Qurniawan Widyarto, Chris Tri Wiratmaja, Gilang Wiwik Handayani Yenni Astuti Yenni Astuti, Yenni Yogi Priyo Prayogi Yuliani Indrianingsih Yuliani Indrianingsih Yuliani Indrianingsih Yuliani Indrianingsih Yuliani Indrianingsih Yusuf, Lalu Suwandi Zulham Zulham Zuliana Zuliana Zuliana, Zuliana