https://ejournal.pnc.ac.id/index.php/jinita/issue/feedJournal of Innovation Information Technology and Application (JINITA)2024-08-12T15:20:54+07:00Muhammad Nur Faiz[email protected]Open Journal Systems<p align="justify"><strong>Journal of Innovation Information Technology and Application (JINITA) </strong>is a journal managed by the <a href="https://jkb.pnc.ac.id/" target="_blank" rel="noopener">Department of Computers and Business</a>, <a href="https://pnc.ac.id/" target="_blank" rel="noopener">Politeknik Negeri Cilacap</a>, Indonesia. The journal invites scientists and engineers to exchange and disseminate theoretical and practice-oriented topics, but not limited to Software Engineering, Mobile Technology and Applications, Robotics, Database Systems, Information Engineering, Interactive Multimedia, Computer Networking, Information Systems, Computer Architecture, Embedded Systems, Computer Security, Human-Computer Interaction, Virtual/Augmented Reality, Intelligent System, IT Governance, Computer Vision, Distributed Computing System, Mobile Processing, Next Network Generation, Natural Language Processing, Business Process, Cognitive Systems, Networking Technology, and Pattern Recognition. All the submissions will be peer-reviewed by the panel of experts based on their originality, importance, novelty, and coming trends affecting science. Please submit your manuscript and Download the <strong><a href="https://docs.google.com/document/d/1UAbWE80iRp5WlDkx9SMMdYKS5zndm3Oo/edit?usp=sharing&ouid=117847086067629689391&rtpof=true&sd=true">Template in Word</a></strong>.</p> <p align="justify"><strong>Journal of Innovation Information Technology and Application (JINITA)</strong> has been accredited as a scientific journal by the Ministry of Education, Culture, Research and Technology - Republic of Indonesia : <a title="SERTIFIKAT SINTA " href="https://drive.google.com/file/d/1OJ2X5bYa1XnDzIdbCyjnOJ-HPyOyIjRa/view?usp=sharing" target="_blank" rel="noopener">SINTA Certificate</a><strong>.</strong></p>https://ejournal.pnc.ac.id/index.php/jinita/article/view/2025Application of the NIST 800-86 Framework to Forensic Digital Evidence for Signal and Litmatch 2024-07-08T12:55:34+07:00Nurul Puspa Hapsari[email protected]Bita Parga Zen[email protected]<p>Exchanging messages is a routine that cannot be avoided at this time. With the development of technology, exchanging messages has become easier to do. The thing that makes exchanging messages easier is the instant messaging application. Examples of instant messaging applications are the Signal and Litmatch applications. In addition to the ease of exchanging messages, there are also negative impacts, such as threats and bullying. Forensic analysis is carried out to find and obtain evidence of digital crimes. This research was conducted to find and obtain evidence of Signal and Litmatch applications by conducting case scenarios and using the National Institute of Standards and Technology (NIST) 800-86 method. This study uses the MobilEdit Forensic and Autopsy tools to obtain evidence from the Signal and Litmatch applications.</p>2024-06-28T00:00:00+07:00Copyright (c) 2024 Nurul Puspa Hapsari, Bita Parga Zenhttps://ejournal.pnc.ac.id/index.php/jinita/article/view/2187An AIoT-Based Automated Farming Irrigation System for Farmers in Limpopo Province2024-07-08T12:56:00+07:00Relebogile Langa[email protected]Michael Nthabiseng Moeti[email protected]Thabiso Maubane[email protected]<p>Limpopo, one of South Africa's nine provinces, is mostly rural, where agriculture serves as the primary occupation for around 89 percent of the total population. Agriculture relies on water, making it its most valuable asset. Through irrigation, water is supplied to crops for growth, frost control, and crop cooling. Irrigation can occur naturally, as with precipitation, or artificially, as with sprinklers. However, artificial irrigation is wasteful as it is regulated and monitored through human intervention, leading to water scarcity which is one of the obstacles that threatens the agricultural sector in the province of Limpopo. A machine learning precipitation prediction algorithm optimizes water usage. The paper also describes a system with multiple sensors that detect soil parameters, and automatically irrigate land based on soil moisture by switching the motor on/off.</p> <p>The objective of this paper is to develop an automated farming irrigation system that is both efficient and effective, with the intention of contributing to the resolution of the water crisis in the province of Limpopo. The proposed solution ought to be capable of decreasing labour hours, generating cost savings, ensuring consistent and efficient water usage, and gathering informed data to inform future research. Thus, farmers will have greater access to information regarding when to irrigate, how much water to use, weather alerts, and recommendations. In acquiring these, the ARIMA model was applied alongside DSRM for implementing the mobile application. The results obtained indicate that the use of AI and IoT (AIoT) in agriculture can improve operational efficiency with reduced human intervention as there is real-time data acquisition with real-time processing and predictions.</p>2024-06-28T00:00:00+07:00Copyright (c) 2024 Relebogile Langa, Michael Nthabiseng Moeti, Thabiso Maubanehttps://ejournal.pnc.ac.id/index.php/jinita/article/view/2224A Classification Data Packets Using the Threshold Method for Detection of DDoS2024-08-12T15:20:54+07:00Sukma Aji[email protected]Davito Rasendriya Rizqullah Putra[email protected]Imam Riadi[email protected]Abdul Fadlil [email protected]Muhammad Nur Faiz [email protected]Arif Wirawan Muhammad[email protected]Santi Purwaningrum[email protected]Laura Sari[email protected]<p>Computer communication is done by first synchronizing one computer with another computer. This synchronization contains Data Packages which can be detrimental if done continuously, it will be categorized as an attack. This type of attack, when performed against a target by many computers, is called a distributed denial of service (DDoS) attack. Technology and the Internet are growing rapidly, so many DDoS attack applications result in these attacks still being a serious threat. This research aims to apply the Threshold method in detecting DDoS attacks. The Threshold method is used to process numeric attributes so obtained from the logfile in a computer network so that data packages can be classified into 2, namely normal access and attack access. Classification results using the Threshold method after going through the fitting process, namely detecting 8 IP Addresses as computer network users and 6 IP addresses as perpetrators of DDoS attacks with optimal accuracy.</p>2024-06-28T00:00:00+07:00Copyright (c) 2024 Sukma Aji, Davito Rasendriya Rizqullah Putra, Imam Riadi, Abdul Fadlil, Muhammad Nur FaizArif Wirawan Muhammad, Santi Purwaningrum, Laura Sari https://ejournal.pnc.ac.id/index.php/jinita/article/view/2225Website Penetration Analysis Against XSS Attacks using Payload Method2024-07-08T12:57:50+07:00Luthfi Arian Nugraha[email protected]<p>This research aims to analyze the effectiveness of various penetration testing methods in identifying and mitigating XSS (Cross-Site Scripting) vulnerabilities in web applications. XSS is a type of web security attack that takes advantage of weaknesses in web applications to insert malicious code into web pages displayed to users. This attack can steal user data, take over user sessions, or spread malware. This research uses a penetration testing method with a black-box approach, where the researcher does not know the construction of the system being tested. Tests were conducted on 10 random websites, including 5 open-source websites and 5 commercial websites. The test results show that the payload method used is effective in exploiting XSS vulnerabilities on some websites. Of the 10 websites tested, 6 of them were successfully exploited using different payload methods. This research highlights the importance of using open-source penetration testing tools in detecting and addressing security vulnerabilities in web applications. These tools are easy to implement, supported by extensive documentation, and have a strong community. This research also emphasizes the importance of a deep understanding of how penetration testing tools work to identify and address security vulnerabilities. To address XSS vulnerabilities, this research recommends good programming techniques such as programming language updates, use of OOP (Object-Oriented Programming), MVC (Model-View-Controller) concepts, and use of frameworks. Further research can be done to develop and test new payload methods, explore the use of other penetration testing tools, and test security vulnerabilities in other types of web applications.</p>2024-06-28T00:00:00+07:00Copyright (c) 2024 Luthfi Arian Nugrahahttps://ejournal.pnc.ac.id/index.php/jinita/article/view/2257Blockchain Based Donation Management in Disaster Response2024-07-08T12:58:13+07:00Ankit K C[email protected]<p>Both natural and man-made disaster leave thousands of people in vulnerable and in need for essential aid. While individuals generously donate resources, traditional donation management systems suffer from limitations. Centralized control, opaque transactions, and potential corruption often hinder aid delivery and leave victims in despair. This paper proposes a novel Ethereum blockchain-based system for transparent and secure disaster donation management. Utilizing smart contracts, the system ensures traceability, accountability, and immutability of donations, empowering donors and fostering trust. This paper presents the system's architecture, detailing its components and interactions through sequence diagrams and algorithms. Additionally, successful testing on the Sepolia Ethereum testnet validates its functionality. To assess its effectiveness, a cost and security analysis is conducted. This blockchain-based framework offers a promising solution for transparent and efficient disaster response, potentially revolutionizing donation management. Further research, particularly on donation allocation optimization within the system holds immense potential for future development.</p>2024-06-28T00:00:00+07:00Copyright (c) 2024 Ankit K Chttps://ejournal.pnc.ac.id/index.php/jinita/article/view/2289Implementation of Payment Gateway in the Mobile-Based Pawon Mbok`E Eating House Ordering System 2024-07-08T12:59:03+07:00Fajar Mahardika[email protected]Ratih[email protected]R. Bagus Bambang Sumantri[email protected]<p>This paper discusses the implementation of a payment gateway in the mobile-based Pawon Mbok'E eating house ordering system. The integration of a payment gateway into mobile applications is crucial for facilitating secure and convenient transactions. Pawon Mbok'E aims to enhance customer satisfaction by enabling users to order food and make payments seamlessly through their mobile devices. Method research used is development system order mobile based with payment gateway integration. This implementation involves selecting an appropriate payment gateway, integrating it with the existing ordering system, ensuring security measures are in place, and testing for reliability and user-friendliness. The success of this implementation will provide Pawon Mbok'E customers with a streamlined ordering and payment process, thereby improving overall service efficiency and customer experience. Obtained testing reliability with amount respondents there are 65 as well percentage prove 100%, subject This show if 65 respondents That breast milk as well as No there is incoming respondents​ to type Excluded</p>2024-06-28T00:00:00+07:00Copyright (c) 2024 Fajar Mahardika, Ratih, R. Bagus Bambang Sumantri