Papers by Merry Anggraeni

Makalah ini mengimplementasikan sistem log honeypot untuk menganalisis eksploitasi dari global in... more Makalah ini mengimplementasikan sistem log honeypot untuk menganalisis eksploitasi dari global internet berupa kategori serangan Statistical Traffic Analysis, Top Targeted Attack Sources and Destination, Penetration Analysis dan Infection Pattern Analysis serta Intrusion Detection System (IDS). Pengelompokan level kategori serangan adalah low, medium, dan high, dengan Teknik K-Means dan menerapkan rule filtering IPTables Automation yang digunakan untuk teknik mitigasi pada perangkat farm server dan virtual router public. Hasil attribute yang di cluster mendapatkan jumlah kuadrat jarak cluster ke pusat cluster terdekat, ditimbang dengan bobot nilai μi dan persentase jumlah serangan sebesar 64% untuk kategori High, 36% medium dan Low dengan jumlah tahapan clustering sebanyak 3 tahapan iterasi untuk mendapatkan cluster yang sesuai. Iterasi hasil Rule Firewall IPTables, untuk perangkat vRouter menghasilkan history beban kerja CPU berkurang menjadi 28%, dan memory 39%. vFarm Server menunjukkan beban kerja CPU pada masing-masing vServer berkurang menjadi 43% dan Memory (RAM) menjadi menjadi 21%.

As 4G LTE is based on a full IP architecture, all the network interfaces between the LTE NEs are ... more As 4G LTE is based on a full IP architecture, all the network interfaces between the LTE NEs are over IP – even when they are further encapsulated or transported over other technologies. This means that from an LTE point of view we are always dealing with IP links and all issues on LTE interfaces can be analyzed and understood by their effects on the IP layer. This effectively means that we can simplify any scenario (whatever the mix of issues, technologies, layers) to (a combination of) IP Impairments. In this paper, we present basic considerations regarding the support of Bridge Satellite SCPC transmission for the 4G-LTE communication network that will continue the satellite transmission. We design, implement, and evaluate the performance of transport protocol solutions based on the IEEE 802.1Q switching architecture in 4G LTE satellite systems. The resulting parameter values are indexed Σ throughput (bit / s) Σ the amount of data sent (outbound) at the time of delivery. The parameters of the index throughput obtained reach the amount of allocated bandwidth from 3072Kbps. Bandwidth Utilization Index = Σ Bandwidth The use of inbound and outbound reaches 100% and the value of packet loss results is 0-2%. The delay parameter value is 0-2 (ms) on the transmission connectivity.

Journal of Physics: Conference Series
A part from advances in Artificial Intelligence and Natural Language Processing, designed CHATBOT... more A part from advances in Artificial Intelligence and Natural Language Processing, designed CHATBOT will try to understand user requests accurately, so that they do not give the wrong answer or no response. The difficulty of getting specific information about hearing impairments that can be asked properly is asking someone who understands that it still cannot be found on search engines on the internet which is a favorite tool for most people in obtaining information. By using Machine Learning and with the help of Artificial Intelligence, a question and answer (conversation) interaction mechanism is created to gain literacy knowledge that supports the educational process. Therefore, the CHATBOT application was developed in this study as a media for retrieving information about hearing loss. Using the NLP method and the Naïve Bayes Algorithm for classifications used to get input classes to I-Chat Bot, as well as to test hypotheses using the Technology Acceptance Model developed (extende...

Jurnal Penelitian Pos dan Informatika
Increasingly complex network heterogeneity and network monitoring tasks become the management con... more Increasingly complex network heterogeneity and network monitoring tasks become the management concentration of a large distributed production infrastructure with various business services requiring a centralized control monitoring system, with increasing network size, heterogeneity and complexity. The network monitoring and management solutions available are not only expensive but also difficult to use, configure and maintain. Manually routing pins to the wrong device on a large complex network is very complicated and time-consuming for Service Provider (SP). Thus, it is necessary to have an automatic system that immediately reports to the network Service Provider (SP) monitoring system regarding the type of error or alert, Network Availability and Service Level Agreement (SLA). This research presents the modeling design and implementation of Network Availability and SLA network systems for Service Provider (SP) organizations, by being based on open-source programming tools (Zabbix ...

This paper presents basic considerations regarding IP-based tunneling support for transmissions f... more This paper presents basic considerations regarding IP-based tunneling support for transmissions for 4G-LTE communication networks that will pass satellite transmissions. In this paper, a delayed tolerance approach to traffic management in LTE via satellite links will be presented. Contribution to this paper will generate quality of service values on satellite communications by bringing 4G-LTE data traffic. We design, implement and evaluate the performance of transport protocol solutions based on the GRE RFC 1701 architecture in the LTE-satellite system. Our paper proposal, is (i) analyzing the current performance and design and implementing it for 4G via satellite using IP tunneling (ii) utilizing the GRE RFC 1701 standards, which creates an ethernet tunnel between two sending data communications on VLAN User Plane, MME and OAM in 4G. The resulting value parameters are throughput index, delay, and performance bandwidth and packet loss. The parameter values generated are Index ∑ Throughput (bit/s) number of data reaching the allocated bandwidth of 6836 Kbps, bandwidth utilization Index = ∑ bandwidth utilization inbound and outbound reaches 100% and packet loss value the resulting one is 0% on transmission connectivity.

Jurnal Ilmiah FIFO
Cryptography is both a science and an art to keep the message confidential. While steganography i... more Cryptography is both a science and an art to keep the message confidential. While steganography is the science and art of hiding secret messages in other messages so that the existence of such secret messages is unknowable and generally serves to disguise the existence of confidential data making it difficult to detect and protect the copyright of a product. Steganography requires two properties, namely container media and secret messages. The application of steganographic and cryptographic combination is done by Least Significant Bit (LSB) and ROT13 algorithm. Steganography with the LSB method is one of the methods used to hide messages on digital media by inserting it to the lowest bits or the most right bits of the pixel data that compile the file. In this research, the authors propose the technique of securing Steganography secret messages with layered security, by adding Cryptography to secret messages that will be inserted into digital images and then messages inserted into di...

Proceeding of the Electrical Engineering Computer Science and Informatics
Mobile operators move quickly from 2G GSM networks in urban areas to remote rural areas, which ar... more Mobile operators move quickly from 2G GSM networks in urban areas to remote rural areas, which are 2G networks by offering voice connectivity. As a result, more and more technology is optimizing cellular operators that reduce and perform bandwidth efficiency that will be implemented. The optimization solution for this cellular operator produces voice communication on GSM, in a cost-effective application for satellites. This paper discusses and applies to creating GSM links via satellite communication. The ABIS interface on GSM, which is defined between the Base Transceiver Station (BTS) of GSM remote cells and the Base Station Controller (BSC), is considered here to be transferred via GSM communication with the Modulation and Coding scheme 16 APSK 5/6. The MODCOD scheme determines the efficiency of what MHz is needed to send one Mbps. The efficiency value achieved by allocating, bandwidth (MHz) generated by 1.0 Mhz is an efficiency of 3.222 [bit / baud]. And Info Data Rate is generated from the value (Mbps) of 3,175. The highest traffic intensity with the value of Traffic Volume (Hours) = 3.5, Traffic Intensity (Erlang) 0.145833333. While the lowest traffic intensity with the value of Traffic Volume (Hour) = 2.6, traffic intensity = 0.108333333 (Erlang). The value obtained on Traffic Volume and Traffic Intensity is 0.1%. Service levels are very good at grade of service, because of the small possibility of access fail. Calculation of the availability of link network availability links, using ACM 16APSK LDPC 5/6 techniques that can increase up to 100%.

Journal of Physics: Conference Series
Integrating multipath technology with inter-domain routing is one of the most promising trends in... more Integrating multipath technology with inter-domain routing is one of the most promising trends in building a package routing policy system for the next generation. However, gradually changing the current inter-domain routing from a single path to multipath failover routing is a difficult problem. In the previous study, the application of the BGP algorithm was applied only to connections on external BGP techniques or between AS numbers. In this paper, we study the impact of implementing traffic routing policies on backhaul carrier Ethernet (Metro-E). Implementing iBGP as a medium on Metro-E for failover technology. The purpose of this paper is to propose and implement routing policies including policy expressions, firewall filters, route preferences, policy chain and policy statements in failover links in IGPs on routing deployment policies, using the Juniper Router Operating System. The results of this application show that periodically the intervals in the graph clearly show a direct correlation between the average failover time. When the main link fails, the link will be connected or active, secondary links and tertiary links will be created. Likewise, switching paths from secondary links to tertiary links, and so on will choose random (round robin). So that during the transfer process does not require time, it can be interpreted as 0 seconds, or not packet loss. So if the average failover response for direct implementation requires only 0-1 seconds.

Proceeding of the Electrical Engineering Computer Science and Informatics, Oct 1, 2019
Mobile operators move quickly from 2G GSM networks in urban areas to remote rural areas, which ar... more Mobile operators move quickly from 2G GSM networks in urban areas to remote rural areas, which are 2G networks by offering voice connectivity. As a result, more and more technology is optimizing cellular operators that reduce and perform bandwidth efficiency that will be implemented. The optimization solution for this cellular operator produces voice communication on GSM, in a cost-effective application for satellites. This paper discusses and applies to creating GSM links via satellite communication. The ABIS interface on GSM, which is defined between the Base Transceiver Station (BTS) of GSM remote cells and the Base Station Controller (BSC), is considered here to be transferred via GSM communication with the Modulation and Coding scheme 16 APSK 5/6. The MODCOD scheme determines the efficiency of what MHz is needed to send one Mbps. The efficiency value achieved by allocating, bandwidth (MHz) generated by 1.0 Mhz is an efficiency of 3.222 [bit / baud]. And Info Data Rate is generated from the value (Mbps) of 3,175. The highest traffic intensity with the value of Traffic Volume (Hours) = 3.5, Traffic Intensity (Erlang) 0.145833333. While the lowest traffic intensity with the value of Traffic Volume (Hour) = 2.6, traffic intensity = 0.108333333 (Erlang). The value obtained on Traffic Volume and Traffic Intensity is 0.1%. Service levels are very good at grade of service, because of the small possibility of access fail. Calculation of the availability of link network availability links, using ACM 16APSK LDPC 5/6 techniques that can increase up to 100%.

Proceeding of the Electrical Engineering Computer Science and Informatics
Mobile operators move quickly from 2G GSM networks in urban areas to remote rural areas, which ar... more Mobile operators move quickly from 2G GSM networks in urban areas to remote rural areas, which are 2G networks by offering voice connectivity. As a result, more and more technology is optimizing cellular operators that reduce and perform bandwidth efficiency that will be implemented. The optimization solution for this cellular operator produces voice communication on GSM, in a cost-effective application for satellites. This paper discusses and applies to creating GSM links via satellite communication. The ABIS interface on GSM, which is defined between the Base Transceiver Station (BTS) of GSM remote cells and the Base Station Controller (BSC), is considered here to be transferred via GSM communication with the Modulation and Coding scheme 16 APSK 5/6. The MODCOD scheme determines the efficiency of what MHz is needed to send one Mbps. The efficiency value achieved by allocating, bandwidth (MHz) generated by 1.0 Mhz is an efficiency of 3.222 [bit / baud]. And Info Data Rate is generated from the value (Mbps) of 3,175. The highest traffic intensity with the value of Traffic Volume (Hours) = 3.5, Traffic Intensity (Erlang) 0.145833333. While the lowest traffic intensity with the value of Traffic Volume (Hour) = 2.6, traffic intensity = 0.108333333 (Erlang). The value obtained on Traffic Volume and Traffic Intensity is 0.1%. Service levels are very good at grade of service, because of the small possibility of access fail. Calculation of the availability of link network availability links, using ACM 16APSK LDPC 5/6 techniques that can increase up to 100%.

Jurnal Ilmiah FIFO
Cryptography is both a science and an art to keep the message confidential. While steganography i... more Cryptography is both a science and an art to keep the message confidential. While steganography is the science and art of hiding secret messages in other messages so that the existence of such secret messages is unknowable and generally serves to disguise the existence of confidential data making it difficult to detect and protect the copyright of a product. Steganography requires two properties, namely container media and secret messages. The application of steganographic and cryptographic combination is done by Least Significant Bit (LSB) and ROT13 algorithm. Steganography with the LSB method is one of the methods used to hide messages on digital media by inserting it to the lowest bits or the most right bits of the pixel data that compile the file. In this research, the authors propose the technique of securing Steganography secret messages with layered security, by adding Cryptography to secret messages that will be inserted into digital images and then messages inserted into di...

Journal of Physics: Conference Series
This paper presents basic considerations regarding IP-based tunneling support for transmissions f... more This paper presents basic considerations regarding IP-based tunneling support for transmissions for 4G-LTE communication networks that will pass satellite transmissions. In this paper, a delayed tolerance approach to traffic management in LTE via satellite links will be presented. Contribution to this paper will generate quality of service values on satellite communications by bringing 4G-LTE data traffic. We design, implement and evaluate the performance of transport protocol solutions based on the GRE RFC 1701 architecture in the LTE-satellite system. Our paper proposal, is (i) analyzing the current performance and design and implementing it for 4G via satellite using IP tunneling (ii) utilizing the GRE RFC 1701 standards, which creates an ethernet tunnel between two sending data communications on VLAN User Plane, MME and OAM in 4G. The resulting value parameters are throughput index, delay, and performance bandwidth and packet loss. The parameter values generated are Index ∑ Throughput (bit/s) number of data reaching the allocated bandwidth of 6836 Kbps, bandwidth utilization Index = ∑ bandwidth utilization inbound and outbound reaches 100% and packet loss value the resulting one is 0% on transmission connectivity.

Jurnal Penelitian Pos dan Informatika
Internet adalah media komunikasi paling populer saat ini, tetapi komunikasi melalui internet meng... more Internet adalah media komunikasi paling populer saat ini, tetapi komunikasi melalui internet menghadapi beberapa masalah seperti keamanan data, kontrol hak cipta, kapasitas ukuran data, otentikasi dan lain sebagainya.Pada penelitian ini peneliti memperkenalkan skema untuk menyembunyikan data yang terenkripsi. Dimana kami menggunakan citra sebagai embedding dan cover image untuk text hiding. Fitur utama skema adalah cara penyematan data teks ke cover image terenkripsi. Peneliti berkonsentrasi menggunakan metode RGB-LSB untuk penyematan data teks dan memverifikasi kinerja menggunakan metode RGB-LSB dalam hal indeks kualitas yaitu PSNR, MSE, imperceptibility dan indeks recovery. Kombinasi algoritma Least Significant Bit (LSB) dan Kriptograpi RO13 untuk penyisipan file gambar pada gambar yang berformat *.jpg. Pengujian pada algoritma Least Significant Bit (LSB) yang sudah disisipi jumlah pesan yang berbeda-beda tetap menghasilkan nilai SME dan PSNR yang sama. Nilai SME pada jumlah pesan yang disisipi sebanyak 407 kata adalah nilai MSE 0.8310 dan nilai PSNR 48.9348.pada jumlah pesan yang disisipi sebanyak 507 kata adalah nilai MSE 0.8322 dan nilai PSNR 48.9285. Nilai kriteria imperceptibility pada stego image yang dihasilakan juga menghasilkan hasil image dan nilai-nilai pixel pada masing-masing cover imagetidak mengalami perubahan. Berdasarkan hasil perbandingan ini dapat diketahui bahwa algoritma LSB memiliki hasil yang baik pada teknik penyisipan sebuah pesan pada file citra

Journal of Physics: Conference Series
Integrating multipath technology with inter-domain routing is one of the most promising trends in... more Integrating multipath technology with inter-domain routing is one of the most promising trends in building a package routing policy system for the next generation. However, gradually changing the current inter-domain routing from a single path to multipath failover routing is a difficult problem. In the previous study, the application of the BGP algorithm was applied only to connections on external BGP techniques or between AS numbers. In this paper, we study the impact of implementing traffic routing policies on backhaul carrier Ethernet (Metro-E). Implementing iBGP as a medium on Metro-E for failover technology. The purpose of this paper is to propose and implement routing policies including policy expressions, firewall filters, route preferences, policy chain and policy statements in failover links in IGPs on routing deployment policies, using the Juniper Router Operating System. The results of this application show that periodically the intervals in the graph clearly show a direct correlation between the average failover time. When the main link fails, the link will be connected or active, secondary links and tertiary links will be created. Likewise, switching paths from secondary links to tertiary links, and so on will choose random (round robin). So that during the transfer process does not require time, it can be interpreted as 0 seconds, or not packet loss. So if the average failover response for direct implementation requires only 0-1 seconds.

Journal of Physics: Conference Series volume 1201 issue 1 pages 1201 IOP Publishing , 2019
A part from advances in Artificial Intelligence and Natural Language Processing, designed CHATBOT... more A part from advances in Artificial Intelligence and Natural Language Processing, designed CHATBOT will try to understand user requests accurately, so that they do not give the wrong answer or no response. The difficulty of getting specific information about hearing impairments that can be asked properly is asking someone who understands that it still cannot be found on search engines on the internet which is a favorite tool for most people in obtaining information. By using Machine Learning and with the help of Artificial Intelligence, a question and answer (conversation) interaction mechanism is created to gain literacy knowledge that supports the educational process. Therefore, the CHATBOT application was developed in this study as a media for retrieving information about hearing loss. Using the NLP method and the Naïve Bayes Algorithm for classifications used to get input classes to I-Chat Bot, as well as to test hypotheses using the Technology Acceptance Model developed (extended). The result is an I-Chat Bot with artificial intelligence that understands user input and provides an appropriate response and produces a preferred and easy system model to be used in the search for information about required hearing impairments. This result paper also gets the value of the test accuracy with Precision 98.6%, Recall 88.75% and Accuracy 88.75%.
Uploads
Papers by Merry Anggraeni