首页 > 最新文献

CESS Journal of Computer Engineering System and Science最新文献

英文 中文
Cyber Security Audit using CIS CSC, NIST CSF and COBIT 2019 Framework 使用CIS CSC、NIST CSF和COBIT 2019框架的网络安全审计
Pub Date : 2023-07-01 DOI: 10.24114/cess.v8i2.43257
Viny Fadila, Nurul Mutiah, Renny Puspita Sari
Tingginya penggunaan teknologi dan informasi saat ini mengakibatkan peningkatan risiko dan ancaman keamanan data dan informasi. Dinas Komunikasi dan Informatika Kota Pontianak, dinas pemerintahan yang memanfaatkan dan menggunakan banyak teknologi informasi. Untuk mengetahui sejauh mana kemampuan Dinas Komunikasi dan Informatika Kota Pontianak dalam mengelola keamanan siber, maka diperlukan audit keamanan siber. Audit dapat dilakukan dengan menggabungkan framework CIS CSC (Center for Internet Security Critical Security Controls) untuk membatasi focus area keamanan siber aset TI serta menggunakan NIST CSF (National Institute of Standards and Technology Cybersecurity Framework) dan COBIT 2019 (Control Objective for Information Technologies) untuk melakukan perhitungan level kapabilitas. Perhitungan level kapabilitas menggunakan metode CPM (COBIT Performance Model). Hasil perhitungan level kapabilitas keamanan siber Dinas Komunikasi dan Informatika Kota Pontianak pada Identify (ID) mencapai level 3.9, Protect (PR) mencapai level 3.4, Detect (DE) mencapai level 2.5, dan Respond (RS) mencapai level 4. Terdapat 19 rekomendasi aktivitas untuk dilakukan agar mencapai level keamanan siber yang diinginkan, kemudian dilakukan pemetaan aktivitas rekomendasi ke dalam action priority matrix, 10 aktivitas masuk ke dalam kuadran Quick Wins, dan 9 aktivitas yang masuk ke dalam kuadran Major Projects. The frequent use of technology and information today impacts the increased risk and threats to data and information security. Department of Information and Communications of Pontianak is the department that utilizes and uses a lot of information technology. To find out how far the Pontianak City Communication and Informatics Office is capable of managing cyber security, a cyber security audit is needed. Audits can be conducted by combining the CIS CSC (Center for Internet Security Critical Security Controls) framework to define the cybersecurity focus areas of IT assets and using the NIST CSF (National Institute of Standards and Technology Cybersecurity Framework) and COBIT 2019 (Control Objective for Information Technologies) to calculate the capability level. Capability level calculation uses the CPM (COBIT Performance Model) method. The results of calculating the level of cyber security capability of the Pontianak City Communication and Informatics Service for Identification (ID) reaches level 3.9, Protect (PR) reaches level 3.4, Detect (DE) reaches level 2.5, and Respond (RS) reaches level 4. There are 19 activity recommendations to be carried out in order to achieve the desired level of cybersecurity, then capture recommendation activities into the action priority matrix, 10 activities included in the Quick Wins quadrant, and 9 activities entered into the Major Projects quadrant.
目前技术和信息的使用会导致风险的增加,并影响数据和信息的安全性。作为Kota Pontianak的社区和信息中心,拥有和使用大量信息技术的政府。为了使社区和信息中心的管理人员能够有效地提高安全性,需要对安全性进行审计。审计可以采用CIS CSC(互联网安全关键安全控制中心)框架,以确定与TI相关的重点领域安全,并采用NIST CSF(国家标准与技术研究所网络安全框架)和COBIT 2019(信息技术控制目标)来评估能力水平。使用CPM(COBIT性能模型)来实现一级能力。识别(ID)达到3.9级,保护(PR)达到3.4级,检测(DE)达到2.5级,响应(RS)达到4级。共有19项重新启动活动,以达到预期的安全水平,其中包括将重新启动活动纳入行动优先矩阵、将10项活动纳入快速胜利计划,以及将9项活动纳入重大项目计划。如今,技术和信息的频繁使用影响了数据和信息安全的风险和威胁的增加。蓬蒂亚纳克信息和通信部是利用和使用大量信息技术的部门。为了了解蓬蒂亚纳克市通信和信息办公室管理网络安全的能力,需要进行网络安全审计。审计可以通过结合CIS CSC(互联网安全关键安全控制中心)框架来定义IT资产的网络安全重点领域,并使用NIST CSF(国家标准与技术研究所网络安全框架)和COBIT 2019(信息技术控制目标)来计算能力水平。能力水平计算采用CPM(COBIT性能模型)方法。计算蓬蒂亚纳克市通信和信息服务识别(ID)网络安全能力水平达到3.9级,保护(PR)达到3.4级,检测(DE)达到2.5级,响应(RS)达到4级。为了达到所需的网络安全水平,需要执行19项活动建议,然后将建议活动纳入行动优先级矩阵,10项活动包括在“快速获胜”象限中,9项活动进入“重大项目”象限。
{"title":"Cyber Security Audit using CIS CSC, NIST CSF and COBIT 2019 Framework","authors":"Viny Fadila, Nurul Mutiah, Renny Puspita Sari","doi":"10.24114/cess.v8i2.43257","DOIUrl":"https://doi.org/10.24114/cess.v8i2.43257","url":null,"abstract":"Tingginya penggunaan teknologi dan informasi saat ini mengakibatkan peningkatan risiko dan ancaman keamanan data dan informasi. Dinas Komunikasi dan Informatika Kota Pontianak, dinas pemerintahan yang memanfaatkan dan menggunakan banyak teknologi informasi. Untuk mengetahui sejauh mana kemampuan Dinas Komunikasi dan Informatika Kota Pontianak dalam mengelola keamanan siber, maka diperlukan audit keamanan siber. Audit dapat dilakukan dengan menggabungkan framework CIS CSC (Center for Internet Security Critical Security Controls) untuk membatasi focus area keamanan siber aset TI serta menggunakan NIST CSF (National Institute of Standards and Technology Cybersecurity Framework) dan COBIT 2019 (Control Objective for Information Technologies) untuk melakukan perhitungan level kapabilitas. Perhitungan level kapabilitas menggunakan metode CPM (COBIT Performance Model). Hasil perhitungan level kapabilitas keamanan siber Dinas Komunikasi dan Informatika Kota Pontianak pada Identify (ID) mencapai level 3.9, Protect (PR) mencapai level 3.4, Detect (DE) mencapai level 2.5, dan Respond (RS) mencapai level 4. Terdapat 19 rekomendasi aktivitas untuk dilakukan agar mencapai level keamanan siber yang diinginkan, kemudian dilakukan pemetaan aktivitas rekomendasi ke dalam action priority matrix, 10 aktivitas masuk ke dalam kuadran Quick Wins, dan 9 aktivitas yang masuk ke dalam kuadran Major Projects. The frequent use of technology and information today impacts the increased risk and threats to data and information security. Department of Information and Communications of Pontianak is the department that utilizes and uses a lot of information technology. To find out how far the Pontianak City Communication and Informatics Office is capable of managing cyber security, a cyber security audit is needed. Audits can be conducted by combining the CIS CSC (Center for Internet Security Critical Security Controls) framework to define the cybersecurity focus areas of IT assets and using the NIST CSF (National Institute of Standards and Technology Cybersecurity Framework) and COBIT 2019 (Control Objective for Information Technologies) to calculate the capability level. Capability level calculation uses the CPM (COBIT Performance Model) method. The results of calculating the level of cyber security capability of the Pontianak City Communication and Informatics Service for Identification (ID) reaches level 3.9, Protect (PR) reaches level 3.4, Detect (DE) reaches level 2.5, and Respond (RS) reaches level 4. There are 19 activity recommendations to be carried out in order to achieve the desired level of cybersecurity, then capture recommendation activities into the action priority matrix, 10 activities included in the Quick Wins quadrant, and 9 activities entered into the Major Projects quadrant.","PeriodicalId":53361,"journal":{"name":"CESS Journal of Computer Engineering System and Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47189118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Build a Travel Taxi Ordering Application Using the FIFO Algorithm and the Flutter Framework 利用先进先出算法和颤振框架设计并构建了一个出租车订车应用程序
Pub Date : 2023-07-01 DOI: 10.24114/cess.v8i2.43792
S. Susanto, Nurul Mutiah, Dian Prawira
Antrian merupakan suatu keadaan dimana seseorang harus menunggu gilirannya untuk mendapatkan pelayanan. Seringkali antrian menjadi suatu masalah bagi masyarakat ataupun sebuah perusahaan yang memberikan pelayanan. Hal ini terjadi pada PT. Citra Surya Sejati, dimana proses pemesanan taksi masih manual dan disana penumpang harus mengantri untuk mendapatkan pelayanan. Disisi lain PT. Citra Surya Sejati juga mengalami permasalahan dimana pencatatan laporan pemesanan taksi masih menggunakan cara manual dengan mencatatnya dibuku, sehingga diperlukan sebuah sistem untuk mengatasi masalah tersebut. Sistem yang akan dibuat oleh peneliti menggunakan algoritma First In First Out untuk konfirmasi pesanannya, sehingga penumpang yang pertama kali memesan akan pertama kali mendapatkan pelayanan. Hasil dari penelitian ini berupa aplikasi berbasis Mobile untuk penumpang, sedangkan admin berbasis Website. Sistem ini telah dilakukan pengujian dengan menggunakan metode black box testing. Seluruh fungsionalitas sistem berjalan sesuai dengan perancangan yang telah dibuat sebelumnya dan antarmuka sistem memperoleh persentase 81,64% yang masuk ke dalam kategori Baik Sekali.  Queuing is a situation where a person has to wait for his turn to get service. Often queues become a problem for the community or a company that provides services. This happened to PT. Citra Surya Sejati, where the taxi ordering process is where passengers have to queue to get service. On the other hand PT. Citra Surya Sejati also experienced a problem where the recording of taxi order reports still used the manual method by recording them in a book, so a system was needed to overcome this problem. The system that the researcher will create uses the First In First Out algorithm to confirm orders, so that passengers who order for the first time will receive service first. The results of this study are in the form of a Mobile-based application for passengers, while the Website-based admin. This system has been tested using the black box testing method. All system functionality goes according to the design that has been made before and the system interface gets a percentage of 81.64% which is in the Very Good category.  
排队是一种必须等待轮到他服务的情况。对社区或提供服务的公司来说,排队常常是一个问题。这是PT. real solar Citra,出租车预订过程仍然是手动的,在那里乘客必须排队接受服务。与此同时,PT. trusolar Citra也面临着一个问题,即出租车预订报告仍在使用手工记事本记录,因此需要一个系统来解决这个问题。研究人员将使用先进的算法首先确认订单,因此最先订购的乘客将首先获得服务。本研究的结果是乘客的基于移动的应用程序,而管理员是基于网站的。系统已通过黑盒测试方法进行测试。系统的所有功能都是按照先前的设计运行的,系统界面获得了81.64%的优秀类别的百分比。退缩是一个人必须等待他的机会得到服务的地方。通常是社区或提供服务的公司的问题。这发生在PT.真实的solar Citra中,出租车计费商必须在那里接受服务。在PT.真实的solar Citra还经历了一个问题,在这个问题中,出租车订单报告的记录仍然用手工方法记录在一本书中,所以系统需要解决这个问题。这种研究的系统将首先建立算法来验证指令,所以那些最初订购的用户将首先收到服务。这项研究的结果包括为passengers使用手机应用,而网络基础管理。该系统已被黑盒方法测试。所有的功能系统都符合以前设计的设计,系统界面得到81.64%的percentage
{"title":"Design and Build a Travel Taxi Ordering Application Using the FIFO Algorithm and the Flutter Framework","authors":"S. Susanto, Nurul Mutiah, Dian Prawira","doi":"10.24114/cess.v8i2.43792","DOIUrl":"https://doi.org/10.24114/cess.v8i2.43792","url":null,"abstract":"Antrian merupakan suatu keadaan dimana seseorang harus menunggu gilirannya untuk mendapatkan pelayanan. Seringkali antrian menjadi suatu masalah bagi masyarakat ataupun sebuah perusahaan yang memberikan pelayanan. Hal ini terjadi pada PT. Citra Surya Sejati, dimana proses pemesanan taksi masih manual dan disana penumpang harus mengantri untuk mendapatkan pelayanan. Disisi lain PT. Citra Surya Sejati juga mengalami permasalahan dimana pencatatan laporan pemesanan taksi masih menggunakan cara manual dengan mencatatnya dibuku, sehingga diperlukan sebuah sistem untuk mengatasi masalah tersebut. Sistem yang akan dibuat oleh peneliti menggunakan algoritma First In First Out untuk konfirmasi pesanannya, sehingga penumpang yang pertama kali memesan akan pertama kali mendapatkan pelayanan. Hasil dari penelitian ini berupa aplikasi berbasis Mobile untuk penumpang, sedangkan admin berbasis Website. Sistem ini telah dilakukan pengujian dengan menggunakan metode black box testing. Seluruh fungsionalitas sistem berjalan sesuai dengan perancangan yang telah dibuat sebelumnya dan antarmuka sistem memperoleh persentase 81,64% yang masuk ke dalam kategori Baik Sekali.  Queuing is a situation where a person has to wait for his turn to get service. Often queues become a problem for the community or a company that provides services. This happened to PT. Citra Surya Sejati, where the taxi ordering process is where passengers have to queue to get service. On the other hand PT. Citra Surya Sejati also experienced a problem where the recording of taxi order reports still used the manual method by recording them in a book, so a system was needed to overcome this problem. The system that the researcher will create uses the First In First Out algorithm to confirm orders, so that passengers who order for the first time will receive service first. The results of this study are in the form of a Mobile-based application for passengers, while the Website-based admin. This system has been tested using the black box testing method. All system functionality goes according to the design that has been made before and the system interface gets a percentage of 81.64% which is in the Very Good category.  ","PeriodicalId":53361,"journal":{"name":"CESS Journal of Computer Engineering System and Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47211090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Twitter Sentiment Analysis Using the Naive Bayes Algorithm in the Case of the Indosurya Savings and Loans Cooperative 基于朴素贝叶斯算法的Indosurya储贷合作社Twitter情绪分析
Pub Date : 2023-07-01 DOI: 10.24114/cess.v8i2.45527
Elma Rulfin Tiara Kiu, Ornensya Br Sembiring, K. M. Ngafidin
Kasus KSP Indosurya kembali mencuri perhatian saat ini karena terduga pelaku selaku pendiri KSP Indosurya divonis bebas oleh Hakim Ketua Pengadilan Negeri Jakarta Barat atas segala dakwaan pada dengan peryataan bahwa terdakwa terbukti melakukan perbuatan yang didakwakan tetapi bukan merupakan tindak pidana, melakukan perkara perdata yang kemudian menyita perhatian publik serta mengundang reaksi masyarakat diberbagai media sosial bahkan sempat menjadi tranding topik dimedia sosial twitter Indonesia. Oleh karena itu dilakukan penelitian ini guna mengetahui dan mengklasifikasikan sentimen masyarakat pada kasua KSP Indosurya menggunakan metode Naïve bayes. Dimana hasil tertinggi didapatkan oleh sentimen negative, sehingga didapatkan kesimpulan sentimen publik terhadap topik kasus KSP Indosurya di twitter Indonesia adalah negative dengan jumlah parameter 1200 berdasarkan analisis menggunakan metode Naïve bayes.The KSP Indosurya case has again stolen attention at this time because the alleged perpetrator Henry Surya as the founder of KSP Indosurya was acquitted by the Chief Judge of the West Jakarta District Court Syafrudin Ainor for all charges on Tuesday (24/1/2023) with a statement that the defendant Henry Surya was proven to have committed an act who was charged but did not constitute a crime, carried out a civil case which then seized the public's attention and invited public reaction on various social media and even became a trending topic on Indonesian Twitter social media Therefore, this research was carried out to find out and classify public sentiment in the KSP Indosurya case using the Naïve Bayes method. Where the highest results were obtained by negative sentiment, so it was concluded that public sentiment on the topic of the KSP Indosurya case on Twitter Indonesia was negative with a total of 1200 parameters based on analysis using the Naïve Bayes method.
KSP Indosurya案件在这一点上再次引起了人们的关注,因为他们被怀疑是KSP Indosurya的创始人之一的人,被雅加达西部地方法院大法官判无罪做一件引起公众注意、引起社会反应的民事诉讼,甚至成为印尼推特社交媒体上的热门话题。因此,这项研究的目的是利用天真的贝斯方法,确定和将人们的情绪分类。在这里,负面情绪得到的最高结果是负面情绪,因此在印尼twitter上对KSP Indosurya案例主题的公众情绪结论是负面的,根据Naive bayes方法的分析,参数1200的数量是负的。《KSP Indosurya凯斯已经再次被偷了的关注在这个时代,因为《名知情美国太阳能perpetrator亨利之创始KSP Indosurya acquitted是由《雅加达西部地区法院首席法官Syafrudin Ainor为所有指控在星期二(24/1/2023)with a声明那太阳能defendant亨利是proven得t an act)是谁charged但nid not constitute a犯罪,carried out a civil凯斯哪种然后seized《公共关注公共反应在不同社交媒体进去和甚至成了印尼社交媒体Twitter上的一个热门话题,这就是这个研究是carried out里的公共情绪”发现和classify KSP Indosurya凯斯用的天真贝叶斯方法。据报道,印尼推特上的KSP indocase主题上的公众情感都是负面的,其依据是天真的Bayes method的分析,总共有1200张parameters用户是消极的。
{"title":"Twitter Sentiment Analysis Using the Naive Bayes Algorithm in the Case of the Indosurya Savings and Loans Cooperative","authors":"Elma Rulfin Tiara Kiu, Ornensya Br Sembiring, K. M. Ngafidin","doi":"10.24114/cess.v8i2.45527","DOIUrl":"https://doi.org/10.24114/cess.v8i2.45527","url":null,"abstract":"Kasus KSP Indosurya kembali mencuri perhatian saat ini karena terduga pelaku selaku pendiri KSP Indosurya divonis bebas oleh Hakim Ketua Pengadilan Negeri Jakarta Barat atas segala dakwaan pada dengan peryataan bahwa terdakwa terbukti melakukan perbuatan yang didakwakan tetapi bukan merupakan tindak pidana, melakukan perkara perdata yang kemudian menyita perhatian publik serta mengundang reaksi masyarakat diberbagai media sosial bahkan sempat menjadi tranding topik dimedia sosial twitter Indonesia. Oleh karena itu dilakukan penelitian ini guna mengetahui dan mengklasifikasikan sentimen masyarakat pada kasua KSP Indosurya menggunakan metode Naïve bayes. Dimana hasil tertinggi didapatkan oleh sentimen negative, sehingga didapatkan kesimpulan sentimen publik terhadap topik kasus KSP Indosurya di twitter Indonesia adalah negative dengan jumlah parameter 1200 berdasarkan analisis menggunakan metode Naïve bayes.The KSP Indosurya case has again stolen attention at this time because the alleged perpetrator Henry Surya as the founder of KSP Indosurya was acquitted by the Chief Judge of the West Jakarta District Court Syafrudin Ainor for all charges on Tuesday (24/1/2023) with a statement that the defendant Henry Surya was proven to have committed an act who was charged but did not constitute a crime, carried out a civil case which then seized the public's attention and invited public reaction on various social media and even became a trending topic on Indonesian Twitter social media Therefore, this research was carried out to find out and classify public sentiment in the KSP Indosurya case using the Naïve Bayes method. Where the highest results were obtained by negative sentiment, so it was concluded that public sentiment on the topic of the KSP Indosurya case on Twitter Indonesia was negative with a total of 1200 parameters based on analysis using the Naïve Bayes method.","PeriodicalId":53361,"journal":{"name":"CESS Journal of Computer Engineering System and Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46731420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fever Classification Using the Neighbor Weighted K-Nearest Neighbor Method 基于邻域加权K-最近邻法的发热分类
Pub Date : 2023-07-01 DOI: 10.24114/cess.v8i2.43267
Surayya Safira Milania, Cucu Suhery, Tedy Rismawan
Demam merupakan gejala atau reaksi tubuh terhadap suatu infeksi atau penyakit. Demam dapat disebabkan karena adanya infeksi virus, bakteri, dan parasit. Serta demam akibat gigitan nyamuk. Beberapa penyakit penyebab demam yang perlu diwaspadai antara lain Demam Berdarah Dengue (DBD), Demam Tifoid, dan Malaria dikarenakan gejala klinis dari ketiga penyakit tersebut sangat mirip dan sulit untuk dibedakan. Akibat dari gejala yang mirip, seringkali menyebabkan kesulitan dalam mendapatkan diagnosis awal sehingga kurang tepat dalam penanganan. Oleh karena itu, pada penelitian ini dibangun sebuah sistem yang dapat mengklasifikasikan demam menggunakan metode Neighbor Weighted K-Nearest Neighbor. Data yang digunakan berjumlah 300 data dengan komposisi rasio data latih dan data uji sebesar 70%:30% sehingga data latih yang digunakan berjumlah 210 data dan data uji berjumlah 90 data. Penelitian ini dilakukan dengan mengamati variasi nilai ketetanggaan (K) dan nilai exp (E) terhadap akurasi sistem klasifikasi demam. Hasil pelatihan menunjukkan bahwa nilai K dan E yang bervariasi tidak mempunyai pengaruh terhadap akurasi tersebut. Hasil pengujian yang dilakukan mendapatkan akurasi sebesar 100% pada setiap variasi nilai K dan E.Fever is a symptom of the body's reaction to an infection or disease. Fever can be caused by viral, bacterial, or parasitic infections. as well as fever due to mosquito bites. Several diseases that cause fever that need to be watched out for include dengue hemorrhagic fever (DHF), typhoid fever, and malaria because the clinical symptoms of these three diseases are very similar and difficult to distinguish. As a result of similar symptoms, it often causes difficulties in getting an early diagnosis, so treatment is not appropriate. Therefore, in this study, a system was developed that could classify fever using the neighbor weighted K-nearest neighbor method. The data used totaled 300, with a composition ratio of 70% training data to 30% test data, for a total of 210 training data and 90 test data. This research was conducted by observing the variation in the value of neighborliness (K) and the value of exp (E) on the accuracy of the fever classification system. The results of the training show that the varying K and E values have no effect on accuracy. The results of the tests carried out obtained an accuracy of 100% for each variation in the values of K and E. 
发烧是身体对感染或疾病的症状或反应。发烧可能是由于病毒、细菌和寄生虫感染引起的。还有蚊子发烧。登革热(DBD)、伤寒和疟疾是这三种疾病的临床症状,很难区分。类似症状的结果,通常会导致早期诊断不佳,治疗不佳。因此,在这项研究中,可以使用环保的K-Nearest方法对发烧进行分类。所使用的数据包含了300个数据,其运行数据与测试数据比例为70%:30%,因此所使用的培训数据占210个,测试数据占90个。这项研究是通过观察发热分类系统准确性的不规则值(K)和exp (E)值的变化来完成的。训练结果表明,不同的K和E值对准确性没有影响。所做的测试结果为身体对感染或疾病的反应增加了100%的准确性。发烧可以通过病毒、细菌或寄生虫感染。就像蚊子咬人一样。由于这三种疾病的临床症状非常相似,很难理解,因此需要密切关注出血、伤寒和疟疾。作为类似症状的参考,很难及早诊断,所以治疗不是不赞成的。在这项研究中,有一个系统正在开发,它可以通过邻居最受限制的K-nearest方法组织组织起来。数据总使用量为300,相当于70%的数据培训对30%的数据测试,总共210种数据培训和90种数据测试。这项研究是基于对热古典主义系统准确计算的变量的估计。非法K和E评估的训练结果没有准确定位。结果显示了K和E值的百分之百的准确。
{"title":"Fever Classification Using the Neighbor Weighted K-Nearest Neighbor Method","authors":"Surayya Safira Milania, Cucu Suhery, Tedy Rismawan","doi":"10.24114/cess.v8i2.43267","DOIUrl":"https://doi.org/10.24114/cess.v8i2.43267","url":null,"abstract":"Demam merupakan gejala atau reaksi tubuh terhadap suatu infeksi atau penyakit. Demam dapat disebabkan karena adanya infeksi virus, bakteri, dan parasit. Serta demam akibat gigitan nyamuk. Beberapa penyakit penyebab demam yang perlu diwaspadai antara lain Demam Berdarah Dengue (DBD), Demam Tifoid, dan Malaria dikarenakan gejala klinis dari ketiga penyakit tersebut sangat mirip dan sulit untuk dibedakan. Akibat dari gejala yang mirip, seringkali menyebabkan kesulitan dalam mendapatkan diagnosis awal sehingga kurang tepat dalam penanganan. Oleh karena itu, pada penelitian ini dibangun sebuah sistem yang dapat mengklasifikasikan demam menggunakan metode Neighbor Weighted K-Nearest Neighbor. Data yang digunakan berjumlah 300 data dengan komposisi rasio data latih dan data uji sebesar 70%:30% sehingga data latih yang digunakan berjumlah 210 data dan data uji berjumlah 90 data. Penelitian ini dilakukan dengan mengamati variasi nilai ketetanggaan (K) dan nilai exp (E) terhadap akurasi sistem klasifikasi demam. Hasil pelatihan menunjukkan bahwa nilai K dan E yang bervariasi tidak mempunyai pengaruh terhadap akurasi tersebut. Hasil pengujian yang dilakukan mendapatkan akurasi sebesar 100% pada setiap variasi nilai K dan E.Fever is a symptom of the body's reaction to an infection or disease. Fever can be caused by viral, bacterial, or parasitic infections. as well as fever due to mosquito bites. Several diseases that cause fever that need to be watched out for include dengue hemorrhagic fever (DHF), typhoid fever, and malaria because the clinical symptoms of these three diseases are very similar and difficult to distinguish. As a result of similar symptoms, it often causes difficulties in getting an early diagnosis, so treatment is not appropriate. Therefore, in this study, a system was developed that could classify fever using the neighbor weighted K-nearest neighbor method. The data used totaled 300, with a composition ratio of 70% training data to 30% test data, for a total of 210 training data and 90 test data. This research was conducted by observing the variation in the value of neighborliness (K) and the value of exp (E) on the accuracy of the fever classification system. The results of the training show that the varying K and E values have no effect on accuracy. The results of the tests carried out obtained an accuracy of 100% for each variation in the values of K and E. ","PeriodicalId":53361,"journal":{"name":"CESS Journal of Computer Engineering System and Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47927071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation Scorring Game Application Construct Based Learning Arabic Letter with Analytical Heuristic Processing 基于分析启发式处理的评估评分游戏应用结构的阿拉伯语字母学习
Pub Date : 2023-07-01 DOI: 10.24114/cess.v8i2.45284
A. Hayati
Pada penelitian ini mengimplementasikan evaluasi penilaian dengan berbasis metode Analytical Heuristic Process (AHP) yang diimplementasikan untuk menilai aplikasi belajar huruf Arab Hijaiyah yang bertujuan menilai lebih sesuai dengan permainan yang terselesaikan. Terdapat beberapa level permainan dan setiap level memiliki desain permainan yang berbeda, dimana pada level 1 adalah kuis soal, level 2 adalah drag and drop, level 3 adalah mencari kata dimana karakter fani akan bergerak atas bawah kanan kiri dengan animasi, level 4 adalah mengumpulkan poin dengan karakter fani meloncat objek dan bergerak kanan kiri atas bawah. Hasil penilaian scor permainan user dihasilkan dengan akumulasi nilai pada semua level permainan dengan metode AHP dengan variabel level, variabel nilai, dan variabel waktu sebagai dasar penghitungan weight dari metode AHP.In this research implementation evaluation use Analytical Heuristic Process (AHP) for analysis application game education for learning Arabic Letter Hijaiyah the purpose is evaluated user score actually as level user finished. Application there is few level in this application game and every level has game desain which different. Level 1 user should solve game with quizioner game, level 2 user should drag and drop the game, level 3 user should find word where fani character can move to up,bottom, right and left whith animation, level 4 user should collect poin value with fani character can jump object and move to right,left, uo and bottom. Evaluation scor for user result from accumulation value from all level game use AHP method with level variabel, score variabel and time variable as basic weight from AHP method.
在本研究中,它实现了一个基于分析启发式过程(AHP)方法的评估,该方法用于评估Hijaiyah阿拉伯语字母学习应用程序,旨在评估更符合游戏的内容。游戏有几个级别,每个级别都有不同的游戏设计,其中级别1是问答,级别2是拖放,级别3是搜索一个单词,其中粉丝角色将随着动画向右上移动,级别4是粉丝角色跳过对象并向右下移动的一组点。用户游戏的得分结果是通过使用具有可变级别、可变值、可变值的AHP方法来累积游戏的所有级别的值来产生的,在本研究的实施评估中,使用分析启发式过程(AHP)进行分析应用游戏教育学习阿拉伯语字母Hijaiyah,目的是将用户得分实际评估为用户完成的水平。应用程序在这个应用程序游戏中有几个级别,每个级别都有不同的游戏设计。一级用户应该用quizioner游戏解决游戏,二级用户应该拖放游戏,三级用户应该找到fani角色可以在动画中向上、向下、向右和向左移动的单词,四级用户应该收集带有fani角色的poin值,可以跳到对象并向右、向左、向左和向下移动。利用层次分析法,以层次变量、得分变量和时间变量为基本权重,对各层次游戏的累积值对用户结果进行评分。
{"title":"Evaluation Scorring Game Application Construct Based Learning Arabic Letter with Analytical Heuristic Processing","authors":"A. Hayati","doi":"10.24114/cess.v8i2.45284","DOIUrl":"https://doi.org/10.24114/cess.v8i2.45284","url":null,"abstract":"Pada penelitian ini mengimplementasikan evaluasi penilaian dengan berbasis metode Analytical Heuristic Process (AHP) yang diimplementasikan untuk menilai aplikasi belajar huruf Arab Hijaiyah yang bertujuan menilai lebih sesuai dengan permainan yang terselesaikan. Terdapat beberapa level permainan dan setiap level memiliki desain permainan yang berbeda, dimana pada level 1 adalah kuis soal, level 2 adalah drag and drop, level 3 adalah mencari kata dimana karakter fani akan bergerak atas bawah kanan kiri dengan animasi, level 4 adalah mengumpulkan poin dengan karakter fani meloncat objek dan bergerak kanan kiri atas bawah. Hasil penilaian scor permainan user dihasilkan dengan akumulasi nilai pada semua level permainan dengan metode AHP dengan variabel level, variabel nilai, dan variabel waktu sebagai dasar penghitungan weight dari metode AHP.In this research implementation evaluation use Analytical Heuristic Process (AHP) for analysis application game education for learning Arabic Letter Hijaiyah the purpose is evaluated user score actually as level user finished. Application there is few level in this application game and every level has game desain which different. Level 1 user should solve game with quizioner game, level 2 user should drag and drop the game, level 3 user should find word where fani character can move to up,bottom, right and left whith animation, level 4 user should collect poin value with fani character can jump object and move to right,left, uo and bottom. Evaluation scor for user result from accumulation value from all level game use AHP method with level variabel, score variabel and time variable as basic weight from AHP method.","PeriodicalId":53361,"journal":{"name":"CESS Journal of Computer Engineering System and Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44357317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
K-Means Cluster Analysis for District or City Clustering in Bengkulu Province based on The Number of Base Transceiver Stations and The Strength of Cell Phone Signal 基于基站数量和手机信号强度的明古鲁省区市聚类的k -均值聚类分析
Pub Date : 2023-01-31 DOI: 10.24114/cess.v8i1.40913
Anisa Rahmawati, E. Setyowati
The existence of a Base Transceiver Station (BTS) and the strength of cell phone signals in an area have greatly affected the ease of communication and exchanging information between people. This is one aspect to measure technological developments in a region. This study aims to use the K-Means algorithm to classify districts or cities in Bengkulu Province based on the proportion of BTS presence, the proportion of villages with strong telephone signals, and the proportion of villages with 4G internet signals. There are three clusters based on these three variables and there are still significant differences between districts or cities in Bengkulu Province. The output of this study becomes an input for the Bengkulu provincial government to be able to pay attention to the distribution of communication infrastructures in their province.
基站收发信台(BTS)的存在和一个地区中手机信号的强度极大地影响了人们之间通信和信息交换的便利性。这是衡量一个地区技术发展的一个方面。本研究旨在使用K-Means算法,根据BTS的存在比例、电话信号强的村庄比例和4G互联网信号的村庄比例,对明古鲁省的地区或城市进行分类。基于这三个变量有三个集群,明古鲁省的各区或市之间仍存在显著差异。这项研究的成果成为明古鲁省政府关注该省通信基础设施分布的投入。
{"title":"K-Means Cluster Analysis for District or City Clustering in Bengkulu Province based on The Number of Base Transceiver Stations and The Strength of Cell Phone Signal","authors":"Anisa Rahmawati, E. Setyowati","doi":"10.24114/cess.v8i1.40913","DOIUrl":"https://doi.org/10.24114/cess.v8i1.40913","url":null,"abstract":"The existence of a Base Transceiver Station (BTS) and the strength of cell phone signals in an area have greatly affected the ease of communication and exchanging information between people. This is one aspect to measure technological developments in a region. This study aims to use the K-Means algorithm to classify districts or cities in Bengkulu Province based on the proportion of BTS presence, the proportion of villages with strong telephone signals, and the proportion of villages with 4G internet signals. There are three clusters based on these three variables and there are still significant differences between districts or cities in Bengkulu Province. The output of this study becomes an input for the Bengkulu provincial government to be able to pay attention to the distribution of communication infrastructures in their province.","PeriodicalId":53361,"journal":{"name":"CESS Journal of Computer Engineering System and Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48105577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of CPU Performance on FreeBSD 64-bit and RedHat 64-bit Operating System Against Denial of Service (DoS) Using Hping3 FreeBSD 64位和RedHat 64位操作系统在Hping3拒绝服务(DoS)下CPU性能的比较分析
Pub Date : 2023-01-31 DOI: 10.24114/cess.v8i1.42824
Ihsan Fadli Tampati, Faizal Gani Setyawan, Wiyar Wilujengning Sejati, Aqwam Rosadi Kardian
Denial of Services (Dos) attack is a type of attack against server traffic. DoS works by placing a heavy load on the server, so that the server cannot accommodate connections from other users and can cause system failure on the server. On the other hand, Denial of Services (DoS) attacks can be used to test server resilience. The servers to be tested are using RedHat Linux and FreeBSD operating systems. Testing is carried out by flooding the system with DoS attacks using the hping3 tool, then comparing the test results in the form of percentages of CPU consumption and memory consumption between operating systems to determine vulnerabilities in each operating system. Based on a comparison of test results between operating systems, the FreeBSD operating system has better CPU performance than the RedHat Linux operating system, but has a vulnerability in internal memory to DoS attacks. Meanwhile, the RedHat Linux operating system has better internal memory performance than the FreeBSD operating system, but has a vulnerability in CPU performance against DoS attacks.
拒绝服务(Dos)攻击是一种针对服务器流量的攻击。DoS的工作原理是在服务器上放置沉重的负载,使服务器无法容纳来自其他用户的连接,并可能导致服务器上的系统故障。另一方面,拒绝服务(DoS)攻击可用于测试服务器的弹性。要测试的服务器使用RedHat Linux和FreeBSD操作系统。测试是通过使用hping3工具向系统注入DoS攻击来进行的,然后以操作系统之间CPU消耗和内存消耗的百分比形式比较测试结果,以确定每个操作系统中的漏洞。根据操作系统之间的测试结果比较,FreeBSD操作系统的CPU性能比RedHat Linux操作系统更好,但内部内存存在DoS攻击漏洞。同时,RedHat Linux操作系统的内部内存性能比FreeBSD操作系统更好,但在CPU性能方面存在DoS攻击漏洞。
{"title":"Comparative Analysis of CPU Performance on FreeBSD 64-bit and RedHat 64-bit Operating System Against Denial of Service (DoS) Using Hping3","authors":"Ihsan Fadli Tampati, Faizal Gani Setyawan, Wiyar Wilujengning Sejati, Aqwam Rosadi Kardian","doi":"10.24114/cess.v8i1.42824","DOIUrl":"https://doi.org/10.24114/cess.v8i1.42824","url":null,"abstract":"Denial of Services (Dos) attack is a type of attack against server traffic. DoS works by placing a heavy load on the server, so that the server cannot accommodate connections from other users and can cause system failure on the server. On the other hand, Denial of Services (DoS) attacks can be used to test server resilience. The servers to be tested are using RedHat Linux and FreeBSD operating systems. Testing is carried out by flooding the system with DoS attacks using the hping3 tool, then comparing the test results in the form of percentages of CPU consumption and memory consumption between operating systems to determine vulnerabilities in each operating system. Based on a comparison of test results between operating systems, the FreeBSD operating system has better CPU performance than the RedHat Linux operating system, but has a vulnerability in internal memory to DoS attacks. Meanwhile, the RedHat Linux operating system has better internal memory performance than the FreeBSD operating system, but has a vulnerability in CPU performance against DoS attacks.","PeriodicalId":53361,"journal":{"name":"CESS Journal of Computer Engineering System and Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42113798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recommendations for the Best Contract Labor Handling Staff Using the Complex Proportional Assessment Method 使用复比例评估方法的最佳合同劳工处理人员的建议
Pub Date : 2023-01-31 DOI: 10.24114/cess.v8i1.42655
Adi Widarma, Dharyana Suryadijaya, Bagus Rizki Lubis, Ira Murni
Staff or commonly referred to as employees are an important part of a company/institution, especially those who have the quality and enthusiasm to maintain the progress of the agency. The purpose of this research is to find out decision making or problem solving in determining the best contract staff recommendations at SERGAI DISPORAPARBUD so that later these staff can be more motivated in their performance. To conduct this research, observational research methods, interviews and literature studies were carried out and the calculation process was carried out using the COPRAS method. In addition to determining the best contract labor recommendations, several criteria must be met by each alternative, namely discipline, honesty, communication, cooperation, and responsibility. The results of this study indicate that 10 alternatives get the top ranking, one of which is a staff named Jaliya SE with a utility value of 100 getting the first rank in the recommendation to become the best contract worker at DISPORAPARBUD SERGAI.
员工或通常被称为雇员是公司/机构的重要组成部分,特别是那些具有保持机构进步的素质和热情的人。本研究的目的是找出决策或解决问题的方法,以确定SERGAI DISPORAPARBUD的最佳合同员工建议,以便以后这些员工可以在他们的绩效中更有动力。本研究采用观察研究法、访谈法和文献研究法进行,计算过程采用COPRAS方法。除了确定最佳的合同劳动建议外,每个备选方案还必须满足几个标准,即纪律、诚实、沟通、合作和责任。本研究结果表明,10个备选方案获得了最高排名,其中一个名为Jaliya SE的员工效用值为100,在推荐中排名第一,成为DISPORAPARBUD SERGAI的最佳合同工。
{"title":"Recommendations for the Best Contract Labor Handling Staff Using the Complex Proportional Assessment Method","authors":"Adi Widarma, Dharyana Suryadijaya, Bagus Rizki Lubis, Ira Murni","doi":"10.24114/cess.v8i1.42655","DOIUrl":"https://doi.org/10.24114/cess.v8i1.42655","url":null,"abstract":"Staff or commonly referred to as employees are an important part of a company/institution, especially those who have the quality and enthusiasm to maintain the progress of the agency. The purpose of this research is to find out decision making or problem solving in determining the best contract staff recommendations at SERGAI DISPORAPARBUD so that later these staff can be more motivated in their performance. To conduct this research, observational research methods, interviews and literature studies were carried out and the calculation process was carried out using the COPRAS method. In addition to determining the best contract labor recommendations, several criteria must be met by each alternative, namely discipline, honesty, communication, cooperation, and responsibility. The results of this study indicate that 10 alternatives get the top ranking, one of which is a staff named Jaliya SE with a utility value of 100 getting the first rank in the recommendation to become the best contract worker at DISPORAPARBUD SERGAI.","PeriodicalId":53361,"journal":{"name":"CESS Journal of Computer Engineering System and Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41680793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet of Things based Control and Monitoring System for Koi Fish Cultivation 基于物联网的锦鲤养殖控制与监测系统
Pub Date : 2023-01-31 DOI: 10.24114/cess.v8i1.40886
Kevin William, Ikhwan Ruslianto, Irma Nirmala
Water quality is an important factor for fish koi cultivation. Poor water quality such as inappropriate temperature, pH, and turbidity can disrupt metabolic processes, inhibit growth and cause death in koi fish. Apart from that, feeding and checking water quality are still done manually. Because of this, we need a system that can monitor and control the feeding, temperature, and water quality according to the living environment of koi fish. In this study the system was built on an Android-based mobile application using the flutter framework. In addition, the system has a notification to provide information on changes in sensor readings in real time to users. The notifications are changes in temperature, pH, turbidity, water level, feed level and changes in control device modes. Testing the water temperature readings obtained a relative error value of 0,66%, water turbidity readings obtained an error value of 8,79%, water pH readings obtained a relative error value of 2,45%, water level readings obtained an error relative value of 1,57% and feed availability readings obtained an error value of 3,1%.
水质是养殖锦鱼的重要因素。水质差,如温度、pH值和浊度不合适,会破坏锦鱼的代谢过程,抑制生长并导致死亡。除此之外,喂食和检查水质仍然是手动完成的。正因为如此,我们需要一个能够根据锦鱼的生活环境来监测和控制喂食、温度和水质的系统。在本研究中,该系统是在基于安卓系统的移动应用程序上使用flutter框架构建的。此外,该系统具有通知,以向用户实时提供传感器读数变化的信息。通知包括温度、pH、浊度、水位、进料液位的变化以及控制设备模式的变化。测试水温读数获得的相对误差值为0.66%,水浊度读数获得的误差值为8,79%,水pH读数获得的相关误差值为2,45%,水位读数获得的错误相关值为1,57%,给水可用性读数获得的偏差值为3,1%。
{"title":"Internet of Things based Control and Monitoring System for Koi Fish Cultivation","authors":"Kevin William, Ikhwan Ruslianto, Irma Nirmala","doi":"10.24114/cess.v8i1.40886","DOIUrl":"https://doi.org/10.24114/cess.v8i1.40886","url":null,"abstract":"Water quality is an important factor for fish koi cultivation. Poor water quality such as inappropriate temperature, pH, and turbidity can disrupt metabolic processes, inhibit growth and cause death in koi fish. Apart from that, feeding and checking water quality are still done manually. Because of this, we need a system that can monitor and control the feeding, temperature, and water quality according to the living environment of koi fish. In this study the system was built on an Android-based mobile application using the flutter framework. In addition, the system has a notification to provide information on changes in sensor readings in real time to users. The notifications are changes in temperature, pH, turbidity, water level, feed level and changes in control device modes. Testing the water temperature readings obtained a relative error value of 0,66%, water turbidity readings obtained an error value of 8,79%, water pH readings obtained a relative error value of 2,45%, water level readings obtained an error relative value of 1,57% and feed availability readings obtained an error value of 3,1%.","PeriodicalId":53361,"journal":{"name":"CESS Journal of Computer Engineering System and Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44548424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of Network Security and Anticipating Attackers Using pfSense Firewall 利用pfSense防火墙实现网络安全并预测攻击者
Pub Date : 2023-01-31 DOI: 10.24114/cess.v8i1.42377
Alhu Waladan Naufal Sholihan, Aan Restu Mukti, Suryayusra Suryayusra, Rahmat Novrianda Dasmen
At PT. PLN (Persero) UPDL Palembang uses routers from the Cisco 1900 series, hardware-wise this Cisco device is very old because it was released in 2009 according to a Cisco website source, using the Cisco 1900 series as a router is something that is very vulnerable to attack by attackers due to its backwardness. the times in terms of network security, and the lack of attention to network security is also a matter of concern in this regard. With these problems, routing is added for network security by designing a pc router firewall from pfSense, the pc router itself uses computer assets that are is no longer used but has sufficient specifications. Using the action research method, carrying out diagnoses, planning actions, following up, conducting evaluations, and learning materials. By designing a pc router firewall using pfSense it is hoped that the results will be quite good, because it uses the router firewall feature using pfSense to block attacks. Using pfSense as network security will certainly be safer because pfSense still regularly updates or improves its security and has an active forum community to date so that information can be exchanged.
在印尼国家电力公司(Persero),UPDL Palembang使用思科1900系列的路由器,从硬件方面来看,这款思科设备非常旧,因为它是在2009年发布的,根据思科网站的消息来源,使用思科1900系列作为路由器非常容易受到攻击者的攻击,因为它的落后。时代在网络安全方面,对网络安全的重视程度不够也是这方面值得关注的问题。有了这些问题,通过设计pfSense的pc路由器防火墙,为网络安全添加了路由,pc路由器本身使用的是不再使用但有足够规格的计算机资产。使用行动研究方法,进行诊断、计划行动、跟进、进行评估和学习材料。通过使用pfSense设计一个pc路由器防火墙,希望结果会很好,因为它使用了使用pfSense的路由器防火墙功能来阻止攻击。使用pfSense作为网络安全肯定会更安全,因为pfSense仍然定期更新或提高其安全性,并且迄今为止有一个活跃的论坛社区,以便可以交换信息。
{"title":"Implementation of Network Security and Anticipating Attackers Using pfSense Firewall","authors":"Alhu Waladan Naufal Sholihan, Aan Restu Mukti, Suryayusra Suryayusra, Rahmat Novrianda Dasmen","doi":"10.24114/cess.v8i1.42377","DOIUrl":"https://doi.org/10.24114/cess.v8i1.42377","url":null,"abstract":"At PT. PLN (Persero) UPDL Palembang uses routers from the Cisco 1900 series, hardware-wise this Cisco device is very old because it was released in 2009 according to a Cisco website source, using the Cisco 1900 series as a router is something that is very vulnerable to attack by attackers due to its backwardness. the times in terms of network security, and the lack of attention to network security is also a matter of concern in this regard. With these problems, routing is added for network security by designing a pc router firewall from pfSense, the pc router itself uses computer assets that are is no longer used but has sufficient specifications. Using the action research method, carrying out diagnoses, planning actions, following up, conducting evaluations, and learning materials. By designing a pc router firewall using pfSense it is hoped that the results will be quite good, because it uses the router firewall feature using pfSense to block attacks. Using pfSense as network security will certainly be safer because pfSense still regularly updates or improves its security and has an active forum community to date so that information can be exchanged.","PeriodicalId":53361,"journal":{"name":"CESS Journal of Computer Engineering System and Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48051137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
CESS Journal of Computer Engineering System and Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1