Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : Faktor Exacta

Orkestrasi Cloud Dengan Chef, Menuju Keselarasan Sistem Otomasi Teknologi Informasi Suryo Bramasto; Melani Indriasari; Endang Ratnawati D.
Faktor Exacta Vol 13, No 3 (2020)
Publisher : LPPM

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30998/faktorexacta.v13i3.6426

Abstract

Abstrak. Penelitian pada artikel ini mengimplementasikan orkestrasi dari otomasi layanan-layanan teknologi informasi berbasis cloud,  yang mana dari sisi pengguna merupakan solusi-solusi bisnis. Orkestrasi dilakukan dengan salah satu mesin orkestrasi yakni Chef. Layanan-layanan teknologi informasi yang otomasi pembangunan dan pengelolaannya pada cloud diorkestrasi dengan Chef dibangun dengan web server Apache, database server MySQL, dan load balancer Nginx. Orkestrasi dilakukan dengan membangun arsitektur mesin orkestrasi spesifik yakni Chef pada layanan cloud AWS (Amazon Web Services), kemudian membuat recipes dan cookbooks pada Chef yang berisi perintah-perintah otomasi dan orkestrasi layanan-layanan teknologi informasi. Orkestrasi memungkinkan sebagian besar pekerjaan dari system administrator untuk dilakukan secara otomatis bahkan pada layanan-layanan IT berbasis Cloud yang kompleks, dengan tetap memungkinkan untuk dilakukan pengelolaan layanan sebagaimana yang biasa dilakukan oleh system administrator pada sub-sub sistem dari layanan-layanan IT. Selain itu orkestrasi pada implementasinya akan sangat mendukung pendekatan DevOps pada rancang bangun piranti lunak sebagai sub sistem utama dari layanan IT. Kata Kunci: Chef, cloud, DevOps, orkestrasi, otomasi
Simulator Arsitektural Dari Sirkuit Elektronis Guna Tujuan Pembelajaran Suryo Bramasto; Sunarto Sunarto
Faktor Exacta Vol 11, No 3 (2018)
Publisher : LPPM

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1503.249 KB) | DOI: 10.30998/faktorexacta.v11i3.2784

Abstract

The electronic circuit engineering learning processes generally requires specific infrastructures which sometimes constrained to cost factors in the procurement. Circuit simulator could be an alternative as electronic circuit engineering learning tool. Architectural simulation provides designers the ability to quickly examine a wide variety of design choices. The recent trend in system design toward architectures that react to circuit-level phenomena has outstripped the capabilities of traditional cycle-based architectural simulators. In this paper, a simulator that incorporates a circuit modeling capability, permitting architectural-level simulations that react to circuit characteristics (such as latency, energy, power brightness, or current draw) on a cycle-by-cycle basis is presented. As for learning purpose, circuit template and pre-built circuits for many categories are provided. The environment enables process visualization and simulation of analog and digital circuits. The system enables the creation of many laboratory exercises, which offer students opportunities to follow visually characteristic processes in analog and digital circuits. At this research, Rational Unified Process (RUP) software process model and Object Oriented Programming (OOP) are implemented.Keywords: architectural simulation, circuit simulation, learning, RUP, OOP
Menelaah Lalu Lintas Jaringan Internet Relay Chat (IRC) Yang Berbahaya guna Identifikasi Komunikasi Botnet “Plague” Suryo Bramasto
Faktor Exacta Vol 12, No 2 (2019)
Publisher : LPPM

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30998/faktorexacta.v12i2.3549

Abstract

The research presented in this article aims to identify “plague” botnet communication pattern, with the aid of Wireshark Packet Analyzer as proof of concept (PoC) towards unique communication pattern analysis between infected host and botnet. The research is conducted on public IRC (Internet Relay Chat) network, specifically at the opened domain for botnet research, that is, irc.accesox.net. COMODO Internet Security also used for determining files downloaded by the botnet to identify whether there any malware or not. The observation is done on 60 captured packets, which then the TCP stream excerpt and the protocols hierarchy statistic from those packets being analyzed. Based on the analysis of TCP stream excerpt and the protocols hierarchy statistic, the communication pattern between bot, botmaster, and infected host are known. Wireshark could show the data inside the TCP stream excerpt and all captured protocols. The conducted analysis on TCP stream excerpt and protocols hierarchy statistic is based on RFC 2812 (Internet Relay Chat: Client Protocol – IETF Tools). The analysis on TCP stream excerpt and protocols hierarchy statistic yield botnet activity information for the next step of the analysis of botnet attack, which is dataset and prediction model building. The prediction model can then be implemented to predict whether network traffic is safe or harmful.       Keywords: botnet, COMODO internet security, Internet Relay Chat (IRC), RFC 2812, Wireshark
Electronic Voting (e-voting) sebagai Aplikasi Terdesentralisasi pada Vexanium Blockchain Bramasto, Suryo; Savitri, Sandriana Febia; Djuwitaningrum, Endang Ratnawati
Faktor Exacta Vol 17, No 2 (2024)
Publisher : LPPM

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30998/faktorexacta.v17i2.19405

Abstract