Claim Missing Document
Check
Articles

Found 28 Documents
Search

INVESTIGASI CLOUD FORENSIC PADA DISK VOLUME AWS EC2 STUDI KASUS PENETRATION TESTING TERHADAP INSTANCE Andriyan Dwi Putra; Joko Dwi Santoso; Adrian Raditya Rahma; Ipung Ardiansyah
Jurnal Teknologi Informasi dan Komputer Vol. 9 No. 5 (2023): Jurnal Teknologi Informasi dan Komputer
Publisher : LPPM Universitas Dhyana Pura

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36002/jutik.v9i5.2648

Abstract

Implementasi teknologi cloud computing pada sektor industri saat ini sudah berkembang cukup cepat. Cepatnya perkembangan development dari sisi teknologi dan arsitektur cloud computing menjadi tantangan baru pada kasus digital forensik dalam mencari bukti potensial pada penanganan kasus cybercrime. EC2 instance merupakan salah satu layanan infrastructure as a service (IAAS) milik provider Amazon Web Service (AWS) yang banyak digunakan perseorangan maupun perusahaan dalam menangani kebutuhan infrastruktur layanan server. Hal ini menjadi dasar peneliti untuk melakukan analisis forensik pada sektor cloud dengan mengangkat studi kasus proses investigasi pada skenario aktivitas hacking EC2 instance menggunakan metodologi National Institute of Standards Technology (NIST). Berdasarkan hasil analisis artefak filesystem timeline dan log system yang diperoleh dari barang bukti volume disk instance, peneliti berhasil membuktikan skenario aktivitas serangan information gathering, eksploitasi dan post exploitation. Pada phase Information Gathering & Exploitation di temukan dua serangan yang dilakukan attacker yaitu Web Path Bruteforce di sumber artefak /var/log/access.log dan Exploitation (Compromised Instance) di sumber artefak /var/log/vsftpd.log, sedangkan pada phase Post Exploitation ditemukan 2 serangan yaitu Maintaining Access di sumber artefak /var/log/auth.log dan Covering Track di sumber artefak file system timeline.
PERANCANGAN DAN PEMBUATAN ANIMASI MOTION GRAPHIC SEBAGAI MEDIA PROMOSI PADA JASA PENGIRIMAN BARANG KAFILA EXPRESS CARGO JOGJA I Gede Febri Tanaya; Andriyan Dwi Putra
Jurnal Teknologi Informasi dan Komputer Vol. 9 No. 5 (2023): Jurnal Teknologi Informasi dan Komputer
Publisher : LPPM Universitas Dhyana Pura

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36002/jutik.v9i5.2649

Abstract

Kafila Express merupakan sebuah perusahaan yang bergerak dalam jasa pengiriman barang dan berlokasi di Yogyakarta, Kafila Express melayani jasa pengiriman barang dari Yogyakarta ke seluruh wilayah di Indonesia. Barang yang bisa dikirim melalui jasa Kafila Express meliputi barang door-to-door dan juga port-to-port. Meski sudah berdiri sejak tahun 2009, namun terdapat beberapa faktor yang membuat Kafila Express masih belum dikenal secara luas oleh masyarakat khususnya yang berada di Yogyakarta, salah satu faktor tersebut adalah kurangnya strategi promosi yang yang dilakukan, sehingga membuat Kafila Express belum bisa menjangkau pelanggan yang lebih luas. Sehingga tujuan dari penelitian ini adalah membuat sebuah video iklan berbasis Motion Graphic yang akan digunakan sebagai media promosi untuk memperkenalkan lebih luas mengenai jasa yang ditawarkan oleh Kafila Express. Teknik yang akan digunakan dalam pembuatan video iklan pada jasa pengiriman barang Kafila Express adalah Motion Graphic dengan implementasi Kinetic Typography Animation.
Analisis Malicious Software Trojan Downloader Pada Android Menggunakan Teknik Reverse Engineering (Studi Kasus: Kamus Kesehatan v2.apk) Putra, Andriyan Dwi; Santoso, Joko Dwi; Ardiansyah, Ipung
Building of Informatics, Technology and Science (BITS) Vol 4 No 1 (2022): June 2022
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1094.745 KB) | DOI: 10.47065/bits.v4i1.1515

Abstract

The development of smartphone technology with the Android platform has made very rapid progress. Smartphones help and facilitate daily human work such as communicating, shopping, and financial transactions. However, because android is an open- source system, anyone can easily develop android applications that can be downloaded on the android app market. Including applications that have been inserted by malware by application developers, one of which is the Trojan downloader malware. The analysis was carried out by implementing the Trojan downloader malware infection in the health dictionary application using the reverse engineering method. Trojan downloader malware infection uses metasploit framework tools. The application will be infected with the payload created from the metasploit framework. This study will analyze the health dictionary application before and after being infected with the Trojan downloader malware using the reverse engineering method. The results of the analysis on the health dictionary application found that the difference in the size of the application was 10.17 MB, which previously was 10.05 MB. Of course, by changing the file size, the SHA256 hashing changes automatically. In the permissions section, it was found that there were only 9 permissions before being infected, but after being infected, we found 18 additional permissions, bringing the total to 27 permissions
Implementasi VPN Menggunakan Metode Point to Point Tunneling Protocol Andriani, Ria; Sa’di, Ahmad; Putra, Andriyan Dwi
Building of Informatics, Technology and Science (BITS) Vol 4 No 1 (2022): June 2022
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (654.653 KB) | DOI: 10.47065/bits.v4i1.1611

Abstract

The XYZ office is a government agency covering various fields, ranging from government, economy, development, people's welfare, community life development and public service affairs. However, work activities in agencies were disrupted due to the COVID-19 pandemic which caused the government to impose a Large-Scale Social Restriction (PSBB) policy to suppress the spread of this virus, resulting in agency workers having to work from home. Therefore we need an appropriate means to be able to support these activities. One of them is making a technology design by implementing a VPN on a proxy router with the PPTP (Point to Point Tunnelling Protocol) method so that it can make it easier for employees to communicate without thinking about location. In addition, users can still remotely access the local network even though they are outside the office network. more secure. Based on the results of testing the network security at the XYZ Office before using the VPN Server, it proved that the wiretapping attackers could still obtain data in the form of website login information, proxy logins, or view data contents when exchanging data. Meanwhile, when the user connects to the VPN Server, the eavesdropper cannot see the contents of the data in it, then with the implementation of a VPN with the PPTP method, employees who are working from home can connect and communicate well with each other, with that work and information exchange will become more flexible and faster
Forensic Recovery Techniques on Android Devices with the National Institute of Standards and Technology (NIST) Approach Hamid, Nadila; Kuswanto, jeki; Nurani, Dwi; Dwi Putra, Andriyan; Mahananing Puri, Fiyas; Tri Atmaja Ramadhani, Surya
Jurnal Sistem Telekomunikasi Elektronika Sistem Kontrol Power Sistem dan Komputer Vol 4 No 1 (2024): JTECS Januari 2024
Publisher : FAKULTAS TEKNIK UNIVERSITAS ISLAM KADIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32503/jtecs.v4i1.4676

Abstract

Dalam era kemajuan teknologi informasi saat ini, penggunaan WhatsApp di Indonesia mencapai angka 88,7% pada kuartal pertama tahun 2022 menurut data Hootsuite We are Social. Meskipun fenomena ini membawa dampak positif, seperti adanya kemudahan dalam komunikasi, namun menimbulkan dampak negatif, terutama dari sisi meningkatnya kejahatan dunia maya. Salah satu contoh kejahatan yang umum terjadi adalah prostitusi online yang dilakukan melalui aplikasi WhatsApp, dimana sebuah pesan, gambar, log, maupun kontak seseorang dapat dengan mudah bertukar tangan tanpa diketahui oleh pihak yang berwajib. Pelaku kejahatan yang memanfaatkan WhatsApp sebagai medianya seringkali menghapus bukti elektronik atas kejahatan yang dilakukannya, menjadikannya tantangan bagi penegak hukum terutama dalam memperoleh bukti atas kejahatan yang dilakukan oleh pelaku. Oleh karena itu, penelitian ini bertujuan untuk mengimplementasikan teknik digital forensic guna mengekstrak berbagai bukti terkait dengan kasus prostitusi online yang memanfaatkan platform WhatsApp. Metode penelitian melibatkan penggunaan alat forensik seperti Mobiledit Forensic dan Oxygen Forensic SQLite Viewer, dengan menerapkan metode National Institute of Standard and Technology (NIST) yang merupakan metode popular dalam forensika digital. Hasil penelitian menunjukkan bahwa penggunaan tools Mobiledit forensic dan Oxygen Forensic SQLite dalam menggali barang bukti digital pada kasus prostitusi online melalui aplikasi Whatsapp dapat menemukan barang bukti dengan nilai akurasi hingga 100% terutama untuk barang bukti dalam bentuk pesan teks, informasi kontak, log panggilan, dan pesan dalam bentuk gambar. Dengan kinerja yang dihasilkan berdasarkan temuan barang bukti tersebut, menunjukkan bahwa kemampuan alat-alat tersebut dalam mendeteksi bukti digital pada smartphone Android yang diharapkan dapat membantu penegak hukum dalam menghadapi tantangan investigasi forensik digital dan memberikan kontribusi positif dalam memberantas kejahatan di dunia maya.
Implemantasi Autentikasi Hotspot Menggunakan Radius Server Mikrotik Router Pada Rumah Sakit Misi Lebak Gonzaga, Alexander; Putra, Andriyan Dwi
Intechno Journal : Information Technology Journal Vol. 5 No. 2 (2023): December
Publisher : Universitas Amikom Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24076/intechnojournal.2023v5i2.644

Abstract

The Lebak misi hospital area currently mostly using wireless networks where usage is increasing and bandwidth is uneven. Between one user and another and the admin only provides password protection for existing access points. which will cause instability between one user and another, therefore the author uses the Radius server as a bandwidth divider as well as security with user authentication and adding a QR code to the authentication. and the author uses the NDLC (Network Development Life Circle) method. As a reference for the radius server configuration using a proxy router. and the results obtained are the percentage of user bandwidth before using the server radius of 0.99Mbps on download and upload of 1.19Mbps for smartphones on laptops of 6.72Mbps for download and upload of 2.21Mbps then after using the radius of the server the average bandwidth speed using user and password of 0.75Mbps for download and 0.80Mbps upload and the success status is very good, all devices can authenticate. and those who can use a QR code of 0.36Mbps for download and 0.44Mbps for Upload with a poor success status because some devices are not compatible for authentication using a QR code by scanning webqr.com.
DETEKSI TRAFIC PADA JUMLAH KENDARAAN YANG LEWAT DI YOU SEE INDONESIA MENGGUNAKAN METODE YOLOV8 Subekti, Janji Nur; Putra, Andriyan Dwi
Information System Journal Vol. 7 No. 02 (2024): Information System Journal (INFOS)
Publisher : Universitas Amikom Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24076/infosjournal.2024v7i02.1736

Abstract

Yousee Indonesia menghadapi tantangan dalam mengukur lalu lintas kendaraan untuk visibilitas iklan. Menggunakan teknologi AI YOLOv8. Metode ini melibatkan pengumpulan data melalui Roboflow, anotasi data dengan kotak pembatas, dan pelatihan model dengan YOLOv8 nano. Dataset dibagi menjadi 70% pelatihan, 20% validasi, dan 10% pengujian. Hasil pelatihan menunjukkan bahwa performa model bervariasi antar kelas, dengan grafik Recall-Confidence menunjukkan penurunan nilai dan Precision-Confidence menunjukkan peningkatan nilai seiring peningkatan confidence. Meskipun rata-rata F1-score mencapai 84%, evaluasi menunjukkan kesulitan model dalam mendeteksi objek dan memprediksi label dengan tepat, khususnya untuk kelas ‘bus’ dan ‘truk’. Implementasi YOLOv8 memungkinkan pengumpulan data trafik yang akurat untuk analisis pola lalu lintas dan strategi iklan yang lebih efektif.
Enhancing Website Security Using Vulnerability Assessment and Penetration Testing (VAPT) Based on OWASP Top Ten Rohmaniah, Diana; Ashari, Wahid Miftahul; Lukman, Lukman; Putra, Andriyan Dwi
Journal of Applied Informatics and Computing Vol. 9 No. 2 (2025): April 2025
Publisher : Politeknik Negeri Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30871/jaic.v9i2.9069

Abstract

Website security is one of the main concerns in the digital era, given the increasing potential for cyber threats. This research aims to improve website security by using the Vulnerability Assessment and Penetration Testing (VAPT) method that refers to the OWASP Top Ten standard. The applied method includes four main stages: information gathering, vulnerability scanning, exploitation, and reporting. The results showed that there were several successfully exploited vulnerabilities, such as Clickjacking, Improper HTTP to HTTPS Redirection, Directory Listing, and Sensitive Information Disclosure, which were classified based on the OWASP Top Ten. The severity of the vulnerabilities was analyzed using Common Vulnerabilities and Exposures (CVE), Common Weakness Enumeration (CWE), and Common Vulnerability Scoring System (CVSS). The analysis results show that some vulnerabilities have high severity after considering the factual conditions of the system. This research provides specific remediation recommendations to address these vulnerabilities, such as the implementation of security headers, deletion of sensitive configuration files, and dependency updates. With this approach, the research is expected to contribute to improving website security and provide effective mitigation guidelines.
Perancangan Prototype Pelampung Keselamatan Elektrik dengan Algoritma Proportional Integral Derivative Untuk Kestabilan di Air Kusrini, Kusrini; Pramono, Eko; Muktafin, Elik Hari; Setiaji, Bayu; Putra, Andriyan Dwi
Journal of Information System Research (JOSH) Vol 6 No 1 (2024): Oktober 2024
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/josh.v6i1.6021

Abstract

This research addresses the need for a water rescue device capable of autonomously moving towards a survival position while being remotely controlled. The main problem investigated is how to design an electric safety buoy that can move stably in currents and waves while being operated remotely using Internet of Things (IoT) technology. Data were collected through prototype testing under various load and control range conditions. The research method involves designing and implementing a control system based on the Arduino Uno microcontroller, with a Proportional-Integral-Derivative (PID) algorithm to maintain buoy stability, and an RF communication module for remote control up to 500 meters. The test results show that the buoy can achieve an average speed of 1.35 m/s at 100% throttle with an 80 kg load and maintain stability in various water conditions. The standard deviation of speed indicates minimal variation between tests, demonstrating good movement stability. This research contributes to the development of IoT-based safety devices, enhancing the effectiveness of water rescue operations. With the use of a PID algorithm, the buoy can automatically adjust direction and speed, making it more responsive to remote control commands and able to withstand dynamic water conditions.
Pengembangan Keterampilan Dasar Pemrograman bagi Siswa SMA N 2 Bantul sebagai Persiapan di Era Digital Putra, Andriyan Dwi; Nur'aini; Ashari, Wahid Miftahul; Sismoro, Heri; Kuswanto, Jeki
Tanggap Masyarakat untuk Aksi dan Sinergi Vol. 1 No. 02 (2025): Volume 01 Nomor 02 - Juni 2025
Publisher : TAM Global Insights - PT. Treeta Amanah Mandiri Group

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Pelatihan Internet of Things (IoT) di SMA Negeri 2 Bantul dilaksanakan sebagai respons terhadap rendahnya literasi teknologi dan keterampilan digital siswa, serta keterbatasan tenaga pengajar dan sumber belajar di bidang IoT. Kegiatan ini bertujuan untuk meningkatkan kompetensi dasar siswa dalam memahami dan mengaplikasikan teknologi IoT melalui pendekatan pembelajaran interaktif, praktik langsung, serta pengembangan proyek mini. Metode pelaksanaan meliputi tahap persiapan, pelaksanaan inti, dan evaluasi, dengan dukungan modul pembelajaran cetak dan digital, video tutorial, serta sesi pendampingan intensif. Hasil evaluasi menunjukkan bahwa 68,3% siswa merasa puas dan 25,5% cukup puas terhadap pelatihan yang diberikan. Pelatihan ini terbukti mampu meningkatkan minat dan pemahaman siswa terhadap IoT, serta memperlihatkan pentingnya sinergi antara sekolah dan perguruan tinggi dalam mendukung transformasi pendidikan berbasis teknologi. Kegiatan ini diharapkan menjadi model pelatihan yang dapat direplikasi di sekolah lain untuk mendorong literasi teknologi sejak dini.