Claim Missing Document
Check
Articles

Found 9 Documents
Search

Rancang Bangun Sistem Latihan Soal Matematika Berbasis Website Sebagai Media Pembelajaran Mandiri Bagi Siswa SD Melly Br. Bangun; Dedy Kiswanto; Alvi Sahrin Nasution; Yeni Marito; Nadiah Mubarokah
Jurnal Sistem Informasi Triguna Dharma (JURSI TGD) Vol. 4 No. 4 (2025): EDISI JULI 2025
Publisher : STMIK Triguna Dharma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53513/jursi.v4i4.11691

Abstract

Matematika merupakan salah satu ilmu dasar yang sangat penting dalam mendukung perkembangan berbagai disiplin ilmu serta dalam membentuk kemampuan berpikir logis dan analitis. Namun, hasil studi PISA tahun 2022 menunjukkan bahwa kemampuan matematika siswa di Indonesia masih tergolong rendah, yang mencerminkan lemahnya pemahaman terhadap konsep dasar serta penggunaan metode pembelajaran yang belum optimal. Banyak siswa mengalami kesulitan dalam memahami materi matematika karena pendekatan pengajaran yang kurang kontekstual dan terbatasnya dukungan pembelajaran mandiri di lingkungan rumah. Disisi lain, perkembangan teknologi digital membuka peluang besar untuk menciptakan media pembelajaran yang lebih menarik, interaktif, dan sesuai dengan kebutuhan siswa. Sayangnya, masih sedikit platform lokal yang ramah anak dan sesuai dengan kurikulum nasional. Untuk menjawab tantangan tersebut, penelitian ini bertujuan untuk mengembangkan MathMaster.id, yaitu sebuah platform latihan soal matematika berbasis web yang dirancang khusus untuk siswa sekolah dasar. Penelitian ini menggunakan metode Research and Development (R&D) dalam merancang, membangun, dan mengevaluasi efektivitas sistem. Fitur utama dari MathMaster.id meliputi soal-soal dengan tingkatan kesulitan yang bervariasi, antarmuka pengguna yang menarik dan mudah digunakan oleh anak-anak, sistem peringkat, serta dukungan untuk pembelajaran mandiri. Hasil evaluasi menunjukkan bahwa platform ini mampu meningkatkan motivasi belajar, pemahaman konsep matematika, serta kemandirian siswa dalam proses belajar. Dengan demikian, MathMaster.id berpotensi menjadi solusi digital yang mendukung pembelajaran matematika yang lebih menyenangkan, efektif, dan sesuai dengan kebutuhan siswa di Indonesia.
IMPLEMENTASI SISTEM KEAMANAN WEBSITE DENGAN ANALISIS LOG DAN DETEKSI AKTIVITAS ANOMALI MENGGUNAKAN ISOLATION FOREST Delvita aulia artika, Delvita; Daniel Rumahorbo; Muhammad haikal Al-Majid; Dedy Kiswanto
Jurnal Informatika dan Teknik Elektro Terapan Vol. 13 No. 3S1 (2025)
Publisher : Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/jitet.v13i3S1.8133

Abstract

Keamanan website merupakan aspek penting dalam menjaga integritas, ketersediaan, dan kepercayaan pengguna terhadap layanan digital. Penelitian ini bertujuan mengimplementasikan sistem keamanan website berbasis analisis log dan mendeteksi aktivitas anomali menggunakan algoritma Isolation Forest. Sistem yang dikembangkan bernama SecurityShield, mencatat seluruh aktivitas pengguna seperti login, logout, dan registrasi ke dalam database log, kemudian menganalisisnya untuk mendeteksi aktivitas mencurigakan secara real-time. Proses deteksi dilakukan melalui tiga parameter utama yaitu Request Rate Analysis, Brute-Force Detection, dan Temporal Anomaly Detection, dengan hasil ditampilkan melalui dashboard interaktif berbasis WebSocket. Pengujian model menunjukkan nilai presisi sebesar 80%, recall 8,7%, F1-score 15,7%, dan akurasi 57%, yang menandakan tingkat akurasi tinggi namun sensitivitas masih rendah. Hasil penelitian menunjukkan bahwa penerapan Isolation Forest efektif dalam mendeteksi pola aktivitas anomali pada data log berukuran besar serta meningkatkan keamanan sistem melalui autentikasi dua faktor (OTP Telegram) dan notifikasi otomatis. Sistem ini dapat dikembangkan lebih lanjut dengan menambah variasi data log nyata dan menerapkan metode pembelajaran mendalam untuk meningkatkan akurasi deteksi.
SIMULASI SERANGAN SIBER MAC ADDRESS DAN IP ADDRESS SPOOFING PADA JARINGAN HTTP DI KALI LINUX Muhammad Rizki Andrian Fitra; Neysa Talitha Jehian; Lastri Elisabet Butarbutar; Dedy Kiswanto
Jurnal Teknologi Informasi dan Komputer Vol. 11 No. 2 (2025): JUTIK : Jurnal Teknologi Informasi dan Komputer, Edisi Oktober 2025
Publisher : LPPM Universitas Dhyana Pura

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36002/jutik.v11i2.3766

Abstract

The rapid development of information technology presents a big challenge in terms of network security, especially against cyber-attacks. This research simulates MAC Address Spoofing attack on HTTP network using Kali Linux operating system. The purpose of this research is to understand how the attack process is carried out and evaluate its impact on communication security in an unencrypted network. The attacker impersonated a gateway through ARP Spoofing technique and successfully infiltrated the communication path between the victim and the server. The captured data shows that sensitive information such as usernames and passwords can be easily retrieved when the victim accesses HTTP sites. The results show that spoofing has been successfully carried out, as evidenced by the acquisition of usernames and passwords when victims access HTTP sites.
SIMULASI DAN IMPLEMENTASI FIREWALL BERBASIS SQUID UNTUK KEAMANAN INTERNET Iwan Agi Berutu; Khildan Rifail Azis; Yunita Rahmi; Dedy Kiswanto
Jurnal Teknologi Informasi dan Komputer Vol. 11 No. 2 (2025): JUTIK : Jurnal Teknologi Informasi dan Komputer, Edisi Oktober 2025
Publisher : LPPM Universitas Dhyana Pura

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36002/jutik.v11i2.3767

Abstract

Network security is a crucial aspect of information systems, especially in the internal networks of institutions or organizations. This study aims to develop a Squid-based firewall system as an effective network security solution to control and filter internet access. The method used involves open-source system development by utilizing Debian Linux and Squid Proxy software. Installation and configuration processes were conducted to manage access restrictions based on HTTP/HTTPS protocols, IP addresses, and usage time. The implementation results show that the developed firewall system is capable of blocking unwanted websites, regulating access times, and recording user activities through system logs. This system also offers ease for administrators in monitoring and managing network traffic efficiently. With this approach, institutions or organizations are expected to enhance their internal network security without incurring high licensing costs. This research contributes to the utilization of open-source technology for independently and affordably addressing network security needs.
IMPLEMENTANSI MANGLE FILTERING CONTENT MENGGUNAKAN MIKROTIK UNTUK MENINGKATKAN KEAMANAN JARINGAN Aldo Bonifasius Simbolon; Dean Siregar; Steven Adventino Gulo; Dedy Kiswanto
Jurnal Teknologi Informasi dan Komputer Vol. 11 No. 2 (2025): JUTIK : Jurnal Teknologi Informasi dan Komputer, Edisi Oktober 2025
Publisher : LPPM Universitas Dhyana Pura

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36002/jutik.v11i2.3770

Abstract

Network security is a crucial aspect that must be taken into account in information system management. This research focuses on implementing Mangle Filtering Content using MikroTik RB750 device to enhance network security. An experimental method with a case study approach was used to test the effectiveness of the mangle firewall feature in blocking unwanted content on local networks. The research was conducted by designing a simple network topology consisting of a MikroTik router as the traffic control center, one client device, and an internet connection. Mangle rules were implemented to mark connections based on specific domains and URL patterns through Layer-7 Protocol Filtering, then integrating the mangle results with Filter Rules to block access to unwanted sites such as social media and adult websites. The results showed that the implementation of mangle filtering content on MikroTik successfully blocked access to predetermined sites, creating a safer and more controlled digital environment. This research provides practical solutions for network administrators in improving security and digital content management on small to medium-scale networks.
IMPLEMENTASI VPN DIATAS ROUTING OSPF DALAM MEMBANGUN SIMULASI JARINGAN MAN Nezza Anggraini Yolandari; Delvita Aulia Artika; Bunga Dwi Febrianti; Dedy Kiswanto
Jurnal Teknologi Informasi dan Komputer Vol. 11 No. 2 (2025): JUTIK : Jurnal Teknologi Informasi dan Komputer, Edisi Oktober 2025
Publisher : LPPM Universitas Dhyana Pura

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36002/jutik.v11i2.3773

Abstract

This study aims to compare the effectiveness of the Virtual Private Network (VPN) Ipsec and GRE tunnel protocols in establishing site-to-site VPN connections on a Metropolitan Area Network (MAN) optimized with Open Shortest Path First (OSPF) routing. Using Cisco packet tracer software, simulations were conducted involving seven routers as representations of different locations, connected via VPN connections. The simulation results show that although Ipsec offers significant security through data encryption, its limitations in multicast delivery pose challenges in OSPF communications. In contrast, GRE tunnel supports multicast route delivery required for OSPF, making it a more efficient choice in this context. This study provides insight into the advantages and disadvantages of each protocol for implementing a secure and efficient network.
ANALISIS PERFORMA ROUTING OSPF PADA TOPOLOGI HYBRID STAR-MESH DAN TOPOLOGI TREE MENGGUNAKAN GNS3 Muhammad Naufal Musyaafa; Ayman Human Sukma; Sybil Auzi; Dedy Kiswanto
Jurnal Teknologi Informasi dan Komputer Vol. 11 No. 2 (2025): JUTIK : Jurnal Teknologi Informasi dan Komputer, Edisi Oktober 2025
Publisher : LPPM Universitas Dhyana Pura

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36002/jutik.v11i2.3784

Abstract

This research analyzes the performance comparison of OSPF (Open Shortest Path First) routing protocol on hybrid star-mesh topology and tree topology. Testing was conducted through simulation using GNS3 with Mikrotik routers configured with OSPF protocol. Performance parameters measured include throughput, jitter, delay, and packet loss. The results show that the hybrid star-mesh topology provides better performance, particularly in terms of delay with an average of 2.548 ms (15.46% faster compared to tree topology) and more stable jitter with an average of 3.193 ms (10.4% lower than tree topology). Meanwhile, both topologies showed relatively equivalent throughput with average values of 958 Kbits/s for hybrid star-mesh and 962.7 Kbits/s for tree, with no packet loss observed in either topology. Although the performance differences are not highly significant, the hybrid star-mesh topology proves superior in providing more responsive and consistent communication paths. This research provides comprehensive recommendations regarding the selection of optimal network topology for OSPF protocol implementation in the context of enterprise and educational network requirements.
ANALISIS PERBANDINGAN ROUTING OSPF SINGLE AREA DAN MULTI AREA MENGGUNAKAN CISCO PACKET TRACER Rohit Jhon Lamtama Purba; Yeremia Setya Maharman Gurning; Josua Anugrah Deo Tampubolon; Dedy Kiswanto
Jurnal Teknologi Informasi dan Komputer Vol. 11 No. 2 (2025): JUTIK : Jurnal Teknologi Informasi dan Komputer, Edisi Oktober 2025
Publisher : LPPM Universitas Dhyana Pura

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36002/jutik.v11i2.3786

Abstract

Computer networks are a crucial element in supporting electronic and real-time data exchange within various organizations. One of the commonly used routing protocols is OSPF (Open Shortest Path First), known for its efficiency and fast convergence. OSPF can be configured in two main types: single area and multi area, each with its own characteristics and advantages. However, there is still limited information regarding the performance comparison between the two in the context of network implementation. This research aims to compare the performance of OSPF Single Area and Multi Area through simulation in Cisco Packet Tracer, to provide recommendations based on network scale. The method used involves building two topologies with 15 routers: Single Area (Area 0) and Multi Area (Areas 0, 1, 2), then analyzing convergence time, LSDB size, the number of LSA, latency, and routing table complexity. The results show that Single Area is more suitable for small networks (<10 routers), while Multi Area is superior for large networks (>10 routers). In conclusion, Single Area is recommended for simple networks, while Multi Area is more appropriate for large networks with careful area planning.
IMPLEMENTASI FIREWALL FILTER RULES UNTUK KEAMANAN JARINGAN DAN METODE QUEUE TREE UNTUK MANAJEMEN BANDWIDTH PADA MIKROTIK Silvia Wulandari Situngkir; Sanri Yuliana Siallagan; Asri Angel Tumanggor; Dedy Kiswanto
Jurnal Teknologi Informasi dan Komputer Vol. 11 No. 2 (2025): JUTIK : Jurnal Teknologi Informasi dan Komputer, Edisi Oktober 2025
Publisher : LPPM Universitas Dhyana Pura

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36002/jutik.v11i2.3790

Abstract

Currently, almost all sectors of life such as offices, government agencies, educational institutions, and public services depend on the internet network as a means of supporting work and information exchange media. Optimal internet utilization can increase productivity. However, high internet usage needs to be balanced with effective bandwidth management. Unstructured bandwidth management can cause a decrease in internet access speed. In addition, network security aspects are also crucial in the implementation of computer networks. Negligence in this aspect can open a gap to network attacks or hacking. Therefore, a reliable firewall system is needed to support good network quality. One solution to overcome these problems is to implement a firewall and queue tree method using MikroTik devices. This approach can increase network performance and improve internet service quality. With proper grouping and restriction of data traffic, network usage becomes more controllable, reduces the risk of bandwidth overload, and creates a more secure and equitable network environment. The implementation was carried out using a MikroTik RB941-2nD router and Winbox software, with configurations that included router settings, filter rules, and queue trees. The results of the implementation show that bandwidth management and filtering access to sites containing adult content and online gambling can run effectively.