Adityas Widjajarto’s research while affiliated with Telkom University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (15)


Desain Attack Tree Berdasar Metrik Time Pada Eksploitasi GraphQL Dengan Information Disclosure Vulnerability
  • Article
  • Full-text available

April 2025

·

9 Reads

Jurnal Teknologi Dan Sistem Informasi Bisnis

Rida Napisa

·

A. Widjajarto

·

Graph Query Language (GraphQL) adalah sebuah bahasa query yang dirancang untuk mengatur interaksi antara klien dan Antarmuka Pemrograman Aplikasi (API). GraphQL diciptakan untuk memudahkan pertukaran data antara backend dan frontend, memberikan deskripsi data yang jelas dan mudah dimengerti. GraphQL terus mendapatkan popularitas, kebutuhan akan praktik terbaik keamanan dan alat untuk menguji dan melindungi API GraphQL akan semakin penting. Seperti teknologi lainnya, GraphQL juga memiliki beberapa kelemahan, salah satunya adalah fitur introspection nya dapat mengungkapkan informasi sensitif yang seharusnya tidak terekspos. Oleh karena itu, penelitian ini bertujuan untuk menemukan kerentanan information disclosure vulnerability pada GraphQL API dan mencari waktu yang paling efektif dari dua mode keamanan yang diterapkan yaitu mode sebelum dan sesudah herdening. Terdapat dua metode dan dua bantuan Tools yang digunakan dalam mengimplementasikannya, yaitu Introspection with InQL dan Field Suggestion with Clairvoyance. Penelitian ini direpresentasikan secara visual melalui Attack Tree untuk memberikan gambaran menyeluruh mengenai jalur eksploitasi dan potensi serangan. Setelah dimplementasikan, didapatkan hasil bahwa metode eksploitasi information disclosure vulnerability yang berhasil dilakukan dan paling efisien sebelum hardening adalah Field Suggestion Methodss dengan total waktu 7,94s. Waktu paling efisien sebelum dan setelah hardening ternyata sama, yaitu Field Suggestion Methods dengan total waktu 8,99s setelah hardening. Dengan demikian, dari hasil perbandingan waktu tersebut, dapat disimpulkan bahwa semakin singkat waktu yang dibutuhkan, maka semakin cepat penyerang memperoleh informasi berbahaya dari GraphQL.

Download

Figure 12. CPU Utilization graph before and after Hardening
Figure 13. Attack Tree Based on Exploitation Before Hardening
Figure 14. Attack Tree Based on Exploitation After Hardening
Results of Time Analysis for Comparison of Exploitation Before Hardening
Results of Time Analysis for Comparison of Exploitation After Hardening

+1

Denial of Service Modeling: Time and CPU Usage Measurement on GraphQL AttackingPemodelan Denial of Service: Pengukuran Waktu dan Penggunaan CPU pada Serangan GraphQL

April 2025

·

5 Reads

INTEK Jurnal Penelitian

GraphQL is a query language that allows clients to request specific data from an API, making it more efficient and flexible compared to traditional REST APIs. This makes applications faster and more efficient by reducing data over-fetching, combining various data sources into a single request, and supporting schema changes without disrupting the integrity of existing applications. This study focuses on security testing and exploiting Denial of Service (DoS) vulnerabilities within GraphQL APIs. As a query language that is growing in popularity, GraphQL offers flexibility in data retrieval but is also vulnerable to DoS attacks. The research centers on DoS attacks using various exploitation techniques such as Circular Queries, Field Duplication, Alias Overloading, and Object Limit Overriding. Testing was conducted using the Kali Linux operating system and testing applications such as Altair and DVGA, employing the Threat Modeling Attack Tree method. The results of the testing show that the Field Duplication attack is the most effective, with the fastest execution time and relatively high CPU usage (2.5 seconds/88.5% reduced to 1.86 seconds/75.50%), while the lowest risk was found in Alias Overloading (1412.05 seconds/99% reduced to 691.29 seconds/93%). Although Alias Overloading posed the lowest risk, it still resulted in high CPU usage, burdening the server significantly. This study provides an understanding of the importance of testing and strengthening API security to prevent DoS attacks. Keywords— API GraphQL, Attack Tree, Denial of Service, exploitation, Cpu, Time




Fig. 2. Gambaran IPTEK Penelitian ini diharapkan dapat memberikan wawasan mendalam tentang transformasi digital dalam Pilkades di Desa Sukadana dan dapat menjadi panduan berharga bagi daerah lain yang ingin mengadopsi teknologi serupa dalam pemilihan kepala desa mereka. Fig. 2 menggambarkan konsep penelitian dan kerangka kerja yang akan kami gunakan untuk menganalisis dampak teknologi berbasis database dalam Pilkades.
From Ballots to Bytes A Digital Revolution in Village Head Elections - A Case Study from Sukadana, Indonesia

November 2023

·

196 Reads

·

3 Citations

SEIKO Journal of Management & Business

This paper explores the digital transformation of village head elections in Sukadana, Indonesia, with a focus on the implementation of database-driven technology. We examine the transition from traditional paper-based voting methods to electronic voting systems and the impact on voter participation, transparency, and the overall electoral process. We also analyze the results of this transformation, identify challenges encountered during the process, and draw lessons from this case study. Furthermore, we provide recommendations for other rural areas considering a similar digital shift. Our findings highlight a significant increase in voter participation, improved process transparency, and the potential for enhancing democracy at the village level. The success of this digital revolution in a rural context underscores the importance of a tailored approach to technology adoption in such settings, considering local needs and addressing security concerns.



Analisis Kerentanan Keamanan Terhadap Website Pemerintahan Daerah XYZ Menggunakan Penetration Testing Execution Standard (PTES) (EC00202394436)

October 2023

·

53 Reads

The rapid advancement of technology can influence every individual, organization, and even government in the accurate, effective, and efficient delivery of information. The XYZ local government is a governmental institution that serves the community in the field of trade. Information related to the XYZ regional government is directly managed by the XYZ Regional Communication and Information Office (Diskominfo), an institution specializing in technology and informatics. Diskominfo leverages technological progress to disseminate information to the community of the XYZ region, particularly those involved in trade, through their website, with the goal of facilitating the acquisition of accurate, precise, and reliable data directly. With the evolution of technology, the security of a website assumes increasing importance, as it can prevent attacks from irresponsible entities that may disrupt the system and harm the website owner. During the analysis process, the author simulates the role of an attacker to identify security vulnerabilities and weaknesses present on the XYZ local government website. This entails an analysis of security gaps aimed at determining the level of risk and confidence in the website. In the examination of security vulnerabilities, the author identifies 42 alerts, categorized into four risk levels: 9 vulnerabilities with a high-risk level, 13 with a medium-risk level, 11 with a low-risk level, and 9 with an informational risk level.


Figure 4: Information System Research Framework
Figure 5: Test DNS lookups
Security Vulnerability Analysis using Penetration Testing Execution Standard (PTES): Case Study of Government's Website

August 2023

·

998 Reads

·

26 Citations

The rapid development of technology has impacted various aspects of life, including the way individuals, organizations, and governments deliver accurate, effective, and efficient information. XYZ local government, which is responsible for serving the community in the trade field, manages its information through the Communication and Information Agency (Diskominfo) of the XYZ region. Diskominfo employs technological advancements to provide the people of the XYZ region with direct access to accurate, precise, and reliable data through their website. However, the security of the website has become a crucial aspect to prevent attacks from malicious individuals that can cause damage to the system and harm the website owner. To analyze the website's security loopholes and vulnerabilities, the author performed a simulation of an attacker. The analysis aimed to evaluate the level of risk and confidence in the website. The results showed 42 alerts categorized into four risk levels: 9 vulnerabilities with a high-risk level, 13 vulnerabilities with a medium-risk level, 11 vulnerabilities with a low-risk level, and 9 vulnerabilities with an informational-risk level.


Designing Data Centre Building Facilities Based on Humidity & Temperature Monitoring System in Hospital Using TIA-942 Standard with PPDIOO Life-Cycle Approach

December 2021

·

343 Reads

·

2 Citations

Internetworking Indonesia Journal

·

adityas widjajarto

·

R. R. Fahlevi

·

[...]

·

Information technology (IT) has been widely applied in various aspects of life, one of them through the IT implementations in hospitals to carry out administrative activities that aim to facilitate data processing and make existing operational activities run more effectively and efficiently. In this case of Muhammadiyah Sumberrejo Islamic Hospital, which requires a server room that is useful as a data center for IT management. It has a long-term plan to develop fair distribution of service in the form of the room heating, ventilation, air conditioning (HVAC) system based on humidity and temperature standard. Thus, it is necessary to design a monitoring system to align with the contextual setting and requirements. In this study, a data center for the Hospital will be designed using the standard of TIA-942 humidity and temperature while the PPDIOO Network Life-Cycle Approach method used for the development process. The result will be in accordance with the HVAC arrangement within the room.


Vulnerability and risk assessment for operating system (OS) with framework STRIDE: Comparison between VulnOS and Vulnix

September 2021

·

1,735 Reads

·

7 Citations

Indonesian Journal of Electrical Engineering and Computer Science

p> The rapid development of information technology has made security become extremely. Apart from easy access, there are also threats to vulnerabilities, with the number of cyber-attacks in 2019 showed a total of 1,494,281 around the world issued by the national cyber and crypto agency (BSSN) honeynet project. Thus, vulnerability analysis should be conducted to prepare worst case scenario by anticipating with proper strategy for responding the attacks. Actually, vulnerability is a system or design weakness that is used when an intruder executes commands, accesses unauthorized data, and carries out denial of service attacks. The study was performed using the AlienVault software as the vulnerability assessment. The results were analysed by the formula of risk estimation equal to the number of vulnerability found related to the threat. Meanwhile, threat is obtained from analysis of sample walkthroughs, as a reference for frequent exploitation. The risk estimation result indicate the 73 (seventy three) for the highest score of 5 (five) type risks identified while later on, it is used for re-analyzing based on the spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of prvilege (STRIDE) framework that indicated the network function does not accommodate the existing types of risk namely spoofing. </p


Citations (7)


... This ensures that the processes in operation are transparent and comprehensible to each functional dimension of the process flow chart and the procedures outlined within it. Phase 3, Streamlining goal is to increase the efficiency, effectiveness, and adaptability of ongoing business operations by streamlining procedures by shortening processing times, standardising procedures, or upgrading procedures [28][29][30][31][32]. Phase 4, Measurements, and controls business processes involves looking at and measuring anticipated organisational goals to influence the direction of those processes [33][34][35]. Phase 5, Continuous improvement is carried out in the stages below with the aim of achieving the implementation of the next improvement process with various processes such as changing, deleting, adding processes, and so on. [36][37][38][39][40]. ...

Reference:

Business Process Design for Gerakan Bangkit Desa in MSMEs Using E-BPI
From Ballots to Bytes A Digital Revolution in Village Head Elections - A Case Study from Sukadana, Indonesia

SEIKO Journal of Management & Business

... In the scientific literature, the use of the Penetration Testing Execution Standard (PTES) is well-documented and has been applied in various scenarios, including testing government websites [24], wireless security analysis [25], web server security [26], footprinting [27], among others. ...

Security Vulnerability Analysis using Penetration Testing Execution Standard (PTES): Case Study of Government's Website

... This model categorizes unknown binary samples as benign files or ransomware. The evaluation utilized a personal computer with a Core i5 CPU and 12GB RAM, testing on Windows 10 (64-bit) across two distinct operating systems [30]. ...

Vulnerability and risk assessment for operating system (OS) with framework STRIDE: Comparison between VulnOS and Vulnix

Indonesian Journal of Electrical Engineering and Computer Science

... CRIU (Checkpoint Restore in Userspace, pronounced kree-oo) is a tool for checkpointing and restoring applications in GNU/Linux environments [11,9]. With CRIU, it is possible to stop an application, save the working memory on disk, and restore the state later. ...

Live migration using checkpoint and restore in userspace (CRIU): Usage analysis of network, memory and CPU

Bulletin of Electrical Engineering and Informatics

... Currently, the dangers related to digital security are increasingly real and disturbing. Valuable data and information can be easily accessed by unauthorized parties or interfered with by malicious actors [1]. According to NCSI, the condition of cyber security in Indonesia is in 84th position out of the total countries that have been audited by NCSI [2] . ...

The Development of Information System Security Operation Centre (SOC): Case Study of Auto Repair Company

... Quality and reliable services can increase efficiency and productivity in economic activities. In addition, the public will feel more effectiveness and involvement in using government information technology services, which will increase active participation in government processes and improve private-public policies [23]. The index of system quality (ISQ) is a tool designed to help determine the quality of an information system by combining the concepts of system quality and information quality. ...

Architecture Model of Information Technology Infrastructure based on Service Quality at Government Institution

Procedia Computer Science

... The backup and restore model in the relationship between DC and DRC that provides redundancy services for clients via the Internet (WAN) can be used to construct Cloud service parameters. The main challenge faced today by organization is how to make better use of accumulated knowledge and experience in developing the execution plan and implementation through real policy formulation, along with how to achieve optimal social impact with relatively limited public resources [44]. It is always best to have point of view derived from the network engineers and the emergency teams to avoid dropping data packets with reasonable latency, especially in the event of a disaster [45]. ...

Optimization performance management with FCAPS and ITILv3: opportunities and obstacles

Indonesian Journal of Electrical Engineering and Computer Science