cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota surabaya,
Jawa timur
INDONESIA
Jurnal Infra
ISSN : -     EISSN : -     DOI : -
Core Subject : Science,
Arjuna Subject : -
Articles 1,326 Documents
Simulasi Aplikasi untuk Mendeteksi dan Mencegah Serangan DDoS pada Jaringan Berbasis Software Defined Network Sugiyanto Goutama; Agustinus Noertjahyana; Henry Novianus Palit
Jurnal Infra Vol 10, No 1 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Software Defined Network (SDN) is one of the technological developments in computer networks. Today's computer networks generally use many network devices, where each network device has 2 functionalities, called control plane and forwarding plane. The separation of the two functions through SDN technology has the advantage of having a centralized control plane design is to make configuration and management easier. However, there is also a challenge in the form of a single point of failure that is vulnerable to Distributed Denial of Service (DDoS) attacks. Therefore, SDN requires an Intrusion Detection System (IDS) and an Intrusion Prevention System (IPS) to be able to detect and prevent DDoS attacks. This study aims to determine the level of accuracy and length of time to detect (Mean Time To Detect), as well as length of time to mitigate (Mean Time To Respond) in dealing with variations of DDoS attacks on SDN topology. This study detects in two ways, first using a signature and anomaly which will adopt the Deep Neural Network model to classify, recognize the types and patterns of DDoS attacks from a dataset with several features. The results of simulation testing with 3 types of attacks, namely ICMP Flood, SYN Flood and UDP Flood on SDN, detection with signature-IDS get MTTD and MTTR results of 7.2475 seconds and 11.74 seconds for ICMP attacks, 26.995 seconds and 11.00 seconds for SYN attacks, 20.49 seconds and 3.00 seconds on a UDP attack. While the anomaly-IDS detection does not use calculations based on MTTD and MTTR because the workings of the system can only classify per packet. So it is calculated based on the level of misclassification of the attack packet (False Negative), namely 7 packets out of 445 packets for ICMP attacks, 557 packets out of 940 packets for SYN attacks, and 2 packets out of 3120 packets for UDP attacks. Therefore, for Anomaly-IDS using the Deep Neural Network model, is still yet optimal and needs to be researched and developed further.
Aplikasi Deteksi Jumlah Orang pada Area Indoor Untuk Mendukung Pelaksanaan PPKM dengan Metode YOLO Yoken Adinata; Kartika Gunadi; Indar Sugiarto
Jurnal Infra Vol 10, No 1 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Lately, the world is being hit by the Covid-19 outbreak which has caused several activities and sectors to be hampered, one of which is the buying and selling sector, both inside shopping centers and outside. Finally a solution emerged where each store was given a limit on the number of visitors to minimize the spread of the Covid-19 virus. However, there is a problem, namely monitoring the number of visitors is done manually so it is less effective and efficient.Because of the need for an application that can monitor the number of visitors when it has reached a certain limit the application will send a notification to the user. The method that used in this application to detecting the number of people is You Only Look Once (YOLO) The application has a feature so that the user can configure the parameters that will be used.Overall, the detection system used still has ambiguity in detecting small objects so that sometimes they are not detected as people. The rest, the system runs without problems from large to medium sized objects. On the other hand, overall survey respondents are satisfied with this system, this can be seen in the results of a survey taken from 15 respondents regarding the assessment of how this application helps the implementation of PPKM, and getting an average score of 8.53 out of 10, while the assessment of the ease of use of the application and user interface is 8.6 out of 10 and 8.4 out of 10.
Sistem Pakar Untuk Mendiagnosa Infeksi Mikroorganisme Pada Anak Menggunakan Metode Forward Chaining William Tupan; Djoni Haryadi Setiabudi; Andreas Handojo
Jurnal Infra Vol 10, No 1 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Infectious diseases caused by microorganisms such as viruses, bacteria, fungi, and worms are very vulnerable to attack children, this is caused by a lack of self-awareness to maintain personal and environmental hygiene and the immune system that exists in children's bodies that have not been fully developed.  Lack of knowledge makes parents also unable to recognize the symptoms of diseases suffered by children that arise due to infection with these microorganisms.This expert system was created to diagnose diseases in children caused by microorganisms such as viruses, bacteria, fungi, and worms.  From this expert system information can be obtained about the name of the disease, how to handle it and the level of confidence in the diagnosis.  This expert system uses the Forward Chaining method and the Certainty Factor method.The results of this system test show that the system is able to determine the disease, how to handle it, and is able to display the level of confidence in the system diagnosis, based on the symptoms previously selected by the user.
Sistem Rekomendasi Konsentrasi Berdasarkan Aggregate Function Multi Criteria Pada Prodi Informatika UK Petra Willy Santoso; Rolly Intan; Yulia Yulia
Jurnal Infra Vol 10, No 1 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The Recommendation system is a system that uses to help users in making decisions by providing item recommendations to the user. In lectures, students are faced with the choice to take a certain concentration of study. However, students are often confused about which concentration of study should they take. Therefore, a system that can provide concentration recommendations is needed so that it can help students in making decisions on choosing the best consentration.Previously there had been a thesis to solve a similar problem using User Based Collaborative Filtering method. In this research the method that will be used is Aggregate Function.Aggregate Function is used to combine the results of the three criteria. The implementation of the Aggregate Function is done by calculating the average value of each concentration from the results of each criterion. The results of the first criteria are obtained using the User Based Collaborative Filtering method based on the Adjusted Cosine Similarity Algorithm. The results of the second criteria are obtained by calculating the average value of the certain mandatory courses that have been taken by the user. The results of the third criterion are obtained by calculating the average value of user preferences in a professional field.Testing of the recommendation system is done by using confusion matrix by measuring the value of accuracy of the recommendation system. The result of this research is the order of concentration recommendations that are suitable for the user based on the use of the Aggregate Function. The results of the tests that used on 30 users obtained 73.3% accuracy rate. 
Meningkatkan Kesulitan Serangan Enemy Dengan Menambahkan Influence Map Pada Metode A* Pada Procedural Generated Tower Defense Game Michael Budiono; Liliana Liliana; Hans Juwiantho
Jurnal Infra Vol 10, No 1 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In tower defense game, if the map dan enemy attack do not change, the strategy that will be used by the player will remain the same, this will make the game having a low replay value and will make the player stop playing the game. The existing tower defense game have used procedural generation to create different levels each time they are played, but there are still shortcoming where the map looks plain and has the same pattern every time it is played, other than that enemy attack using A* have a simple pattern and can’t  search for a profitable path for the enemy so the enemy become easy to defeat and the game become less interesting. To overcome this problem, perlin noise is used in procedural generation so that the map mode does not look plain and does not have the same pattern every time it is played, other than that enemy attack use A* by adding influence map so that enemy attack can be more challenging and interesting to the player.In this thesis, the map was created using perlin noise to determine the terrain of the tile on the map and the location of start and finish will be checked using floyd warshall algorithm to determine if the map need to be remade. For enemy attack, A* is used with the addition of influence map to make the enemy can choose a path that is more profitable for it by avoiding roads blocked by tower and roads that can be attacked by towers.The test results show that after the map is generated repeatedly for 20 times, no map has the same location and distance between start and finish. In addition, it is also found that the implementation of procedural generation and influence map made the game 25.7% more challenging when compared to games that did not use it.
Alarm Sensor Temperatur Untuk Ruang Pendingin Menggunakan IoT Kevin Christian; Silvia Rostianingsih; Resmana Lim
Jurnal Infra Vol 10, No 1 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Technological advances are so fast that all activities use computers, making it easier for users to carry out daily activities. With conditions that are increasingly advanced and developing so that the idea is created to connect hardware and software technology that helps in the daily activities of the wider community. Currently, many raw materials and food ingredients are stored in the Refrigeration Room. One example of a Cooling Room is a refrigerator freezer. Refrigeration Room is widely used to store raw food ingredients.For this reason, to make it easier to monitor the temperature in the Cooling Room, an Android Application that is connected using IoT is made with a Temperature Sensor in the Cooling Room.The test results show that the process of monitoring the Cooling Room through IoT and Android Applications can be done easily and quickly with accurate results.
Aplikasi Rekomendasi Resep Menu Meal Plan Berdasarkan TDEE dan Zat Gizi Makro Pengguna Berbasis Web Dengan Pendekatan MCDA Dan EgoSimilar+ Ivana Jovita Handoko; Henry Novianus Palit; Liliana Liliana
Jurnal Infra Vol 10, No 1 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Public awareness in Indonesia of the importance of a healthy lifestyle is getting higher today. Having a healthy and ideal body is the dream of people in Indonesia. One way to achieve a healthy and ideal body is to control the intake of calories, carbohydrates, protein and fat in the food consumed (TDEE and macronutrients). Everyone has different needs for TDEE and macronutrients. It is difficult to meet macro needs in accordance with the daily calorie TDEE if you do not understand how to arrange a daily food menu. TDEE and macronutrients should not be lacking nor should they be in excess, while the composition of each macro has a different calorific value for each gram unit in each food ingredient.The meal plan menu recommendation system uses EgoSimilar+ and AHPSort which is the MCDA approach, the method used in this study is used to build the "Dahar" application which is the meal plan recommendation application in this study.The results of the application and the methods used in this application are able to provide recommendations for meal plans with a tolerance of 10% calorie difference. From a scale of 1 to a scale of 5 with the meaning of a scale of 5 being the highest value, a user survey was conducted on the application and recommendation system. From the survey results, the average user satisfaction is 4.45 out of 104 respondents with the dominating scale values being scale 4 and scale 5.
Analisis Sentimen Ulasan Restoran Menggunakan Metode Support Vector Machine Yoel Julianto; Djoni Haryadi Setiabudi; Silvia Rostianingsih
Jurnal Infra Vol 10, No 1 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Reviews on restaurants on the internet have a huge impact on a restaurant. Reviews provided help other customers to evaluate the business or services provided from a  restaurant. Customers can leave positive or negative reviews. The large number of reviews from customers makes it difficult for restaurants to know if their restaurant has move positive or negative reviews. In this undergraduate thesis an application will be made to determine whether a restaurant has positive or negative reviews.Application that is equipped with text mining features will help restaurant in evaluate their restaurant. The steps taken are preprocessing which consist of case folding, tokenization, stopword removal, and stemming. Then the process of converting text data into vector using TF-IDF. Furthermore the data will be trained using Support Vector Machine which later will generate a model that will be used to make predictions from input data. The data which be used as training are Indonesian-language reviews from various restaurants.From this research conducted the result showed an accuracy of 93% and f1-score of 93%. To increase accuracy and f1-score values, classification model require TF-IDF parameters min_df  0.05, max_df  0.75, norm l2, n-gram (1, 2), linear SVM kernel with C 1. Besides TF-IDF and SVM parameters, the number of datasets can also increase confusion matrix and f1-score values.
Implementasi dan Analisa Snort dan Suricata Sebagai IDS dan IPS Untuk Mencegah Serangan DOS dan DDOS Darryl Santoso; Agustinus Noertjahyana; Justinus Andjarwirawan
Jurnal Infra Vol 10, No 1 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

DOS and DDOS is one of the most widely used attacks by hackers. DDOS is an attack with multiple attackers to deplete the resources of the target until the target cannot handle the request. To prevent the above attacks can use a firewall, the function of the firewall is the first defense of the computer that filters incoming or outgoing packets with rules on the network. Firewalls filter data based on IP addresses, protocols, and ports, so if you use a firewall, you can't analyze further attacks. In this study, to prevent this attack using a system namely Intrusion Detection System (IDS) and Intrusion Prevention System (IPS). The function of IDS is to detect unwanted traffic on a network or device, while IPS can detect and immediately fix the problem. By using IDS and IPS attacks can be analyzed more, IDS and IPS are more reliable tools than firewalls. The test was carried out in several DOS and DDOS scenarios using the Hping3 and Slowloris tools, the test results showed that from 10 attack scenarios and not attacks, snort and suricata were balanced in issuing True Positive alerts with 3 win scenarios each, for CPU usage Suricata excelled in 7 scenarios , and in HTTP Flood attacks suricata eliminate attacks faster.
Sistem Pengendali Lingkungan Greenhouse Dengan Wireless Sensor Network Untuk Mengoptimalkan Budidaya Hidroponik Kevin Hartono; Henry Novianus Palit; Anita Nathania Purbowo
Jurnal Infra Vol 10, No 1 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Hydroponic cultivation is currently widely used because its various advantages. However, it is undeniable that it still has shortcomings because environmental conditions need to be engineered to resemble the conditions of the original habitat. The problem that is in this treatment process is human limitations in terms of consistencyIn this thesis, a trial will be carried out to help make it easier for users to maintenance consistently by implementing Internet of Things (IoT) technology in hydroponic gardens for monitoring and control automatically and consistently, with using sensors installed in the reservoir to get reservoir conditions and relays to regulate the flow of electricity to control environmental conditions. Furthermore, android application was developed to make it easier for users to monitor and control the hydroponic environment. So, the result is a monitoring system that can take data on several parameters, as well as controlling environmental conditions automatically by flowing the controller fluid into the reservoir, and an Android application to access measurement data that has been done previously.