Jurnal Jaringan Komputer dan Keamanan (JJKK)
|Jurnal Jaringan Komputer dan Keamanan |JJKK| is a peer-reviewed journal devoted to publish multidisciplinary issues related to Computer Network and Security – | Computer Network and Architecture – design, topology, protocols, software-defined networking (SDN), network function virtualization (NFV), wireless and mobile networks, sensor networks, and cloud-edge infrastructures | Information and Cyber Security – cryptography, network security, ethical hacking, intrusion detection and prevention systems, blockchain-based security, digital forensics, and privacy-preserving computation | Infrastructure Systems and Digital Services – cloud computing, distributed systems, virtualization, smart infrastructure, data centers, and scalable service-oriented architectures | Communication Network Architectures and Protocols – 5G/6G, IoT communication, ad-hoc and mesh networking, satellite and optical networks, and next-generation internet technologies | Network Services and Applications – content delivery networks (CDN), streaming systems, e-Government, e-Learning, e-Health, smart city applications, and intelligent network applications | Network Operation, Management, and Optimization – network monitoring, automation, quality of service (QoS), traffic engineering, performance analysis, and green computing for sustainable digital infrastructure| Artificial Intelligence and Machine Learning for Networks and Security – AI-based network management, deep learning for intrusion detection, federated learning, reinforcement learning for routing and optimization, and intelligent cyber defense systems| Data Analytics and Big Data Infrastructure – network data mining, log analysis, predictive analytics, distributed data pipelines, and security analytics for large-scale systems| Discrete Algorithms and Discrete Modeling – combinatorial optimization, graph theory, simulation modeling, game theory applications, and algorithmic approaches for network security and efficiency | Human–Technology Interaction and Digital Ethics – behavioral cybersecurity, human factors in information systems, socio-technical impacts of digital transformation, and ethics in AI-based networks | Information Policy, Governance, and Law – data protection law, cybersecurity regulations, governance frameworks (GRC), risk assessment, compliance, and national/international digital security policy | Multidisciplinary Issues in Computer Networks and Security – integration of computer science, information systems, psychology, education, law, business, and public policy in advancing secure and intelligent networked societies|. JJKK is a triannual, open access, peer-reviewed, and international e-journal, published in Indonesia. We accept unpublished, high quality, and original research manuscripts in English. JJKK is published three times per year by Institute of Information Technology and Social Science (IITSS). All research articles appearing in JJKK have undergone a thoroughly blind peer-review.
Articles
55 Documents
A Literature Review Network Security
Muhammad Irdian Saputra -
Jurnal Jaringan Komputer dan Keamanan Vol 4 No 3 (2023): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.61346/jjkk.v4i3.66
Keamanan jaringan merupakan salah satu aspek penting dalam era digital saat ini. Literature review ini menyajikan tinjauan menyeluruh tentang teknologi dan metode yang digunakan untuk melindungi jaringan dari berbagai ancaman keamanan. Penelitian ini menggali berbagai sumber literatur, termasuk artikel ilmiah, jurnal, buku, dan publikasi terkini, untuk mengidentifikasi tren dan praktik terkini dalam bidang keamanan jaringan. Tinjauan dimulai dengan memeriksa konsep dasar keamanan jaringan, termasuk identifikasi potensi ancaman, risiko, dan kerentanan jaringan. Selanjutnya, teknologi enkripsi dan protokol keamanan jaringan seperti SSL/TLS, IPsec, dan VPN dieksplorasi untuk menyoroti cara-cara perlindungan data dalam transit dan saat beristirahat. Selain itu, tinjauan ini membahas tentang penggunaan firewall, IDS (Intrusion Detection System), dan IPS (Intrusion Prevention System) sebagai pertahanan jaringan yang proaktif. Beberapa metode autentikasi, termasuk penggunaan kata sandi kuat, multi-faktor, serta kebijakan akses yang bijaksana, juga dikaji untuk melindungi jaringan dari akses yang tidak sah. Tinjauan ini juga mencakup berbagai perangkat lunak keamanan jaringan open-source, seperti pfSense, Snort, dan Suricata, yang memberikan alternatif kost-effektif untuk mengelola keamanan jaringan.Selanjutnya, analisis peraturan dan kepatuhan hukum yang relevan dengan keamanan jaringan juga diperkenalkan untuk menyadari pentingnya mematuhi peraturan hukum dan menghadapi sanksi potensial yang diakibatkan oleh pelanggaran data. Akhirnya, tinjauan ini menyajikan pandangan tentang pentingnya pendekatan terpadu dalam keamanan jaringan, mengintegrasikan teknologi, pelatihan personel, kebijakan yang ketat, dan pemantauan yang terus-menerus.Kesimpulannya, literatur review ini menyajikan gambaran komprehensif tentang berbagai aspek keamanan jaringan. Diharapkan dapat memberikan panduan bagi praktisi keamanan jaringan dan organisasi untuk meningkatkan perlindungan jaringan mereka dan menanggapi perubahan lanskap ancaman keamanan yang terus berkembang.
Analysis of Hotspot Network Security Using the OpenSSL (Secure Socket Layer) Security Method at the PTPN 7 Musi Landas Plantation Office
Al Harits Athif
Jurnal Jaringan Komputer dan Keamanan Vol 6 No 1 (2025): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.61346/jjkk.v6i1.229
For wireless network security on access point devices, the security method often used is the WEP/WPA/WPA2 method. Almost all wireless network users, on average, implement their access point devices using this method. This method is well known for its ability to secure wireless network security. However, the WEP/WPA/WPA2 method can still be penetrated by hacking software using the brute-force attack and dictionary methods. This hacking software is widely available on the internet. The next weakness is that this method only uses a password when connecting to the access point device. Consequently, the password can easily spread if one user gives their password to another user, and it is easily known by other users, and so on. The SSL (Secure Socket Layer) method has been widely used for securing websites that require a high level of security, such as banking websites, hosting, online buying and selling, and so forth, which usually use the HTTPS (Hyper Text Transfer Protocol Secure) protocol. Implementation of a gateway server functions as an internet router on both wired and wireless networks. This is a solution that can help communication between computers and a hotspot internet security system. Users will first log in by entering a user name and password when accessing the internet using the Secure Socket Layer (SSL) security method.
Network Security Monitoring System via Whatsapp using Snort on Ubuntu
Jefri Simanjuntak;
Syahril Rizal
Jurnal Jaringan Komputer dan Keamanan Vol 6 No 1 (2025): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.61346/jjkk.v6i1.230
This research addresses critical network security vulnerabilities identified at the Palembang City Office of Culture and Tourism (Dinas Kebudayaan Dan Pariwisata Kota Palembang), an agency responsible for managing regional tourism and cultural assets. The necessity for heightened security became apparent following a successful Distributed Denial of Service (DDOS) attack against the agency's operational website. The investigation diagnosed the incident's root causes as high network vulnerability stemming from reliance on standard, inadequately secured infrastructure, coupled with insufficient human resource (HR) capacity and the complete absence of effective legacy prevention systems [1]. The solution implemented involves the construction of a Network Security Monitoring System utilizing the open-source Snort application, configured as an Intrusion Detection System (IDS) deployed on an Ubuntu platform. The core technical innovation of this system lies in its capacity for real-time alert delivery, leveraging the ubiquitous Whatsapp instant messaging application to notify the network administrator immediately upon the detection of an intrusion [1]. Validation testing confirms the system's efficacy in detecting specific, high-risk attack vectors, including SSH brute force login attempts, Telnet access probes, File Transfer Protocol (FTP) access attempts, and high-volume DDOS flooding [1]. The successful deployment demonstrates a viable, low-cost, and responsive strategy for public sector entities to transition from a passive security approach to a proactive, real-time security monitoring posture.
Analysis of Mikrotik Server Log Data Mining for Attack Pattern Analysis with Clustering at Bekangdam II Sriwijaya
M.R. Kareliansyah;
Heri Suroyo
Jurnal Jaringan Komputer dan Keamanan Vol 6 No 1 (2025): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.61346/jjkk.v6i1.231
Research conducted at Bekangdam II Sriwijaya aims to analyze the pattern of attacks carried out by crackers using data mining of logs on Mikrotik. The method employed in this research is the descriptive method. The research directly involves fieldwork because it requires a lengthy analysis. The benefits derived from conducting this research include identifying the techniques launched by crackers against the existing network at Bekangdam II Sriwijaya. Developments in the world of technology have reached the Industrial Era 4.0. In this era, telecommunication networks have undergone many changes, both in wired and wireless networks. The increasing rate of this technological development is inseparable from the growing cybercrime activity. The results of this study indicate that data mining of logs on the Bekangdam II Sriwijaya Server can be analyzed, with the analysis revealing an IP that frequently accesses the server continuously, specifically 103.39.9.81, utilizing the Telnet medium 205 times in a day. The clustering process using K-means resulted in 4 clusters: the first cluster (1) is shown in blue, the second cluster (2) is purple, the third cluster (3) is green, and the fourth cluster is red. The yellow star color indicates the cluster's center point or its centroid point. Based on the access media, the Cluster Center Initialization can be grouped according to the following table. The medium most frequently used to launch this attack is Telnet, with a frequency of 535 times.
Design and Build of an Information Sharing Application at the Palembang TV (PAL TV) Office Based on Android
Higyendra Rizki
Jurnal Jaringan Komputer dan Keamanan Vol 6 No 1 (2025): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.61346/jjkk.v6i1.232
PT Palembang TV is an electronic media company or organization whose main service is to disseminate information. Sharing activities within this company currently do not have a centralized information service. This is especially true for employees who need an integrated official information medium for job information, news, culture, rules, history, and even group discussions that have not been professionally accommodated well. This study aims to produce an application that can help PT. Palembang TV to provide convenience in sharing information among employees, so that the information transfer process is expected to be faster and clearer. This research was conducted from February to April 2020. For data collection, the authors came directly to the research location at Palembang TV, Palembang City. The software used in the research is Microsoft Office 2016, Xampp Webserver, HTML5, PHP, Framework7, and Cordova. This study uses data collection methods of observation, interviews, and documentation. The results obtained with the information sharing application at the Palembang TV office are the existence of an official medium that is mobile and capable of reaching all staff and leaders at PT. Palembang TV. This ensures that the process of communication and professional dissemination of internal information can be well-integrated and capable of increasing togetherness with structured and clear information.
Implementation of Hot Standby Router Protocol (HSRP) And Virtual Router Redundancy Protocol (VRRP)
Akhmad Fauzaan Azhar;
Fatoni
Jurnal Jaringan Komputer dan Keamanan Vol 6 No 1 (2025): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.61346/jjkk.v6i1.233
The rapid evolution of computer network technology mandates the provision of stable and efficient network services. A significant operational vulnerability arises when a primary router, responsible for network stabilization, operates without a redundant backup router to maintain continuity in the event of its failure. Consequently, this study proposes the addition of a Cisco router to mitigate potential operational constraints associated with the primary router. The backup router is configured to automatically assume the primary router's tasks upon the detection of an operational issue, thereby preserving network stability. The primary objective of this research is to implement the Hot Standby Router Protocol (HSRP) and the Virtual Router Redundancy Protocol (VRRP) to enhance network availability at the Palembang Office of the Personnel and Human Resources Development Agency (BKPSDM). The research methodology is based on Action Research, comprising five distinct phases: Diagnosing, Action Planning, Action Taking, Evaluating, and Learning. Data were collected through field observations, interviews, and a comprehensive literature review. The study involved deploying a redundant network solution utilizing HSRP and VRRP within the BKPSDM's network infrastructure. Quality of Service (QoS) performance was evaluated using standard network utilities, specifically ping and traceroute, to test the implemented HSRP and VRRP methods. The successful implementation of HSRP and VRRP is projected to result in a measurable improvement in network availability at the Palembang Office of the Personnel and Human Resources Development Agency compared to the previous configuration.
Monitoring Ideal Body Mass Index Using a Blynk-Based Internet of Things Measurement System
Arief Rahman
Jurnal Jaringan Komputer dan Keamanan Vol 5 No 1 (2024): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.61346/jjkk.v5i1.234
This study presents the design and implementation of an Internet of Things (IoT)-based automated measurement system for monitoring height, weight, and Body Mass Index (BMI). The system utilizes an ultrasonic sensor for height measurement and a load cell sensor for weight measurement, integrated with a NodeMCU ESP8266 microcontroller and the Blynk application for real-time data visualization. The increasing prevalence of obesity and lifestyle-related health issues, particularly during the COVID-19 pandemic, highlights the need for efficient and accurate health monitoring tools. The study adopts an action research methodology, consisting of diagnosing, action planning, action taking, evaluating, and learning phases. Experimental results show that weight measurements obtained from the load cell sensor produced a high level of accuracy with an average error of 0.5–0.75 kg, while height measurements using the ultrasonic sensor showed an average error of 1 cm. The system successfully displays measurement results on both an LCD module and the Blynk mobile application. The findings indicate that IoT-based measurement systems offer significant potential to support personal health monitoring and provide a practical solution for continuous tracking of BMI.
Mapping Access Points in the PT PLN (Persero) UIP SUMBAGSEL Archive Building Using NetSpot and WiFi Analyzer
M. Rizky Aulia
Jurnal Jaringan Komputer dan Keamanan Vol 5 No 1 (2024): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.61346/jjkk.v5i1.235
The rapid advancement of information and communication technology in the digital era has significantly transformed connectivity infrastructures, with Wi-Fi networks becoming essential for supporting mobility and facilitating high-speed data access across diverse sectors. As a leading state-owned energy enterprise in Indonesia, PT PLN (Persero) relies heavily on stable and reliable Wi-Fi networks to enhance operational efficiency, enable interdepartmental communication, and support access to corporate information systems throughout its organizational units. However, the Wi-Fi network in the PT PLN (Persero) UIP SUMBAGSEL Archive Building exhibited uneven signal distribution, with several areas experiencing weak signal strength and substantial speed degradation. This study was conducted to resolve these issues by mapping coverage areas and installing additional access points using NetSpot and WiFi Analyzer. The study employed the Action Research method, consisting of Diagnosing, Action Planning, Action Taking, Evaluating, and Learning. The results demonstrate that installing supplementary access points effectively improved Wi-Fi coverage across previously underserved areas. Post-installation measurements revealed excellent overall signal distribution, ensuring strong, stable, and consistent connectivity for users within the Archive Building of PT PLN (Persero) UIP SUMBAGSEL.
Application of the Walktest Method for Optimizing Access Point Coverage in the Main Building of PT PLN (Persero) UIP SUMBAGSEL
Kms. M. Okta Agung Saputra
Jurnal Jaringan Komputer dan Keamanan Vol 5 No 1 (2024): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.61346/jjkk.v5i1.236
This study addresses Wi-Fi network issues in the Main Building of PT PLN (Persero) UIP SUMBAGSEL, which frequently experiences interference, weak signal strength, and blind spots at several points on the third floor. The proposed solution involves applying the walktest method, using the G-Net WiFi tool for data collection, and optimizing access point placement. The study aims to identify areas with weak signal coverage and determine optimal access point locations to improve Wi-Fi network quality. The method includes measuring signal strength at various locations inside the building by walking continuously along specified routes. The results demonstrate that the walktest method is effective for identifying problematic areas and supporting better access point placement. The optimized configuration eliminates blind spots and produces a more stable and evenly distributed Wi-Fi network throughout the third floor.
Simulation of Bandwidth Management Using Queue Tree and PCQ Techniques in the IT Service Department of PT Pusri Palembang
Daud Rusdi
Jurnal Jaringan Komputer dan Keamanan Vol 5 No 1 (2024): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.61346/jjkk.v5i1.237
The IT Service Building of PT Pusri Palembang is equipped with adequate internet facilities; however, bandwidth distribution across rooms remains uneven, resulting in the absence of fair bandwidth allocation throughout the network. This leads to user competition and reduced internet performance because upload and download limits are not applied per room. Network instability in terms of upload and download speed affects the smoothness of data transmission; thus, bandwidth management is necessary to address these issues. This study applies the Action Research method, consisting of the stages of Diagnosing, Action Planning, Action Taking, Evaluating, and Specifying Learning to analyze the results for future improvements. In the implementation of bandwidth management, the Per Connection Queue (PCQ) and Queue Tree techniques are applied to regulate data flow based on priority levels. The results of the simulation show that the application of bandwidth management in the IT Service Department network is highly effective in reducing bandwidth-related issues in each room and achieving equal bandwidth distribution.