Akbar , Abdussalam Al
Unknown Affiliation

Published : 6 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 6 Documents
Search

Implementation of Snort as a Wireless Network Security Detection Tool Using Linux Ubuntu Insani, Puteri Puji; Kanedi , Indra; Akbar , Abdussalam Al
Jurnal Komputer, Informasi dan Teknologi Vol. 3 No. 2 (2023): Desember
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v3i2.1488

Abstract

Implementation of snort as a wireless network security detection tool using linux ubuntu by adding a server that is used to observe activities on a wireless network, if there is an activity that is considered dangerous by the client, the information will be stored in the snort log and database. The web-based front-end uses BASE (Basic Analysis and Security Engine) which can be accessed through a browser with the url : IPaddressServer/base/. The information provided is related to attacks detected by snort that have been stored in the database. The information is in the form of source and destination IP addresses, the type of attack that occurred. Based on the tests carried out, it was found that the implementation of snort as a wireless network security detection tool using linux ubuntu can help detect attacks that occur on the network and provide information related to these attacks.
Implementation Of A Combination Of Stream Cipher Algorithm And Rotate 13 For Data Security Mukrozi, Ikhsan Tri; Sapri, Sapri; Akbar , Abdussalam Al
Jurnal Komputer, Informasi dan Teknologi Vol. 4 No. 1 (2024): June
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v4i1.1727

Abstract

The issue of data security and confidentiality is one of the important aspects of data, messages and information. Stream Cipher is often referred to as a stream cipher. The advantage of this method is that it is relatively faster in the encryption-decryption process and is also not limited by the length of the plaintext. ROT13 is a substitution cipher encryption by shifting characters forward 13 times, counting 1 character in front of it, and shifting characters based on the order of characters in the ASCII table. By combining the Stream Cipher and ROT13 algorithms, it produces a method that can provide a better level of security compared to the application of each of these methods separately. The results of the analysis and testing carried out using different decryption keys resulted in the ciphertext cannot be returned which shows normal things because the method used is symmetrical cryptography so that the decryption process can only be done using the same key as the key during decryption.
Implementation Of Network Device Monitoring System Using Snmp Protocol With Email Notification At Smk N 2 Seluma Sakti, Pauzan; Sapri, Sapri; Akbar , Abdussalam Al
Jurnal Komputer, Informasi dan Teknologi Vol. 4 No. 1 (2024): June
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v4i1.1732

Abstract

SMK N 2 Seluma currently has a network and is also connected to the internet network, the computer network is used for teaching and learning activities for students and the work of teachers and education staff, the SMK N 2 Seluma computer network still often occurs disturbances in devices that support networks such as access points (often laptop users connect for a long time and even cannot connect to the network). This research aims to monitor network devices using the SNMP protocol on the SMK N 2 Seluma computer network. The research used an experimental method. In monitoring devices on the SMK N 2 Seluma computer network using the SNMP protocol found in the Nagios application. Nagios monitors devices on the network such as connected or not connected, device memory, device storage (HDD) and other monitoring. In monitoring devices on the network Nagios works well, which can monitor according to the script configured on the main Nagios Core system. For notifications will be sent via email that has been set (admin email) in the form of device down conditions. With the monitoring system using the SNMP protocol, it will make it easier for admins to perform maintenance on the network.
Implementation Of Open Source Security Information Management (OSSIM) On Security Computer Network Putra, Angga Ardian; Sapri, Sapri; Akbar , Abdussalam Al
Jurnal Komputer Vol 1 No 1 (2022): Juli-Desember
Publisher : CV. Generasi Insan Rafflesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70963/jk.v1i1.14

Abstract

This research is entitled APPLICATION OF Open Source Security Information Management (OSSIM) in Computer Network Security. Which aims to build a system that can monitor and monitor computer network security at SMA Negeri 1 Seluma. Where in monitoring and network security an Open Source Security Information Management (OSSIM) system is used which utilizes kibana and security uses Squert using the Linux Ubuntu Server 20.04 operating system. In monitoring the network, Kibana can monitor computer network activities properly including monitoring activities based on the service used, from the results of this monitoring which if there are activities that are not allowed such as opening gambling sites and others, security or blocking of squert will be carried out. Overall the monitoring and security system is running well. Linux operating system ubuntu server 20.04 is very good at running kibana and squert to monitor and monitor computer network security at SMA N 1 Seluma.
Designing Rt/Rw Net In Implementing Load Balancing Using Per-Connection Classifier Method In Bumi Mas Housing Saputra, Febri Wangsa; Aspriyono, Hari; Akbar , Abdussalam Al
Jurnal Komputer Vol 1 No 1 (2022): Juli-Desember
Publisher : CV. Generasi Insan Rafflesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70963/jk.v1i1.15

Abstract

The need for the internet during the current COVID-19 pandemic is very high, because students, college students, office employees and others have to do all activities at home. This causes increase in connection traffic on the internet and workloads on internet service provider servers. RT/RW-Net is a concept where several computers in a housing or block can be interconnected and can share data and information. To solve this problem, a load balancing technique is applied, namely load distribution and setting the client connection path to a service that is on the server by utilizing the connection distribution method using the PCC (Per-Connection Classifier) method. The result of this research is it has succeeded in designing RT/RW-Net in Bumi Mas Housing by implementing Load Balancing using the Per-Connection Classifier (PCC) method. In implementing Load Balancing and Per-Connection Classifier (PCC) it can solve the problem when one of the ISPs is interrupted or the internet network is disconnected, the connection will automatically be transferred to an active ISP. So that network performance continues to run normally and also with load balancing with the PCC method it doesn't burden traffic and actually divides the load.
Implementasi Algoritma Cryptography Clasic Dalam Penyandian Pada Aplikasi Chatting Berbasis Client Server Saputra, Ripo; Jumadi , Juju; Akbar , Abdussalam Al
Jurnal Komputer Vol 2 No 1 (2023): Juli-Desember
Publisher : CV. Generasi Insan Rafflesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70963/jk.v2i1.67

Abstract

Security and confidentiality issues are one of the important aspects of data, messages and information. One technique that can maintain data confidentiality is cryptography. Vigenere Cipher is one of the classic cryptographic algorithms that works by reading words per character, where if the message sent exceeds the length of the key used, the key will be repeated until the message sent gets each key. The system implementation uses Visual Basic 2010 programming language and the method used in this research is waterfall, this application is designed using UML (Unified Modeling Language). The result of this research is a software application that is useful for maintaining the confidentiality of messages with the Vigenere Cipher algorithm method. With this application can be one solution in securing data in the chat process.