Raisul Azhar
Program Studi Ilmu Komputer, Universitas Bumigora

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Deteksi Malware pada Perangkat Android Menggunakan Ensemble Learning Muhamad Azwar; Lilik Widyawati; Raisul Azhar; Kartarina Kartarina; Tanwir Tanwir; Andi Sofyan Anas
Jurnal Teknologi Informasi dan Multimedia Vol. 7 No. 3 (2025): August
Publisher : Sekawan Institut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35746/jtim.v7i3.573

Abstract

The increasing use of permission-based applications on mobile platforms has raised concerns regarding privacy and security. Android, being one of the most widely used operating systems for interacting with mobile applications, is particularly susceptible to various security risks that must be promptly addressed. Low digital literacy and a lack of user awareness about security risks—especially when installing applications from unofficial sources or without paying attention to access permissions—make users vulnerable to malware attacks. Uninformed users can easily become victims of malware insertion by irresponsible parties, turning them into targets for data manipulation and even data theft, which may then be sold on illegal forums. Attackers exploit the permission system, allowing them to freely access the target smartphone. This lack of awareness among users increases their vulnerability to malware injection and subsequent threats such as data manipulation and the theft of personal information, which can be traded on underground markets. One approach to detecting malicious behavior in mobile applications is the use of machine learning techniques. These techniques can analyze application patterns and behaviors based on features such as requested permissions. Popular algorithms for malware detection include Support Vector Machine (SVM) and Random Forest (RF), both of which have demonstrated strong performance in various studies. However, to further improve accuracy and reduce classification errors, ensemble learning approaches such as Adaptive Boosting (AdaBoost) are increasingly being adopted. Ensemble learning combines multiple predictive models to produce more reliable classification results compared to single models. This study evaluates the performance of several classification algorithms in detecting malicious Android applications. The results show that AdaBoost achieved a high accuracy rate of 91.65% and an AUC value of 95%, effectively distinguishing between safe applications and malware. Therefore, the use of machine learning algorithms—particularly ensemble methods like AdaBoost—can serve as a promising solution to enhance the security and privacy of Android-based mobile application users.
Implementasi Software-Defined Network Terintegrasi Firewall pada Proxmox untuk Pengontrolan Konfigurasi Jaringan dan Pengamanan Layanan Container I Putu Hariyadi; I Made Yadi Dharma; Raisul Azhar; Suriyati Suriyati
Jurnal Teknologi Informasi dan Multimedia Vol. 7 No. 1 (2025): February
Publisher : Sekawan Institut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35746/jtim.v7i1.644

Abstract

Virtualization technology has helped companies consolidate various server roles into a single physical server, reducing hardware costs. Hypervisor is a software in virtualization that is used to manage server hardware, allowing multiple Virtual Machines (VM)/Containers (CT) to run on a single physical machine. Companies face various challenges to remain competitive in the digital era, such as the need for rapid deployment of virtual guests and virtual networks on hypervisors in development, testing, and production environments, as well as securing network services. The purpose of this study is to implement SDN on hypervisors to centrally control virtual network configurations with a simple design, reducing setup and maintenance costs and time. In addition, it also implements a firewall and Virtual Private Network (VPN) based on OpenVPN and a reverse proxy to secure the hypervisor and VM/CT so that services remain available. This study presents a new approach that integrates Software-Defined Network (SDN)-based network management with comprehensive security solutions on hypervisors. This approach combines efficiency in network management and security that have rarely been focused on simultaneously in previous studies. The research method uses the Network Development Life Cycle (NDLC). The hypervisor used is Proxmox Virtual Environment (PVE) which is installed on the Virtual Private Server (VPS) provider IDCloudHost. Based on the results of the trials that have been carried out, it can be concluded that the simple zone type SDN on PVE can be used to control network configurations centrally and more simply such as routing, Dynamic Host Configuration Protocol (DHCP), Source Network Address Translation (SNAT), hostname registration and Internet Protocol (IP) from CT to forward lookup zone on the Domain Name System (DNS) server. Activating the firewall and creating rules at the cluster and CT levels from PVE and OpenVPN can protect the infrastructure when accessed both internally and externally. While the implementation of nginx reverse proxy can secure access to HTTP/HTTPS services on CT in PVE.