Claim Missing Document
Check
Articles

Found 9 Documents
Search

Network Forensics Against Address Resolution Protocol Spoofing Attacks Using Trigger, Acquire, Analysis, Report, Action Method Agus Wijayanto; Imam Riadi; Yudi Prayudi; Tri Sudinugraha
Register: Jurnal Ilmiah Teknologi Sistem Informasi Vol 8 No 2 (2022): July
Publisher : Information Systems - Universitas Pesantren Tinggi Darul Ulum

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26594/register.v8i2.2953

Abstract

This study aims to obtain attack evidence and reconstruct commonly used address resolution protocol attacks as a first step to launch a moderately malicious attack. MiTM and DoS are the initiations of ARP spoofing attacks that are used as a follow-up attack from ARP spoofing. The impact is quite severe, ranging from data theft and denial of service to crippling network infrastructure systems. In this study, data collection was conducted by launching an test attack against a real network infrastructure involving 27 computers, one router, and four switches. This study uses a Mikrotik router by building a firewall to generate log files and uses the Tazmen Sniffer Protocol, which is sent to a syslog-ng computer in a different virtual domain in a local area network. The Trigger, Acquire, Analysis, Report, Action method is used in network forensic investigations by utilising Wireshark and network miners to analyze network traffic during attacks. The results of this network forensics obtain evidence that there have been eight attacks with detailed information on when there was an attack on the media access control address and internet protocol address, both from the attacker and the victim. However, attacks carried out with the KickThemOut tool can provide further information about the attacker’s details through a number of settings, in particular using the Gratuitous ARP and ICMP protocols.
TAARA Method for Processing on the Network Forensics in the Event of an ARP Spoofing Attack Agus Wijayanto; Imam Riadi; Yudi Prayudi
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 7 No 2 (2023): April 2023
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v7i2.4589

Abstract

According to reports in 2021 by Kaspersky, requests for investigations into suspicious network activity, such as ARP Spoofing, which can result in sophisticated attacks, reached up to 22%. Several difficulties with examining network systems have been overcome thanks to network forensic investigations. This study aims to perform a network forensic analysis of ARP spoofing attacks using Wireshark forensic tools and Network Miner with a sniffer design process to capture traffic on the router side. In order to gather reliable evidence, this study employs the TAARA method as a network forensic investigation process. Based on the research conducted, it can be demonstrated that an attack took place from eight PCAP files. The information that was gathered, such as the IP address and MAC address of the attacker, the IP address and MAC address of the target, and the date and time of the attack are examples of evidence information that was gathered. This study also shows that network forensic operations can use the Wireshark forensic tool to obtain more detailed data.
Analisis Kasus Kehilangan Data Akibat Format dan Pemulihan Data Menggunakan Aplikasi Wondershare Recoverit Purnama, Wahyu Aji; Servanda, Yustian; Djumhadi; Wijayanto, Agus
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 8 No 4 (2024): OCTOBER-DECEMBER 2024
Publisher : Lembaga Otonom Lembaga Informasi dan Riset Indonesia (KITA INFO dan RISET)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v8i4.2367

Abstract

Data loss is a prevalent issue encountered by computer users, often arising from accidental formatting of storage media. This study examines a specific instance of data loss on a flash disk due to accidental formatting and evaluates the efficacy of Wondershare Recoverit, a widely-used data recovery application. The research employs a case study approach, simulating a scenario in which a flash disk is inadvertently formatted, leading to data loss. The findings indicate that Wondershare Recoverit is an effective tool for recovering data lost due to formatting. The application features an intuitive and user-friendly interface, making it accessible to users with varying levels of technical expertise. Wondershare Recoverit can recover a wide range of file types, including photos, videos, documents, and other files lost due to formatting. Furthermore, the application supports data recovery from various storage devices, such as internal and external hard drives and other media
Penerapan Hybrid Cloud dan External Radius Server untuk Optimalisasi Manajemen Jaringan Wijayanto, Agus; Djumhadi, Djumhadi; Alimyaningtias, Wahyu Nur; Zabrina, Rana
JBASE - Journal of Business and Audit Information Systems Vol 7, No 2 (2024): JBASE - Journal of Business and Audit Information Systems
Publisher : Universitas Bunda Mulia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30813/jbase.v7i2.6059

Abstract

Dalam konteks kebutuhan manajemen jaringan yang semakin kompleks sehingga organisasi menghadapi tantangan besar dalam mengelola infrastruktur TI secara efisien. Penerapan teknologi hybrid cloud dan integrasi dengan sistem otentikasi eksternal, seperti RADIUS server, memberikan solusi untuk mengatasi tantangan ini. Masalah utama yang dihadapi meliputi pengelolaan skala besar infrastruktur jaringan, kebutuhan untuk memastikan ketersediaan layanan, serta pengelolaan otentikasi yang handal. Penggunaan teknologi hybrid cloud bertujuan untuk mengoptimalkan penggunaan sumber daya dengan fleksibitas. Penelitian ini mengeksplorasi penerapan teknologi hybrid cloud dan RADIUS server untuk mengatasi masalah ini dengan menerapkan metode Cisco's Lifecycle Services Approach yang mencakup tahapan prepare, plan, design, implement, operate, dan optimize. Metode ini digunakan untuk merancang dan mengimplementasikan solusi yang memenuhi kebutuhan organisasi, serta untuk mengevaluasi efektivitas berdasarkan aspek teknis. Hasil dari penelitian menunjukkan bahwa penerapan hybrid cloud dan sistem otentikasi eksternal berhasil meningkatkan performa dan keamanan jaringan, serta memastikan manajemen jaringan yang lebih efisien dan skalabel. hasil pemantauan menunjukkan bahwa performa jaringan memenuhi standar yang diharapkan dengan throughput rata-rata 91,6%, latency 18,5 ms, 31,3 ms dan packet loss 0,20%. Meskipun hasil menunjukkan kinerja yang baik, terdapat kebutuhan untuk perbaikan lebih lanjut dalam aspek keamanan jaringan dan integrasi sistem.
Pelaksanaan Program Pengabdian di Baru Ilir Tentang UMKM, Imunisasi Polio, Edukasi Pendidikan dan Toga Wijayanto, Agus; Wulan, Nadia Agustin Nawang; Elvina, Amanda; Barus, Lidiya Anggreny Br; Pramesty, Natasha; Annisa, Qhaerun; Febri Nuraini, Putri; Sutariya, Muhammad Faridan; Nasrul; Indriani, Lita; Agustian, Anugrah Tri; Rahmadini, Nadia Putri; Wardhana, Muhammad Irfan; Fadillah, Muhammad; Hendri; Arif, Ratna; Yosita, Disna; Andriani, Salis; Andini, Aulia; Yumna Nuhashofa, Salma Daarin; Nugraha, Yudhisthira Arya; Fadhillah, Alfan Qais
BERBAKTI : Jurnal Pengabdian Kepada Masyarakat Vol 2 No 2 (2024): BERBAKTI: Jurnal Pengabdian Kepada Masyarakat | September 2024
Publisher : Fakultas Keguruan dan Ilmu Pendidikan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30822/berbakti.v2i2.3692

Abstract

Program Kuliah Kerja Nyata (KKN) merupakan salah satu bentuk pengabdian kepada masyarakat yang bertujuan untuk meningkatkan keterampilan mahasiswa dalam memecahkan masalah yang ada di wilayah baru ilir. Terlaksananya program kerja mahasiswa dalam menjalankan program KKN ini menjadi indikator penting bagi keberhasilan program KKN secara keseluruhan. Pengabdian ini bertujuan untuk memberikan pengetahuan dan pemahaman secara langsung mahasiswa dengan lingkungan sekitar di Baru Ilir, dengan fokus pada perencanaan, implementasi kegiatan, serta evaluasi pelaksanaan menjadi pembasahan. Metodologi yang diajukan ini melibatkan lima tahapan utama: perencanaan, implementasi kegiatan, pengumpulan data melalui kuesioner, observasi, dan dokumentasi, analisis data menggunakan skala Likert, serta evaluasi. Hasil evaluasi berdasarkan analis menunjukkan bahwa mayoritas mahasiswa memperoleh penilaian "Baik" (37,03%) dan "Sangat Baik" (33,21%) dalam berbagai aspek yang dievaluasi, terutama dalam etika, disiplin, inisiatif, dan kreativitas. Namun, ada juga area yang memerlukan perhatian lebih, dengan 25,14% responden berada dalam kategori "Cukup," menandakan perlunya peningkatan lebih lanjut. Mayoritas nilai cukup 25,14% masih terlalu besar sehingga menjadi catatan khusus agar pelaksanaan KKN berikutnya bisa mengurangi nilai ini dengan memberikan masukan kepada institusi untuk memperbaiki pedoman dan peraturan. Namun, Secara keseluruhan semua program yang disusun ke dalam program kerja KKN berhasil terlaksana sepenuhnya.
Analysis of the Effectiveness of the Recovery Toolkit for Storage Media Using a Criteria-Based Evaluation Approach Purnama, Wahyu Aji; Djumhadi, Djumhadi; Servanda, Yustian; Wijayanto, Agus
JBASE - Journal of Business and Audit Information Systems Vol 8, No 1 (2025): JBASE - Journal of Business and Audit Information Systems
Publisher : Universitas Bunda Mulia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30813/jbase.v8i1.8062

Abstract

In the rapidly developing digital era, the use of various storage media is also increasing. However, data loss can occur for various reasons, including user error in formatting storage media. Therefore, data recovery techniques become an important way to restore lost information. Thus, this study aims to compare the effectiveness of the Wondershare Recoverit and EaseUS Data data recovery toolkits in the storage media data recovery process using a criteria-based evaluation approach. This study uses the Experiment method as a stage to test the performance of both toolkits, with a focus on evaluating and comparing the effectiveness of both data recovery tools in finding the amount of data, the speed of the data recovery process, and the quality of the data that has been successfully recovered. Testing is carried out using formatted storage media to determine the level of success of the two toolkits. The results of the study will show the effectiveness of the data recovery toolkit between EaseUS Data and Wondershare Recoverit.
A Komparasi Penggunaan AC-OF-SM-1B (Kabel Dc 1 Seling) Dengan AC-OF-SM-1-3SL (Kabel Dc 3 Seling) Dalam Keamanaan Jaringan Kabel Fiber Optik Omar, Dhafid; Juvent Alessandro Patuden; Yustian Servanda; Agus Wijayanto
Journal Of Informatics And Busisnes Vol. 3 No. 1 (2025): April - Juni
Publisher : CV. ITTC INDONESIA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47233/jibs.v3i1.2833

Abstract

Fiber optic cable network security is a crucial aspect in ensuring the quality of service and sustainability of telecommunications infrastructure. One important element in the installation of such a network is the selection of the type of Drop Core (DC) cable used, especially in distribution areas that are prone to physical and environmental disturbances. This study discusses the comparison between two types of DC cables commonly used, namely AC-OF-SM-1B (DC cable with 1 strand) and AC-OF-SM-1-3SL (DC cable with 3 strand), in the context of effectiveness on fiber optic network security. This study was conducted using direct field observation methods, supported by discussions with technicians in the field, and evaluation of historical data on disturbances and damage from the use of both types of cables. The findings show that AC-OF-SM-1-3SL has a stronger structure, is able to withstand tensile loads and external pressure better, and is more resistant to environmental disturbances such as strong wind gusts and intervention from human activities. Meanwhile, AC-OF-SM-1B cables are lighter and more economical but have a higher level of vulnerability to external disturbances. These findings are expected to be a technical reference in making decisions regarding the selection of cable types in fiber optic network projects, especially in areas with a high risk of physical disruption.
SISTEM PENDUKUNG KEPUTUSAN DALAM MENENTUKAN TENAGA RADIOGRAFER DENGAN MENGGUNAKAN METODE MULTI ATTRIBUTE UTILITY THEORY (MAUT) Arifin, Zainal; Ramadhan, Ahmad; Servanda, Yustian; Wijayanto, Agus
Jurnal Komputer dan Teknologi Vol 4 No 2 (2025): JUKOMTEK JULI 2025
Publisher : Yayasan Pendidikan Cahaya Budaya Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.64626/jukomtek.v4i2.408

Abstract

Radiografer adalah tenaga kesehatan profesional yang mengoperasikan peralatan medis berbasis radiasi seperti LINAC dan CT Simulator, khususnya di instalasi onkologi radiasi rumah sakit. Proses perekrutan radiografer memerlukan pendekatan sistematis agar sesuai dengan kebutuhan klinis dan operasional. Penelitian ini bertujuan membangun sistem pendukung keputusan (SPK) menggunakan metode Multi-Attribute Utility Theory (MAUT) untuk membantu seleksi tenaga radiografer secara objektif. MAUT digunakan karena mampu menangani banyak kriteria dan menghasilkan perangkingan alternatif berdasarkan nilai utility. Kriteria yang digunakan meliputi pendidikan terakhir, pengalaman kerja, komunikasi dan etika wawancara, penguasaan alat radioterapi, penggunaan software RIS/PACS, serta sertifikasi tambahan. Bobot ditentukan melalui diskusi bersama ahli dari instalasi onkologi dan SDM. Hasil penelitian menunjukkan bahwa kandidat A2 dan A3 memiliki nilai utility tertinggi sebesar 0,80, diikuti A1 dengan 0,70, sehingga direkomendasikan sebagai 3 kandidat radiografer di Instalasi Onkologi Radiasi RSUD dr. Kanujoso Djatiwbowo Balikpapan. Sistem ini terbukti dapat meningkatkan keakuratan seleksi, mengurangi subjektivitas, dan mempercepat proses rekrutmen. SPK ini berpotensi diterapkan lebih luas dan dikembangkan dalam bentuk aplikasi berbasis web ataupun mobile dengan penambahan variabel seperti uji praktik atau psikotes.
Virtual Local Area Network for Optimizing Network Performance using Simplified Form of Action Research Abdillah, Muhammad Fahmi; Wijayanto, Agus; Pamungkas, Wisnu Hera
Journal of Applied Informatics and Computing Vol. 9 No. 4 (2025): August 2025
Publisher : Politeknik Negeri Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30871/jaic.v9i4.10141

Abstract

Virtual Local Area Network (VLAN) is an effective solution for improving network performance and efficiency in educational environments, particularly in computer laboratories. This study aims to implement and evaluate VLAN at the Computer Laboratory of Universitas Mulia using a simplified action research approach involving a single intervention cycle. The initial diagnosis revealed that the conventional flat network topology resulted in a broad broadcast domain and reduced performance under high traffic conditions. Through VLAN segmentation, the laboratory was logically divided into five segments based on functionality. Evaluation was conducted using throughput measurement and Quality of Service (QoS) indicators, including packet loss, delay, and jitter, based on TIPHON standards. The results indicated consistent improvements in data flow and stability, with reduced packet loss under 0,3% and average delay and jitter remaining below 20 ms across all segments. In addition to technical improvements, interviews with the network administrator highlighted significant benefits in bandwidth management and traffic control during examinations. This study demonstrates that a simplified approach can be replicated in similar educational institutions with limited resources and provides a foundation for more structured and controlled network development.