cover
Contact Name
Indria Nurfadanti
Contact Email
jjkk.iitss@gmail.com
Phone
-
Journal Mail Official
jiksi.iitss@gmail.com
Editorial Address
Jl.Tegal Binangun Perumahan PJP 99 No.F5 Palembang, Sumatera Selatan, Indonesia
Location
Unknown,
Unknown
INDONESIA
Jurnal Jaringan Komputer dan Keamanan (JJKK)
ISSN : 27213951     EISSN : 27217655     DOI : https://doi.org/10.61346/jjkk.v2i1.261
Core Subject : Science,
|Jurnal Jaringan Komputer dan Keamanan |JJKK| is a peer-reviewed journal devoted to publish multidisciplinary issues related to Computer Network and Security – | Computer Network and Architecture – design, topology, protocols, software-defined networking (SDN), network function virtualization (NFV), wireless and mobile networks, sensor networks, and cloud-edge infrastructures | Information and Cyber Security – cryptography, network security, ethical hacking, intrusion detection and prevention systems, blockchain-based security, digital forensics, and privacy-preserving computation | Infrastructure Systems and Digital Services – cloud computing, distributed systems, virtualization, smart infrastructure, data centers, and scalable service-oriented architectures | Communication Network Architectures and Protocols – 5G/6G, IoT communication, ad-hoc and mesh networking, satellite and optical networks, and next-generation internet technologies | Network Services and Applications – content delivery networks (CDN), streaming systems, e-Government, e-Learning, e-Health, smart city applications, and intelligent network applications | Network Operation, Management, and Optimization – network monitoring, automation, quality of service (QoS), traffic engineering, performance analysis, and green computing for sustainable digital infrastructure| Artificial Intelligence and Machine Learning for Networks and Security – AI-based network management, deep learning for intrusion detection, federated learning, reinforcement learning for routing and optimization, and intelligent cyber defense systems| Data Analytics and Big Data Infrastructure – network data mining, log analysis, predictive analytics, distributed data pipelines, and security analytics for large-scale systems| Discrete Algorithms and Discrete Modeling – combinatorial optimization, graph theory, simulation modeling, game theory applications, and algorithmic approaches for network security and efficiency | Human–Technology Interaction and Digital Ethics – behavioral cybersecurity, human factors in information systems, socio-technical impacts of digital transformation, and ethics in AI-based networks | Information Policy, Governance, and Law – data protection law, cybersecurity regulations, governance frameworks (GRC), risk assessment, compliance, and national/international digital security policy | Multidisciplinary Issues in Computer Networks and Security – integration of computer science, information systems, psychology, education, law, business, and public policy in advancing secure and intelligent networked societies|. JJKK is a triannual, open access, peer-reviewed, and international e-journal, published in Indonesia. We accept unpublished, high quality, and original research manuscripts in English. JJKK is published three times per year by Institute of Information Technology and Social Science (IITSS). All research articles appearing in JJKK have undergone a thoroughly blind peer-review.
Articles 55 Documents
Arsitektur Software Defined Network: Implementasi Pada Small Network Intraswadaya Hidayat; Bima Abdi Perdana
Jurnal Jaringan Komputer dan Keamanan Vol 1 No 1 (2020): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Software Defined Network and Openflow protocols are currently growing rapidly. But its use in small networks and home offices is still very rare. This article discusses the use of Software Defined Network architecture in small and home office networks so that it can be developed so that the SDN architecture can be an alternative in network development that requires complex network management but is limited by the cost of infrastructure development.
Studi Literatur Analisis Malware Menggunakan Metode Analisis Dinamis dan Statis Rezki Syaputra; Syaifudin
Jurnal Jaringan Komputer dan Keamanan Vol 1 No 1 (2020): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Malware is software or software created to infifiltrate or damage computer systems. The spread of malware today is so easy either through a USB flash drive, certain advertisements on websites, and other media. Everything is very closely related to crime such as theft of files, credit cards, internet banking and so forth. In this regard, there is a field that deals with crime namely digital forensics. One of the stages in digital forensics is analyzing digital evidence, in this case malware. To prove a piece of software, it is said that malware is knowing how the program works on a computer system. The Dynamic and Static Malware Analysis Method is a combination of methods that are suitable for analyzing how malware works. Based on an analysis of the workings of malware (poison ivy), it can be concluded that there are several signatures, fifile names, and strings that have been investigated in fact can be able to log in remotely without being noticed by the computer owner.
Perbandingan Kinerja Topologi Canonical Dan Folded Clos Tree Pada Jaringan Data Center Suryayusra; Edi Surya Negara; Maria Ulfa
Jurnal Jaringan Komputer dan Keamanan Vol 1 No 1 (2020): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A Data Center (DC) can be said to be of quality if it can provide optimal service. Optimal service means that the access provided must be free of distractions. Disturbances can originate from outside the system or from within the system itself Both can only be overcome if a DC has a good architecture. There are two comparable topologies compared, namely canonical tree and folded closs tree topologies which aim to get better data transfer rates between the two and which one has better data transfer speeds between the two when interference occurs. In analyzing these comparisons, the authors compare using the ftp method in mathematically analyzing the data transfer rates of the two DC architectures above using the same comparator data on 3 trials so as to obtain an accurate result, which one has better data transfer speeds and the best data transfer when both are interrupted in case one of the best flow switches is interrupted.
Single Processing versus Parallel-Based Processing on Web Server: Which Has the Best Performing Service Ria Andryani; Edi Surya Negara; Ferdiansyah
Jurnal Jaringan Komputer dan Keamanan Vol 1 No 1 (2020): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A quality server service is a server that is capable of delivering quality services to all of the servers that access the server services. Quality service is a service that guarantees conficonfidentiality, integrity, and availability. Parallel based service on a server or load balancing is one of the means used to improve the performance and availability of servers, is to divide the requests are coming to multiple servers at once, so that the load borne by each lighter. So due to get a lighter workload then directly affect the performance of servers are increasingly responsive, the level of availability server can also be maintained. By using load balancing technology, then there will be a difference in the performance of Web Server Load Balancing with Single Server, which can be used as a comparison, so it can be a solution for managing Server.
Perbandingan Kinerja Server Virtual Pada Proses High Availability Chairul Mukmin
Jurnal Jaringan Komputer dan Keamanan Vol 1 No 1 (2020): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This research is motivated by the complexity of each company being required to provide services without limits and can be accessed at any time, this must be supported by a reliable system to support so that the services provided can be accessed at any time. For this reason, it is necessary to analyze the virtual machine specifically for server repair when it is decided on the service that is running. This research discusses about improving server performance on virtual machines by using vmware and proxmox as virtual machines. This research uses the action research method. Testing is done by measuring the use of server resources when using virtual machines from the main server to the backup server. The results showed that VMware was more efficient in using server resources with high availability of 22.9% CPU, 1.73 GB of memory and 4.07 MB network while Proxmox had greater use of existing resources with high availability of CPU 28.8%, memory 2, 15GB and a 2.03MB network. From the data above shows that VMware has a more stable performance compared to Proxmox in terms of resource server usage when the process is high.
PERANCANGAN DAN IMPLEMENTASI VPN METODE IPSEC SITE TO SITE MENGGUNAKAN FORTIGATE PADA PT. LINKSINDO MAKMUR Muhammad Gages Alvisyahri
Jurnal Jaringan Komputer dan Keamanan Vol 4 No 3 (2023): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61346/jjkk.v4i3.45

Abstract

Linksindo Makmur is a company engaged in providing contact center services, starting from contact center applications, recruiting employees for contact centers, and places for contact centers. PT. Linksindo Makmur daily exchanges data and information as well as communication between the head office and branch offices. The problems that occur in PT. Linksindo Makmur is the frequent disconnection of network connections between the head office and branches when you don't want it, because the equipment at the branch office is not the same as the equipment at the head office so that these problems interfere with the performance of PT.Linksindo Makmur employees. Due to the company's problems, the design of a VPN (Virtual Private Network) with the IPsec Site to Site method using Fortigate is one of the authors' proposals for a secure means of communication and data transfer and maintaining data validity. The results of the design and implementation that the author made is very good because there are no longer obstacles to the disconnection of the network connection between the head office and branch offices. The advantage of this research is that using a VPN IPsec Site to Site will be safer and easier to implement. The Fortigate device not only functions as a Firewall but also acts as a router, gateway, antivirus, VPN hub, anti spyware, antispam, proxy, and traffic shaping. Fortigate is very important for companies that care about data security. The drawback of this research is that it is almost non-existent, maybe for people who are not used to it, it will take time to get used to it Kata kunci: Fortigate, IPSec, VPN
A Literature Review : Network Security Menggunakan Virtual Private Network L2tp/Ipsec, Port Knocking, Port Forwarding, Honeypot Dan Pfsense Rianda Pratama
Jurnal Jaringan Komputer dan Keamanan Vol 4 No 3 (2023): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61346/jjkk.v4i3.61

Abstract

Perkembangan teknologi saat ini sangatlah pesat, banyak perusahaan berlomba-lomba menciptakan suatu aplikasi atau layanan melalui internet sebagai bentuk persaingan bisnis agar dapat menarik hati pelanggan atau bahkan membuat pelanggan merasa nyaman sehingga tetap setia menggunakan jasa atau pelayanan dari perusaahaan tersebut. Hal tersebut sangat berdampak dalam kehindupan sehari-hari sedikit demi sedikit kehidupan masyarakat saat ini mulai bergantung dengan internet. Melihat fenomena tersebut agar tetap terbentuknya suatu kondisi yang kondusif dalam menajalankan kehidupan sehari-hari maka diperlukanlah suatu sistem pengamanan yang dapat menjaga pelayanan atau layanan yang terhubung di internet dapat beroperasi dengan baik maka tak khayal pengamanan suatu sistem jaringan merupakan suatu hal yang penting guna mendukung kegiatan ber-internet sehari-hari. Dari banyaknya metode pengaman jaringan ada beberapa hal yang penulis ingin soroti, yaitu cara mendeteksi serangan terhadap jaringan,cara membentuk jaringan yang terenkripsi, skema pengaman yang terpadu. Dari hal tersebut maka penulis menemukan beberapa jurnal dan penelitian yang membahas tentang pengamanan jaringan dengan menggunakan metode virtual private netwok L2TP/IPsec, Port Knocking, Honeypot, Port Forwarding dan Open Source Firewall PFsense
A Literature Review Internet Of Things (Iot): Qr Code Arif Alfarisyah
Jurnal Jaringan Komputer dan Keamanan Vol 4 No 3 (2023): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61346/jjkk.v4i3.62

Abstract

Penelitian ini akan membahas perihal tentang QR Code pada IoT. Pada saat ini perkembangan dalam bidang teknologi dan informasi berkembang dengan sangat cepat tanpa disadari terdapat banyak sekali teknologi-teknologi yang dapat membantu kita dalam kegiatan sehari-hari. Artikel ini mereview Literature Review IoT yaitu QR Code. Dalam penulisan artikel ini memiliki tujuan membangun sebuah hipotesis pengaruh antar variable untuk digunakan dalam penelitian selanjutnya. Kemuian hasil dari artikel ini adalah: 1) Sensor berpengaruh terhadap IoT 2) Konektifitas berpengaruh terhadap IoT 3) QR Code juga berpengaruh terhadap IoT.
A Literature Review : Analisis Pendekatan Top down Network Design pada Perancangan Jaringan Komputer Dilla Mukarromah
Jurnal Jaringan Komputer dan Keamanan Vol 4 No 3 (2023): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61346/jjkk.v4i3.63

Abstract

Perkembangan jaringan computer yang saat ini sangat berkembang pesat, ada beberapa jenis jaringan computer salah satunya yaitu jaringan computer yang berbasis luas yaitu Wide Area Network (WAN) seperti jaringan internet, yang mana interkoneksi jaringan komputer skala besar yang dihubungkan menggunakan protocol khusus. Dengan adanya jaringan internet dapat membuat semua orang dapat mengakses informasi dimanapun dan kapanpun. Kebutuhan internet saat ini sudah banyak digunakan seperti di intansi pemerintah, perusahaan, masyrakat umum dan pendidikan. banyak intansi yang telah menerapkan jaringan computer seperti pada perusahaan, pemerintah, dan dunia pendidikan. Sumber terkait menggunakan metode pendekatan Top-Down Network design. Usulan tersebut bertujuan untuk membuat desain jaringan yang sesuai dengan kebutuhan, dilihat dari aspek reliabilitas dan pengguna jaringan dengan konsep yang akan dirancang, diharapkan memberikan pertimbangan dalam membangun jaringan computer. Hasil analisis berdasarkan penelitian terdahulu, diketahui bahwa Top Down merupakan model yang mudah dipahami dan dapat diimplementasikan sesuai dengan kebutuhan.
A Literature Review : Implementasi Cloud Computing Pada E-Learning SMK Muhammadiyah 1 Palembang Amrullah Maulana Fiqri
Jurnal Jaringan Komputer dan Keamanan Vol 3 No 1 (2022): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Pada Era Teknologi Selama beberapa tahun terakhir ini, perkembangan Cloud Computing berkembang sangat pesat dan telah menjadi topik utama di berbagai bidang teknologi informasi. Layanan utama yang disediakan oleh Cloud Computing adalah Software as Services (Saas), Platform as Services (PaaS), dan Infrastructer as Services (IaaS). Ketiga layanan tersebut dapat diakses oleh perangkat bergerak yang kompatibel dan mudah digunakan seperti Android, Blacberry, IOS, Windows Phone dan lain sebagainya. Pemanfaatan Cloud Computing dimanfaatkan di berbagai sektor seperti perusahaan, bisnis, layanan teknologi, sampai ke dunia pendidikan dapat dijadikan alternative permasalahan kebutuhan prasarana pembelajaran dan informasi guna menghemat sumber daya pembelajaran.