Implementasi Malicious Traffic Untuk Mendeteksi Serangan Siber di SMK Muhammadiyah 1 Yogyakarta

  • Dedy Hariyadi Universitas Jenderal Achmad Yani Yogyakarta https://orcid.org/0000-0003-2941-7654
  • Kartikadyota Kusumaningtyas Universitas Jenderal Achmad Yani Yogyakarta
  • Burhan Alfironi Muktamar Universitas Jenderal Achmad Yani Yogyakarta
Keywords: Ancaman Siber, Keamanan Jaringan, Keamanan Siber, Kebocoran Data, Trafik Anomali

Abstract

The Covid-19 pandemic has had a positive impact including the increasing implementation of information technology in various fields including the education sector. One of them is the increasing use of mobile devices such as cell phones or tote computers that utilize wireless networks. Connecting devices via wireless networks has a serious impact on the potential threat of cyber attacks. The potential threat of cyberattacks on devices during the Covid-19 pandemic is increasing, this is indicated by 975 million anomalous traffic recorded by Badan Siber dan Sandi Negara (BSSN) in 2022. To identify these potential threats, a sensor is needed on the internal network. In this research, it is proposed to implement a cyber attack sensor to detect these potential threats. Based on network traffic monitoring, this research shows that there is a potential for data leakage originating from cell phones. Therefore, the potential for data leakage from cell phones or other devices needs to be evaluated to secure computer systems and networks.

References

Asosiasi Penyelenggara Jasa Internet Indonesia. (2020). Laporan Survei Internet APJII 2019 – 2020. Dalam Asosiasi Penyelenggara Jasa Internet Indonesia (Vol. 2020, hlm. 1–146). Asosiasi Penyelenggara Jasa Internet Indonesia. https://apjii.or.id/survei

Baby, A., Scholar, P. G., & Krishnan, H. (2017). A Literature Survey on Data Leak Detection And Prevention Methods. International Journal of Advanced Research in Computer Science.

Badan Siber dan Sandi Negara. (2023). Lanskap Keamanan Siber Indonesia 2022. Badan Siber dan Sandi Negara.

Budiarti, S., & Rohmah, S. N. (2021). Pemanfaatan Aplikasi Quizizz Sebagai Media Pembelajaran di SMK Muhammadiyah 1 Yogyakarta di Tengah Pendemi. Seminar Nasional Hasil Pelaksanaan Program Pengenalan Lapangan Persekolahan.

Dongdong, Z. (2016). IMEI (International Mobile Equipment Identity) code processing method, IMEI code processing system and terminal.

Fazwan, A. F. B. A., Azhar, A., & Hanif, N. S. B. (2023). Data Leakage on Social Networking Sites [Preprint]. https://doi.org/10.36227/techrxiv.23507040

Hayatunnufus, Riasetiawan, M., & Ashari, A. (2020). Performance Analysis of FIFO and Round Robin Scheduling Process Algorithm in IoT Operating System for Collecting Landslide Data. 2020 International Conference on Data Science, Artificial Intelligence, and Business Analytics (DATABIA), 63–68. https://doi.org/10.1109/DATABIA50434.2020.9190608

Maulana, R. A. (2020). Penerapan Sistem Pendeteksi dan Pencegah Serangan Malware dengan Sensor Maltrail pada Jaringan Server di Diskominfo Tangerang Selatan. Institut Pertanian Bogor.

Perwira, H. N. (2015). Pengembangan Sistem Informasi Perpustakaan Berbasis Web Di SMK Muhammadiyah 1 Yogyakarta. Universitas Negeri Yogyakarta.

Plagemann, T., Goebel, V., Hollick, M., & Koldehofe, B. (2022). Towards Privacy Engineering for Real-Time Analytics in the Human-Centered Internet of Things. https://doi.org/10.48550/ARXIV.2210.16352

Pratiwi, A. P. (2020). Hubungan Intensitas Penggunaan Media Sosial Dengan Kualitas Tidur Pada Siswa Kelas X di SMK Muhammadiyah 1 Yogyakarta. 1(4).

Priyambodo, T. K., Lisan, A. W., & Riasetiawan, M. (2019). Inexpensive Green Mini Supercomputer Based on Single Board Computer Cluster. 10(1).

Ramdhania, A. N., Kurniawan, M. T., & Hediyanto, U. Y. K. S. (2019). Network infrastructure design in connectivity using Inter-VLAN concept in bandung district government. Proceedings of the 3rd International Conference on Telecommunications and Communication Engineering, 111–115. https://doi.org/10.1145/3369555.3369562

Raodia. (2019). Pengaruh Perkembangan Teknologi Terhadap Terjadinya Kejahatan Mayantara (Cybercrime). Jurisprudentie : Jurusan Ilmu Hukum Fakultas Syariah dan Hukum, 6(2), 39. https://doi.org/10.24252/jurisprudentie.v6i2.11399

Riasetiawan, M., Wisnuaji, A., Hariyadi, D., & Febrianto, T. (2021). Pengembangan Aplikasi Information Gathering menggunakan Metode Hybrid Scan berbasis Graphical User Interface. CyberSecurity dan Forensik Digital, 4(1), 44–48. https://doi.org/10.14421/csecurity.2021.4.1.2449

Wang, L.-M., Miskell, T., Morgan, J., & Verplanke, E. (2021). Design of A Multi-Path Reconfigurable Traffic Monitoring System. 2021 IEEE International Conference on Networking, Architecture and Storage (NAS), 1–8. https://doi.org/10.1109/NAS51552.2021.9605385

Published
2023-11-27
How to Cite
Hariyadi, D., Kusumaningtyas, K., & Muktamar, B. A. (2023). Implementasi Malicious Traffic Untuk Mendeteksi Serangan Siber di SMK Muhammadiyah 1 Yogyakarta. INTEK : Jurnal Informatika Dan Teknologi Informasi, 6(2), 73-78. https://doi.org/10.37729/intek.v6i2.3776
Section
Articles

Most read articles by the same author(s)