Study And Analysis Of The Implementation Of Ssl On The Indonesian Air Force Recruitment Website
Abstract
Abstract—Security related to website data defense is becoming increasingly important because more and more cybersecurity threats can attack websites and steal confidential and sensitive data. One solution to secure against this threat is to implement SSL security on the Indonesian Air Force website. In this study, SSL implementation will be carried out on the website. Test Method Using Quality of Service, for network testing tools, use Wireshark. The purpose of this study was to determine the impact of using Qos parameters on websites when SSL was implemented and before SSL was implemented. Based on the test results with the QoS parameters with Wireshark, it obtained an average response time value of 0.508 before implementation and obtained a response time of 0.516 ms after implementation. SSL. Based on the results of tests conducted using SSL is better done to secure sensitive information data such as phishing attacks, and MITM from unauthorized parties
Keywords
Full Text:
PDFReferences
Purchina, O. & Poluyan, A. & Fugarov, Dmitry. (2023). Improving the security level of the information system using the SSL protocol. E3S Web of Conferences. 371. 10.1051/e3sconf/202337103067
Syahab, A. (2023). Analisis Audit Keamanan Informasi Website Menggunakan Metode Network Mapper Dan Qualys SSL. Jurnal Manajemen Informatika dan Sistem Informasi. 6. 39-47. 10.36595/misi.v6i1.742.
Rahmat M.F.E. Rohadi, I. Siradjuddin, and Chrissandy, F. (2021). “Study and Analysis of Network Topology Performance Using Wireless Distribution System Technology”, JITeCS, vol. 6, no. 2, pp. 130–136.
Manescu, V & Alexandra, N. & Barbu, A. & Rodica, G. & Militaru, G.. (2021). Analysis Of Ssl Certificates Trends And Extended Validation Of Ssl Usage For E-Commerce Websites And Internet Things. UPB Scientific Bulletin, Series C: Electrical Engineering. 83.
Josh A. Barnes, r. Case, B. Durumeric, Z. Eckersley, P.Alan Flores-López, J. Halderman, A. Hoffman-Andrews J., Kasten, J. Rescorla, E. Schoen, S. and Warren, B. (2019). Let's Encrypt: An Automated Certificate Authority to Encrypt the Entire Web. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS '19). Association for Computing Machinery, New York, NY, USA, 2473–2487. https://doi.org/10.1145/3319535.3363192.
Chandra, A. Y. (2019). Analisis Performansi Antara Apache & Nginx Web Server Dalam Menangani Client Request. Jurnal Sistem Dan Informatika (JSI), 14(1), 48-56. https://doi.org/10.30864/jsi.v14i1.248.
Azamuddin, W.M.H.; Hassan, R. Aman, A.H.M. Hasan, M.K. Al-Khaleefa, A.S. (2020). Quality of Service (QoS) Management for Local Area Network (LAN) Using Traffic Policy Technique to Secure Congestion. Computers , 39. https://doi.org/10.3390/computers9020039.
Rohadi, E. et al. (2020). Cluster implementation on mini Raspberry Pi computers using Round Robin Algorithm J. Phys.: Conf. Ser. 1450 012068.
Bahari, M. A. Trisnawan, P. H. and Siregar, R. A. (2018). "Analysis of AODV (Ad Hoc On-Demand Distance Vector) and AOMDV (Ad Hoc On-Demand Multipath Distance Vector) Protocol Performance Against Active Attacks on the MANET Network (Mobile Ad Hoc Network), ” vols. 3, no. 4, p. 3235–3244.
Pranata, H. Abdillah, L.A. Ependi, U. (2015). Secure SocketLayer (SSL) Protocol Security Analysis of Network Sniffing Processes. Student Colloquium Information Systems &; Information Engineering.
Guo, Y. & Cao, Z & Yang, W & Xiong, G. (2018). A Measurement and Security Analysis of SSL/TLS Deployment in Mobile Applications. 189-199. 10.1007/978-3-319-66625-9_19.
BORUT, K. R. (2017). “Analysis of Blackhole Attack Detection on the Network Manet (Mobile Ad-Hoc Network) Using Genetic Algorithm Method Dan Ant Colony Optimization,” vol. XII, p. 35–44.
Dela, Y. MOGI, I Komang Ari. (2020). Computer Network Design Using PPDIOO Method With Case Study of SMA Negeri 1 Kunir. JELIKU (Jurnal Elektronik Ilmu Komputer Udayana), [S.l.], v. 9, n. 2, p. 235-240,. ISSN 2654-5101. Available at: . Date accessed: 19 oct. 2023. doi: https://doi.org/10.24843/JLK.2020.v09.i02.p10.
llyan, D. F., Nasution, S. M., and Siswo, A. (2016). Real-time video surveillance data security using video encryption algorithm. e-Proceedings of Engineering Vol. 3, No. 2.
Sabiq, A. ( 2016) "Development of Communication Applications on Android Devices Based on the Manet Network for Disaster Management," J. Teknol. inf. Yars., vol. 3, no. 1, p. 1–7.
Wulandari, R. 2016. QoS (Quality of Service) Analysis on the Internet Network (Case Study: UPT Jampang Kulon – Lipi Mining Engineering Test Workshop). Journal of Informatics Engineering and Information Systems. Vol. 2, No. 2.
Widyantara, I. M. O. Wedanti, N. U. and Swamardika, I. B. A. (2015). Design and Implementation of Web-GIS-Based Video Surveillance System Applications. Journal of Electrical Technology Vol. 14, No. 1, 2015.
Simamora, S. N. M. P., (2015). "Dynamic Topology Design Randomly in Mobile Ad-Hoc Network with a Modeling Approach," Simetris J. Tech.Mechanical, Electrical and Computing Sciences., vol. 6, no. 1, p. 119.
Yong-Hua, X., Wan S.Y., He Y., dan Su D. (2013). Design and Implementation of a Prototype Cloud Video Surveillance System. Journal of AdvancedComputational Intelligence and Intelligent Informatics Vol. 18, No. 1.
Mantoro T., N.A Aziz, N. D. M. Yusoff, N. A. A. Talib, (2013). Log Visualization of Intrusion and Prevention Reverse Proxy Server Against Web Attacks, International Conference on Informatics and Creative Multimedia 2013 (ICICM'13), Kuala Lumpur, 3-6.
Mantoro, T., Ayu M.A.,Borovac A., Zuhra A.(2012). IPv4 and IPv6 Server Designs: The Sockets Performance, Proceedings of the 3rd International Conference on Multimedia Computing and Systems, Tangier, Morocco.
DOI: http://dx.doi.org/10.52155/ijpsat.v49.1.7021
Refbacks
- There are currently no refbacks.
Copyright (c) 2025 Wikik Andhitias Sutrisno

This work is licensed under a Creative Commons Attribution 4.0 International License.