cover
Contact Name
Indria Nurfadanti
Contact Email
jjkk.iitss@gmail.com
Phone
-
Journal Mail Official
jiksi.iitss@gmail.com
Editorial Address
Jl.Tegal Binangun Perumahan PJP 99 No.F5 Palembang, Sumatera Selatan, Indonesia
Location
Unknown,
Unknown
INDONESIA
Jurnal Jaringan Komputer dan Keamanan (JJKK)
ISSN : 27213951     EISSN : 27217655     DOI : https://doi.org/10.61346/jjkk.v2i1.261
Core Subject : Science,
|Jurnal Jaringan Komputer dan Keamanan |JJKK| is a peer-reviewed journal devoted to publish multidisciplinary issues related to Computer Network and Security – | Computer Network and Architecture – design, topology, protocols, software-defined networking (SDN), network function virtualization (NFV), wireless and mobile networks, sensor networks, and cloud-edge infrastructures | Information and Cyber Security – cryptography, network security, ethical hacking, intrusion detection and prevention systems, blockchain-based security, digital forensics, and privacy-preserving computation | Infrastructure Systems and Digital Services – cloud computing, distributed systems, virtualization, smart infrastructure, data centers, and scalable service-oriented architectures | Communication Network Architectures and Protocols – 5G/6G, IoT communication, ad-hoc and mesh networking, satellite and optical networks, and next-generation internet technologies | Network Services and Applications – content delivery networks (CDN), streaming systems, e-Government, e-Learning, e-Health, smart city applications, and intelligent network applications | Network Operation, Management, and Optimization – network monitoring, automation, quality of service (QoS), traffic engineering, performance analysis, and green computing for sustainable digital infrastructure| Artificial Intelligence and Machine Learning for Networks and Security – AI-based network management, deep learning for intrusion detection, federated learning, reinforcement learning for routing and optimization, and intelligent cyber defense systems| Data Analytics and Big Data Infrastructure – network data mining, log analysis, predictive analytics, distributed data pipelines, and security analytics for large-scale systems| Discrete Algorithms and Discrete Modeling – combinatorial optimization, graph theory, simulation modeling, game theory applications, and algorithmic approaches for network security and efficiency | Human–Technology Interaction and Digital Ethics – behavioral cybersecurity, human factors in information systems, socio-technical impacts of digital transformation, and ethics in AI-based networks | Information Policy, Governance, and Law – data protection law, cybersecurity regulations, governance frameworks (GRC), risk assessment, compliance, and national/international digital security policy | Multidisciplinary Issues in Computer Networks and Security – integration of computer science, information systems, psychology, education, law, business, and public policy in advancing secure and intelligent networked societies|. JJKK is a triannual, open access, peer-reviewed, and international e-journal, published in Indonesia. We accept unpublished, high quality, and original research manuscripts in English. JJKK is published three times per year by Institute of Information Technology and Social Science (IITSS). All research articles appearing in JJKK have undergone a thoroughly blind peer-review.
Articles 55 Documents
Application of Hardening for WLAN Security Optimization in the IT Services Division at PT PUSRI Muhammad Reihan Pratama
Jurnal Jaringan Komputer dan Keamanan Vol 6 No 3 (2025): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61346/jjkk.v6i3.248

Abstract

Computer networks typically use two primary transmission methods: wired and wireless networks, commonly referred to as Wireless Local Area Networks (WLANs). In WLAN implementations, the standard security mechanism frequently adopted is Wi-Fi Protected Access 2 Pre-Shared Key (WPA2-PSK), which relies on an SSID and password. Despite this security mechanism, criminal activities such as unauthorized access and network intrusions continue to occur. Therefore, it is essential to enhance network security to ensure that WLAN environments remain secure and capable of minimizing potential risks to users. This study aims to improve and optimize WLAN network security by conducting vulnerability scanning using Nessus to assess existing security conditions, followed by the implementation of hardening techniques to strengthen and obscure vulnerabilities. Hardening includes several approaches such as applying raw firewalls and firewall filters, restricting ports and services, disabling unnecessary services, disabling the MikroTik Neighbor Discovery Protocol (MNDP), and implementing port knocking as an additional layer of protection. The findings indicate that applying vulnerability scanning alongside a structured hardening strategy significantly minimizes identified risks and enhances the overall resilience of the WLAN network against intrusions and security threats.
Analysis and Design of an Enterprise Campus Area on the Hierarchical Network Infrastructure of STIK Bina Husada Palembang Based on the Cisco Enterprise Model Wahfiyudin Alkahfi; Edi Surya Negara; Zaid Amin
Jurnal Jaringan Komputer dan Keamanan Vol 5 No 2 (2024): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61346/jjkk.v5i2.249

Abstract

The utilization of internet-based computer networks has become a fundamental necessity for supporting human activities in the modern era. This is particularly evident in various institutional activities, especially in academic settings such as colleges and schools, which heavily rely on internet network services. However, employing a large network segment with numerous hosts leads to excessive broadcast packet traffic. This issue is further compounded when the network is a flat network that lacks functional grouping for services and devices. To address these challenges, a network migration is necessary: shifting the existing Flat Local Area Network (LAN) to a hierarchical model based on the Cisco Enterprise Model, specifically employing the Enterprise Campus Area approach. This hierarchical design divides the LAN into several network layers, establishing more efficient Broadcast Domains and dedicated service functions, resulting in a system that is more modular and well-managed. The network was designed using the Top-Down method. The resulting design blueprint for the computer network system at STIK Bina Husada Palembang is intended to serve as a reference for future network planning and development.
Analysis of Academic Information System Website Service Quality at PGRI Palembang University Using The Webqual 4.0 Method Irpan Kurniyado
Jurnal Jaringan Komputer dan Keamanan Vol 5 No 2 (2024): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61346/jjkk.v5i2.250

Abstract

The rapid development of information technology has made the website an integral component of educational institutions, particularly in providing services to the academic community, including lecturers, students, and educational staff. The quality of internet-based academic information system (AIS) services must be evaluated to ascertain the level of user satisfaction. Currently, the PGRI AIS is prioritized in academic information processes, especially for students; therefore, an analysis of service quality—specifically user satisfaction—is essential for its improvement. This research measured the quality of the AIS website at PGRI Palembang University using the Webqual 4.0 method. Data were collected by distributing questionnaires via Google Form. WebQual is an instrument designed to assess a website's quality from the perspective of the end-user. Multiple Linear Regression Analysis was employed to test the relationship between the WebQual 4.0 variables and User Satisfaction. The findings are expected to provide innovation for the development of the AIS at PGRI Palembang University.
Internet of Things (IoT)-Based Environmental Pollution Monitoring System Satrio Rinaldo
Jurnal Jaringan Komputer dan Keamanan Vol 5 No 2 (2024): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61346/jjkk.v5i2.251

Abstract

A healthy environment significantly benefits the well-being of living organisms, particularly humans. As intelligent and social beings, humans are obligated to conserve, maintain, and safeguard environmental cleanliness to ensure a healthy and clean habitat. For instance, the Palembang City Sanitation Office designates specific public waste disposal points where citizens should deposit their waste into provided receptacles, thereby preventing indiscriminate dumping that can lead to environmental damage or pollution. However, the existing waste collection process presents a challenge: sanitation officers often do not know when a garbage collection point is full. This lack of information results in foul odors, unsightly conditions, and residents discarding waste onto the roadside. This research, therefore, aims to develop an Internet of Things (IoT)-based system capable of automatically providing notifications and information about the garbage bin's fill level via an Android smartphone. The device is engineered to utilize an Ultrasonic sensor to provide input data to the ESP8266, which then relays the trash bin's capacity status (empty, half-full, or full). Testing of this environmental pollution monitoring tool, specifically for monitoring trash bin capacity, demonstrated the system's ability to automatically and periodically provide status notifications. This function was confirmed during the testing period from 07:00 to 16:00.
The Crime of SQL Injection in the Service System at Bina Insan University Lubuklinggau Erwinsusanto; Edi Surya Negara
Jurnal Jaringan Komputer dan Keamanan Vol 5 No 2 (2024): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61346/jjkk.v5i2.252

Abstract

The rapid progress of contemporary technology significantly aids in the execution of work. The internet, as one of the most developed technologies, facilitates communication, access to stored data, and generally simplifies professional tasks. However, this convenience is accompanied by criminal threats targeting internet users, with phishing (or SQL Injection, according to the Indonesian text) being a particularly damaging offense. Phishing is defined as a threat employing social engineering techniques to deceive users by impersonating an authorized entity. This type of attack is prevalent across various industrial sectors, including corporate, banking, and education. Key factors contributing to phishing in online banking services involve users' limited knowledge, psychological vulnerabilities, and social networking privacy issues. Therefore, securing computer networks is essential for the prevention of phishing (or SQL Injection) attacks. This study employs a qualitative research methodology with descriptive techniques.
The Design of Enterprise Architecture Planning at PT. Glatia Plena Mas Motor Using the Zachman Framework Muhammad Aldo; Devi Udariansyah
Jurnal Jaringan Komputer dan Keamanan Vol 5 No 2 (2024): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61346/jjkk.v5i2.253

Abstract

This research aims to provide PT. Glatia Plena Mas Motor with a structured approach for achieving strategic advantages through the development of a formal business architecture. Using the Enterprise Architecture Planning (EAP) method, the study analyzes the company’s business processes and develops an architectural model based on the Zachman Framework. This framework is selected for its comprehensive ability to integrate business, information, application, and technology architectures. The resulting design includes a web-based application that centralizes key transactional information. Its implementation is expected to improve decision-making, streamline operational planning, and strengthen the company’s alignment with its strategic objectives.
Implementasi Desain Jaringan Hotspot Berbasis Mikrotik dengan Metode Network Development Life Cycle (NDLC) Pada PT Kirana Permata Muhamad Malik Fajar
Jurnal Jaringan Komputer dan Keamanan Vol 2 No 1 (2021): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61346/jjkk.v2i1.259

Abstract

The development of information technology has made the internet a primary necessity for supporting company operational activities. PT Kirana Permata, as a rubber processing company, requires a stable and well-managed internet network to support employee and guest activities. However, the uneven distribution of hotspot networks and the lack of security and bandwidth management have resulted in suboptimal network utilization. This study aims to design and implement a Mikrotik-based hotspot network using the Network Development Life Cycle (NDLC) method to improve the efficiency of computer network usage at PT Kirana Permata. The NDLC method includes the stages of analysis, design, simulation, implementation, monitoring, and management. The results show that the new network topology successfully expanded hotspot coverage to all employee dormitory areas. The implementation of bandwidth management produced balanced speed limitations, with an average download speed of 2.55 Mbps and an upload speed of 2.01 Mbps. In addition, the implementation of a login system improved network security. Thus, the implementation of a Mikrotik-based hotspot network using the NDLC method proved effective in enhancing the quality, security, and equity of internet access within the PT Kirana Permata environment.
Implementasi Sistem Monitoring dan Notifikasi Kualitas Udara Berbasis Internet of Things Menggunakan Arduino Muhamad Muzakirin
Jurnal Jaringan Komputer dan Keamanan Vol 2 No 1 (2021): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61346/jjkk.v2i1.260

Abstract

Air quality is a crucial factor affecting human health. Increased industrial activity, transportation, and population density have the potential to degrade air quality and elevate levels of hazardous pollutants, particularly carbon monoxide (CO). This study aims to implement an Internet of Things (IoT)-based air quality monitoring and notification system using Arduino. The system is designed with an MQ-7 sensor to detect CO gas and a DHT11 sensor to measure air temperature and humidity. Measurement data are sent to the ThingSpeak IoT platform, and notifications are delivered to users via the Telegram application. The system development method used was the prototype method. Data collection was conducted over seven days in March 2022 in Penukal Abab Lematang Ilir Regency. The measurement results showed that the highest average CO concentration, 9.99 ppm, occurred on March 7, 2022, at 4:41 PM WIB, while the lowest value, 1.83 ppm, occurred on March 1, 2022, at 10:34 AM WIB. The overall average concentration was 3.37 ppm, indicating that the air quality in Penukal Abab Lematang Ilir Regency remained within the good category.
Analisis Cakupan Jaringan 4G LTE Operator Telkomsel, XL Axiata, dan Indosat Ooredoo di Kecamatan Bayung Lencir, Kabupaten Musi Banyuasin, Provinsi Sumatera Selatan Ariyudi
Jurnal Jaringan Komputer dan Keamanan Vol 2 No 1 (2021): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61346/jjkk.v2i1.261

Abstract

The development of the fourth-generation (4G) cellular telecommunications network with Long Term Evolution (LTE) technology has become the backbone of data services in Indonesia. Network quality and coverage are important factors in determining user satisfaction. This study aims to analyze the 4G LTE network coverage of Telkomsel, XL Axiata, and Indosat Ooredoo in Bayung Lencir District, Musi Banyuasin Regency, South Sumatra Province. The parameters analyzed include Reference Signal Received Power (RSRP) and Signal-to-Interference-plus-Noise Ratio (SINR). Measurements were conducted in nine villages/sub-districts using the Android-based G-NetTrack Pro application. The measurement data were statistically analyzed using one-way Analysis of Variance (ANOVA). The results showed that the RSRP values of the three operators were not significantly different, indicating relatively equal received signal strength. However, the SINR parameter showed a significant difference, with Telkomsel having the highest SINR value, followed by Indosat Ooredoo and XL Axiata. These findings are expected to serve as a reference for the public in selecting cellular operators and as a basis for evaluation for telecommunications service providers.
Perancangan Sistem Smart Home Berbasis Internet of Things Menggunakan Mikrokontroler ESP32 Elpan Randa Kasih
Jurnal Jaringan Komputer dan Keamanan Vol 2 No 1 (2021): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61346/jjkk.v2i1.262

Abstract

A home is the primary place for humans to live, functioning as a space to rest and carry out various activities. With technological advancements, the concept of a conventional home has begun to transform into a smart home utilizing Internet of Things (IoT) technology. This research aims to design and implement a smart home system based on the ESP32 microcontroller that is capable of remotely controlling and monitoring household electronic devices through an application on an Android-based smartphone. The system was implemented in a miniature house equipped with six controllable devices, including lights, air conditioners, water pumps, and room temperature sensors. Data communication between the devices and the user was conducted over an internet network using the Blynk platform. The test results showed that all devices could be controlled and monitored effectively through the application, and system performance was significantly influenced by the stability of the internet connection. Overall, this system is considered an effective initial solution for implementing an IoT-based smart home concept in residential environments.