Claim Missing Document
Check
Articles

Found 2 Documents
Search

Software Effort Coefficient Optimization Using Hybrid Bat Algorithm and Whale Optimization Algorithm Puspaningrum, Alifia; Mustamiin, Muhamad; Herdiyanti, Fauziah; Noviyanto, Kamaludin
JURNAL INFOTEL Vol 17 No 1 (2025): February 2025
Publisher : LPPM INSTITUT TEKNOLOGI TELKOM PURWOKERTO

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20895/infotel.v17i1.1250

Abstract

Software effort estimation is a crucial aspect in software engineering, especially in project management. It defines an effort required by a person to develop an application in certain of time. One of models which widely used for this purpose is Constructive Cost Model (COCOMO) II. In COCOMO II, two coefficients have a significant role in determining the accuracy of the effort estimation. Various methods have been conducted to estimate these coefficients to closely match the actual effort with the predicted values, such as particle swarm optimization, cuckoo search algorithm, etc. However, several metaheuristics has limit in exploration and exploitation to find optimal value. To overcome this problem, a hybrid metaheuristic combining the Bat Algorithm and Whale Optimization Algorithm (BAWOA) is proposed. This approach aims to optimize the two COCOMO II coefficients for better estimation accuracy. Additionally, the proposed method is compared with several other metaheuristic algorithms using the NASA 93 datasets. There are two evaluation criteria used in this research namely Magnitude of Relative Error (MRE) and Mean Magnitude of Relative Error (MMRE). With the optimal score among comparing method. proposed method achieves superior effort estimation, with an MMRE of 51.657%. It also proves that hybrid BAWOA can estimates predicted effort close to actual effort value.
Linux Operating System Security Testing Case Study: FTP Security in Metasploitable2 Hilmi, Muhammad Anis Al; Herdiyanti, Fauziah
SAINTEKBU Vol. 15 No. 02 (2023): Vol. 15 No. 02 August 2023
Publisher : KH. A. Wahab Hasbullah University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Linux is an operating system like Unix that uses a kernel and includes applications and other support-ing modules to be used properly. Linux is free to use and includes open-source code to be used and devel-oped by all parties. The Linux operating system is widely used as a server, for example, for hosting web applications or used in cloud computing infrastructure. No wonder Linux is one of the targets of cyberat-tacks. In this study, a simulation of attacks on the Linux operating system was carried out, and one type of Linux distribution tested as a target was Metasploitable2. Metasploitable2 is a Linux operating system that is intentionally made vulnerable to attack; the aim is to be experimental material. In testing, Metasploitable2 was treated as the target of the attack and Kali Linux as the attacker. The initial stage of the attack simulation, carried out using NMap, Metasploitable2 security vulnerabilities can be identified and exploited for later attacks with exploits. The type of exploit used is a backdoor because a backdoor can function to penetrate systems, programs, or networks without going through the authentication pro-cess. In this case, Metasploitable2 has a security hole in its FTP port. The loophole is tried to be exploited. In this case, the way to overcome the attack is by closing all possible entry points to be an attack loop-hole; in this case, Metasploitable2 is port 6200 and disabling anonymous account permissions to upload files using FTP.