cover
Contact Name
Taufik Hidayat
Contact Email
thidayat.ft@unwir.ac.id
Phone
-
Journal Mail Official
teknik.komputer@unwir.ac.id
Editorial Address
Jl. Ir. H. Juanda KM.03, Singaraja, Indramayu - Jawa Barat 45312
Location
Kab. indramayu,
Jawa barat
INDONESIA
TEKNOKOM : Jurnal Teknologi dan Rekayasa Sistem Komputer
Published by Universitas Wiralodra
ISSN : 26218070     EISSN : 26863219     DOI : https://doi.org/10.31943/teknokom
Core Subject : Science,
Jurnal Teknologi dan Rekayasa Sistem Komputer (TEKNOKOM) with frequency 2 (two) times a year, ie in March and September. The editors receive scientific writings from lecturers, teachers and educational observers about the results of research, scientific studies and analysis and problem solving closely related to the field of ICT and System Computer.
Arjuna Subject : -
Articles 10 Documents
Search results for , issue "Vol. 4 No. 1 (2021): TEKNOKOM" : 10 Documents clear
RAW DATA SECURITY BY USING ELGAMAL AND SHA 256 PUBLIC KEY ALGORITHM Surya Permana, Indra; Hidayat, Taufik; Mahardiko, Rahutomo
TEKNOKOM Vol. 4 No. 1 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (163.842 KB) | DOI: 10.31943/teknokom.v4i1.53

Abstract

The development of information technology has grown exponentially and various of data collections and its method has been obtained. In the era of big data, data has now become an asset that held important values, while in the implementation of data delivery, it clearly is not always safe. One of the method to secure data delivery is data encryption using Cryptography. Cryptography provides an encryption service to secure data delivery by transforming it to random values so that it can no longer be read. The goal in this study was to produce an application that could be used to encrypt data, using ElGamal's cryptography method and hash checking using the SHA256 algorithm. After encryption, to ensure the encrypted data is still the original data without any changes or manipulation by unauthorized 3rd party then done by checking the hash generated using SHA256 algorithm. The data used in this study was a sample of raw data from the ATPWTP survey (ability to pay and willing to pay) conducted by the BPS Cirebon (Central Statistics) in 2019 and the data was in the form of Excel and txt files. The encryption process resulted in a cipher larger than the plaintext and takes longer for the data encryption process than during the data cipher decryption process.
A SYSTEMATIC REVIEW METHOD FOR SECURITY ANALYSIS OF INTERNET OF THINGS ON HONEYPOT DETECTION Yuswanto, Andrie; Wibowo, Budi
TEKNOKOM Vol. 4 No. 1 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (225.547 KB) | DOI: 10.31943/teknokom.v4i1.54

Abstract

A very significant increase in the spread of malware has resulted in malware analysis. A recent approach to using the internet of things has been put forward by many researchers. Iot tool learning approaches as a more effective and efficient approach to dealing with malware compared to conventional approaches. At the same time, the researchers transformed the honeypot as a device capable of gathering malware information. The honeypot is designed as a malware trap and is stored on the provided system. Then log the managed events and gather information about the activity and identity of the attacker. This paper aims to use a honeypot in machine learning to deal with malware The Systematic Literature Review (SLR) method was used to identify 207 . Then 12 papers were selected to be investigated based on inclusion and exclusion criteria. The technique used by most researchers is to utilize the available honeypot dataset. Meanwhile, based on the type of malware being analyzed, honeypot in machine learning is mostly used to collect IoT-based malware.
A 5G RURAL, REMOTE, AND DIFFICULT AREAS HOPE: A REVIEW Sihombing, Harry Candra
TEKNOKOM Vol. 4 No. 1 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (410.447 KB) | DOI: 10.31943/teknokom.v4i1.57

Abstract

The 5G cellular networks are “urban” areas technology in nature, extensively deployed where the user’s density is high to provide very high data rates, coupled with extremely low delays and dealing with very high mobility of users. On the contrary, one-third of people experience a lack of mobile broadband connectivity living in rural zones. These mobile broadband lacks recognized as the main barriers impairing the Sustainable Developing Goals (SDGs) defined by the United Nations. Those that are not currently covered will be unlikely to be covered also soon, as the network operators are not keen to invest in such zones, because of potentially low revenues. While it is confirmed that 5G would meet stringent requirements in urban zones, rural areas still suffer from almost inexistent MBB (Mobile Broadband) coverage, especially in the developing world. The big deal of isolated rural areas, which are sparsely inhabited by low-income populations, is that the classical access using traditional backhaul technologies is a bad solution for operators since it does not ensure a good ROI (Return of Investment).
DESIGN OF COMPUTER REPAIR SERVICES APPLICATION ANDROID-BASED Achmad Udin Zailani; Alvino Octaviano; Sholihin, Sholihin
TEKNOKOM Vol. 4 No. 1 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (305.814 KB) | DOI: 10.31943/teknokom.v4i1.58

Abstract

Computers are one form of advances in electronic and informatics technology; the function of the computer itself serves as a tool for writing, drawing, editing images or photographs, or as a means of storage. Android, a Linux-based operating system, is a smart operating system that can compete with operating systems on a computer. Some of the problems identified include user difficulties in overcoming computer damage to determine whether to repair or buy a new unit, difficulty in reaching authorized service providers, risks when deciding to repair at a public service place, and limited access to information and costs repairing computer damage. This research specifically designs an Android application-based computer service application that makes it easier for people to get service services. The above research results formulate computer repair services using an Android-based platform with Android Studio and MySQL as the database for this study. This application is expected to be useful for customers in terms of time and cost.
VPN SITE TO SITE IMPLEMENTATION USING PROTOCOL L2TP AND IPSEC Santoso, Budi; Sani, Asrul; Husain, T; Hendri, Nedi
TEKNOKOM Vol. 4 No. 1 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (854.231 KB) | DOI: 10.31943/teknokom.v4i1.59

Abstract

Data exchange communication has developed, which leads to centralized communication, and to achieve this communication requires a type of data communication whose data is accommodated on the server and can be accessed by clients, such as at organization. As a company engaged in education, the development of centralized data communication by utilizing the intranet network has been formed. The use of an intranet network allows data communication that is vulnerable to wiretapping. To fix this using a VPN network. L2TP and IPsec VPNs have different performances, especially in the level of security provided. In this study, an analysis of the L2TP and IPsec VPN network performance was carried out on the SMB Server on the Ubuntu server and the Mikrotik router for its VPN configuration. In this study, the L2TP and IPsec VPN was designed by configuring the Mikrotik RB 450G router and the SMB Server configuration using Command Line Interface on Ubuntu 18.04 server. For security analysis, use hacking methods to get VPN Server login data and sniffing methods to get SMB Server login data and SMB data. For performance analysis using parameters of delay, throughput, and packet loss. Wireshark is software for checking by capturing each packet of data from an interface. The research objective to be achieved is to design a VPN technology based on L2TP & IPSec, to be able to determine the resulting performance after implementing a VPN based on L2TP & Ip Sec. The result is that VPN can connect from HO to branch one and branch two or connect from public connection to local connection. The Ubuntu server used is also running well, so it helps the VPN process properly.
RAW DATA SECURITY BY USING ELGAMAL AND SHA 256 PUBLIC KEY ALGORITHM Indra Surya Permana; Taufik Hidayat; Rahutomo Mahardiko
TEKNOKOM Vol. 4 No. 1 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (163.842 KB) | DOI: 10.31943/teknokom.v4i1.53

Abstract

The development of information technology has grown exponentially and various of data collections and its method has been obtained. In the era of big data, data has now become an asset that held important values, while in the implementation of data delivery, it clearly is not always safe. One of the method to secure data delivery is data encryption using Cryptography. Cryptography provides an encryption service to secure data delivery by transforming it to random values so that it can no longer be read. The goal in this study was to produce an application that could be used to encrypt data, using ElGamal's cryptography method and hash checking using the SHA256 algorithm. After encryption, to ensure the encrypted data is still the original data without any changes or manipulation by unauthorized 3rd party then done by checking the hash generated using SHA256 algorithm. The data used in this study was a sample of raw data from the ATPWTP survey (ability to pay and willing to pay) conducted by the BPS Cirebon (Central Statistics) in 2019 and the data was in the form of Excel and txt files. The encryption process resulted in a cipher larger than the plaintext and takes longer for the data encryption process than during the data cipher decryption process.
A SYSTEMATIC REVIEW METHOD FOR SECURITY ANALYSIS OF INTERNET OF THINGS ON HONEYPOT DETECTION Andrie Yuswanto; Budi Wibowo
TEKNOKOM Vol. 4 No. 1 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (225.547 KB) | DOI: 10.31943/teknokom.v4i1.54

Abstract

A very significant increase in the spread of malware has resulted in malware analysis. A recent approach to using the internet of things has been put forward by many researchers. Iot tool learning approaches as a more effective and efficient approach to dealing with malware compared to conventional approaches. At the same time, the researchers transformed the honeypot as a device capable of gathering malware information. The honeypot is designed as a malware trap and is stored on the provided system. Then log the managed events and gather information about the activity and identity of the attacker. This paper aims to use a honeypot in machine learning to deal with malware The Systematic Literature Review (SLR) method was used to identify 207 . Then 12 papers were selected to be investigated based on inclusion and exclusion criteria. The technique used by most researchers is to utilize the available honeypot dataset. Meanwhile, based on the type of malware being analyzed, honeypot in machine learning is mostly used to collect IoT-based malware.
A 5G RURAL, REMOTE, AND DIFFICULT AREAS HOPE: A REVIEW Harry Candra Sihombing
TEKNOKOM Vol. 4 No. 1 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (410.447 KB) | DOI: 10.31943/teknokom.v4i1.57

Abstract

The 5G cellular networks are “urban” areas technology in nature, extensively deployed where the user’s density is high to provide very high data rates, coupled with extremely low delays and dealing with very high mobility of users. On the contrary, one-third of people experience a lack of mobile broadband connectivity living in rural zones. These mobile broadband lacks recognized as the main barriers impairing the Sustainable Developing Goals (SDGs) defined by the United Nations. Those that are not currently covered will be unlikely to be covered also soon, as the network operators are not keen to invest in such zones, because of potentially low revenues. While it is confirmed that 5G would meet stringent requirements in urban zones, rural areas still suffer from almost inexistent MBB (Mobile Broadband) coverage, especially in the developing world. The big deal of isolated rural areas, which are sparsely inhabited by low-income populations, is that the classical access using traditional backhaul technologies is a bad solution for operators since it does not ensure a good ROI (Return of Investment).
DESIGN OF COMPUTER REPAIR SERVICES APPLICATION ANDROID-BASED Achmad Udin Zailani; Alvino Octaviano; Sholihin Sholihin
TEKNOKOM Vol. 4 No. 1 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (305.814 KB) | DOI: 10.31943/teknokom.v4i1.58

Abstract

Computers are one form of advances in electronic and informatics technology; the function of the computer itself serves as a tool for writing, drawing, editing images or photographs, or as a means of storage. Android, a Linux-based operating system, is a smart operating system that can compete with operating systems on a computer. Some of the problems identified include user difficulties in overcoming computer damage to determine whether to repair or buy a new unit, difficulty in reaching authorized service providers, risks when deciding to repair at a public service place, and limited access to information and costs repairing computer damage. This research specifically designs an Android application-based computer service application that makes it easier for people to get service services. The above research results formulate computer repair services using an Android-based platform with Android Studio and MySQL as the database for this study. This application is expected to be useful for customers in terms of time and cost.
VPN SITE TO SITE IMPLEMENTATION USING PROTOCOL L2TP AND IPSEC Budi Santoso; Asrul Sani; T. Husain; Nedi Hendri
TEKNOKOM Vol. 4 No. 1 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (854.231 KB) | DOI: 10.31943/teknokom.v4i1.59

Abstract

Data exchange communication has developed, which leads to centralized communication, and to achieve this communication requires a type of data communication whose data is accommodated on the server and can be accessed by clients, such as at organization. As a company engaged in education, the development of centralized data communication by utilizing the intranet network has been formed. The use of an intranet network allows data communication that is vulnerable to wiretapping. To fix this using a VPN network. L2TP and IPsec VPNs have different performances, especially in the level of security provided. In this study, an analysis of the L2TP and IPsec VPN network performance was carried out on the SMB Server on the Ubuntu server and the Mikrotik router for its VPN configuration. In this study, the L2TP and IPsec VPN was designed by configuring the Mikrotik RB 450G router and the SMB Server configuration using Command Line Interface on Ubuntu 18.04 server. For security analysis, use hacking methods to get VPN Server login data and sniffing methods to get SMB Server login data and SMB data. For performance analysis using parameters of delay, throughput, and packet loss. Wireshark is software for checking by capturing each packet of data from an interface. The research objective to be achieved is to design a VPN technology based on L2TP & IPSec, to be able to determine the resulting performance after implementing a VPN based on L2TP & Ip Sec. The result is that VPN can connect from HO to branch one and branch two or connect from public connection to local connection. The Ubuntu server used is also running well, so it helps the VPN process properly.

Page 1 of 1 | Total Record : 10