Sari, Ayu Purnama
Unknown Affiliation

Published : 2 Documents
Articles

Found 2 Documents
Search

PEMANTAUAN VEGETASI MENGGUNAKAN KAMERA NIR TERBANG DENGAN FILTER NRG Sari, Ayu Purnama; sukemi, Sukemi; ubaya, huda
Annual Research Seminar (ARS) Vol 4, No 1 (2018): ARS 2018
Publisher : Annual Research Seminar (ARS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1090.587 KB)

Abstract

Vegetasi merupakan lingkup komunitas tanaman dan berbagai flora penyusunnya di suatu wilayah. Penelitian ini dibuat untuk menguji model baru dalam melihat tingkat vegetasi dengan menggunakan kamera NIR dan komputasi filter NRG, untuk mendapatkan nilai NDVI yang merupakan parameter dalam menentukan tingkat vegetasi suatu wilayah. Hasil yang didapat dari penelitian ini yaitu penggunaan kanal biru dapat mewakili reflektansi nilai NIR dengan tidak adanya nilai yang melebihi dari rentang nilai NDVI
PENDETEKSI SERANGAN DDoS (DISTRIBUTED DENIAL OF SERVICE) MENGGUNAKAN HONEYPOT DI PT. TORINI JAYA ABADI Dwiyatno, Saleh; Sari, Ayu Purnama; Irawan, Agus; Safig, Safig
Jurnal Sistem Informasi dan Informatika Vol 2 No 2 (2019): Jurnal Sistem Informasi dan Informatika (SIMIKA)
Publisher : Prodi Sistem Informasi, Universitas Banten Jaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Information security is very important in today's technology. Information storage and crossing is currently no longer using paper media, but has used a lot of computer and internet media. PT. Torini Jaya Abadi is one that uses computer and internet media for information storage and crossing. However, there are disturbances such as heavy server access, which cannot be accessed and sometimes it cannot enter into the database server from the indication that the server might be exposed to a virus or DDoS (Distributed Danial of Service) type attacks occur on the server. Based on these problems, the author uses a honeypot to detect an attack based on alerts that have been accommodated in the log and can also provide information about the attacks that occur, from the results obtained honeyd is able to resemble an original system that pretends to have services that are not real , also able to detect attacks in real time and provide information from attackker, honeyd can emulate virtual hosts that are similar to the original computer, by obtaining logs from the honeyd admin system to find out information that occurs on the server, with honeyd network systems can help detect attacks in real time.