Wibowo, Dwi Kurnia
Unknown Affiliation

Published : 4 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 4 Documents
Search

Analisis Perilaku Malware Menggunakan Pendekatan Analisis Statis dan Dinamis Khalda, Khansa; Wibowo, Dwi Kurnia
Jurnal Sains, Nalar, dan Aplikasi Teknologi Informasi Vol. 4 No. 1 (2025)
Publisher : Department of Informatics Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20885/snati.v4.i1.1

Abstract

Deteksi malware merupakan tantangan krusial dalam perkembangan keamanan siber. Penelitian ini mengeksplorasi integrasi analisis statis dan dinamis untuk meningkatkan akurasi deteksi malware. Analisis statis meneliti file malware tanpa eksekusi, memberikan wawasan tentang metadata dan atribut strukturalnya, sedangkan analisis dinamis mengamati perilaku malware selama eksekusi di lingkungan terkendali. Menggunakan dataset 5000 sampel, termasuk ransomware, trojan, spyware, dan worm, alat seperti IDA Pro, PE Studio, dan platform sandbox digunakan. Hasil menunjukkan 87% sampel malware menggunakan code obfuscation untuk menghindari deteksi, dan 95% menunjukkan aktivitas runtime mencurigakan, seperti modifikasi registry dan komunikasi jaringan terenkripsi. Model pembelajaran mesin (Deep Neural Networks, Random Forest, Support Vector Machine) yang dilatih pada dataset hybrid mencapai akurasi 96,4% dengan DNN, menunjukkan keunggulan dibandingkan pendekatan metode tunggal. Tantangan seperti kebutuhan komputasi tinggi diatasi melalui implementasi berbasis cloud.
A COMPARATIVE STUDY OF MULTI-MASTER REPLICATION OF NOSQL DATABASE SERVER WITH VARYING DATA FORMATS Wibowo, Dwi Kurnia; Darmawan, Agus; Nawangnugraeni, Devi Astri
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 1 (2025): JUTIF Volume 6, Number 1, February 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.1.4371

Abstract

NoSQL Databases are currently an effective solution for managing large data sets distributed across many Servers. NoSQL Database design is usually based on its usability. Specifically related to the system or application to be built. This research aims to measure the Transfer Rate, CPU usage, Memory usage, query execution time for Create, Insert, Delete and remote replication query bandwidth in the Multi-Master Server replication process using two document stored NoSQL Database applications namely CouchBase and CouchDB by entering three different data models namely JSON, XML and CSV. The experimental results show that the Transfer Rate with CSV data format on CouchBase has the lowest value with an average of 111.41 kbps. CPU usage with XML data format on CouchBase has the lowest value with an average of 13.89%. Memory usage with JSON data format on CouchBase has the lowest value with an average of 1.68%. Query Execution Time Create with XML data format on CouchBase has the lowest value with an average of 1.16 seconds. Query Execution Time Insert on CouchBase with CSV data format has the lowest value with an average of 33.28 seconds. Bandwidth Query Execution Time Insert with CSV data format on CouchBase has the lowest value with an average of 24.78 mb. Query Execution Time Delete with JSON, XML and CSV data formats on CouchDB has the lowest value with an average of 1.5 seconds. Further research recommendations are to test Multi-Master Server Replication using other data formats and parameters or test the performance of data migration to other Databases with different data formats.
Identification and Classification of Cyber Attacks on ELDIRU UNSOED using Random Forest Algorithm Caesario, Justicio; Nofiyati; Wibowo, Dwi Kurnia
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 4 (2025): JUTIF Volume 6, Number 4, Agustus 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.4.5239

Abstract

Academic information systems, such as Eldiru Unsoed, function as vital digital assets vulnerable to cyberattacks, while conventional rule-based Web Application Firewalls exhibit detection weaknesses. Empirical testing in this study shows that the standard ModSecurity with Core Rule Set (CRS) system achieves a recall of only 5.34%, meaning it fails to identify the majority of actual attacks and creates a significant security gap. To address this problem, this research designs a detection system based on the Random Forest algorithm using Nginx server log data, validated with the public CSIC 2010 dataset. The model was developed by engineering hybrid features that include lexical analysis, CRS rule context, and N-grams to classify web traffic. Evaluation results show the proposed Machine Learning-Random Forest (ML-RF) model successfully increases recall from 5.34% to 72.00% and the F1-Score from 10.10% to 80.00%. This improvement in metrics, while maintaining a precision of 91.00%, proves that machine learning integration yields a more balanced and reliable cybersecurity defense mechanism. This research underscores the importance of implementing MLOps workflows for continuous model calibration and retraining to maintain detection effectiveness against evolving threats.
Development of a Web-Based Management Information System for Student Creativity Program (PKM) Using Extreme Programming and Laravel Framework Rahmah, Nihayatur; Hidayat, Nurul; Wibowo, Dwi Kurnia
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 4 (2025): JUTIF Volume 6, Number 4, Agustus 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.4.5267

Abstract

This research originates from the absence of an integrated system for managing the Student Creativity Program (PKM) at the Faculty of Engineering, Universitas Jenderal Soedirman, which has caused inefficiencies in archiving, monitoring, and reporting. To address this problem, a web-based management information system was developed using the Extreme Programming (XP) methodology, selected for its flexibility, iterative process, and strong user involvement. The novelty of this study lies in the development of a system specifically designed for PKM management at the faculty level, which has not been previously available. Unlike prior studies, the system not only supports proposal submission but also integrates review, scoring, revision, and progress monitoring. The development process followed the four main stages of XP: planning, design, coding, and testing, with active user participation in each cycle. Blackbox testing confirmed that all core features functioned properly. The implementation of this system has proven to enhance efficiency, transparency, and accountability, reduce administrative workload, and contribute to informatics by demonstrating the practical application of the XP methodology in developing academic information systems.