Implementation of Equivalence Partitioning and Boundary Value Analysis in Black Box Testing A Case Study on the Admin Website of PAUD KB Al Husna

  • Adelia Software Engineering Technology, College of Vocational Studies, IPB University
  • Aisya Software Engineering Technology, College of Vocational Studies, IPB University
  • Dzaky Fachri Hadafi Software Engineering Technology, College of Vocational Studies, IPB University
  • Hasan Ismail Abdulmalik Software Engineering Technology, College of Vocational Studies, IPB University
  • Muhammad Nasir Software Engineering Technology, College of Vocational Studies, IPB University
  • Sofiyanti Indriasari
Keywords: Black Box Testing, Boundary Value Analysis, Equivalence Partitioning, Software Testing, System Validation

Abstract

In order to guarantee system functioning and quality, software testing is an essential stage in the Software Development Life Cycle (SDLC). This study implements black box testing using Equivalency Partitioning (EP) and Boundary Value Analysis (BVA) on the Admin Website PAUD KB Al Husna to identify functional defects, focusing on input validation and error handling. In this study, 82 test scenarios were created for five functional modules (Class Management, Teacher Management, FAQ, Schedule, Gallery) and three non-functional factors (Security, Compatibility, and Responsiveness). Test execution was conducted manually based on BVA test cases (Min-1, Min, Max, Max+1) and EP cases (valid and invalid classes). Results showed a 32.9% failure rate (27 of 82 scenarios). Critical findings include: (1) Systemic failure in upper-boundary validation (BVA Max+1) with 256-character inputs; (2) EP-Invalid validation failures revealing Cross-Site Scripting (XSS) vulnerabilities from HTML input; and (3) Absence of brute-force protection on login pages. The study concludes that BVA and EP techniques effectively identify critical data validation and security defects, providing essential improvement recommendations for developers.

Downloads

Download data is not yet available.

References

[1] Hozairi, Buhari, S. Alim, and Rofiudin, Panduan Komprehensif Pengujian Perangkat Lunak. Bandung, Indonesia: Widina Media Utama, 2024.
[2] R. S. Pressman, Software Engineering: A Practitioner’s Approach, 7th ed. Dubuque, IA: McGraw-Hill, 2010.
[3] A. Agustian, I. Andryani, S. Khoerunisa, A. Pangestu, and A. Saifudin, “Implementasi Teknik Equivalence Partitioning pada Pengujian Aplikasi E-learning Berbasis Web,” J. Teknol. Sist. Inf. Dan Apl., vol. 3, no. 3, p. 178, Aug. 2020, doi: 10.32493/jtsi.v3i3.5371.
[4] R. P. Fajar, “Teknik Boundary Value Analysis pada Blackbox Testing untuk Aplikasi Buku Catatan Harian,” Repositor, vol. 6, no. 1, pp. 69–78, Feb. 2024.
[5] H. A. S. Hutapea, Y. Priyadi, and E. Darwiyanto, “Analisis dan Pengujian dengan Menggunakan Metode Boundary Value Analysis dan Metode Equivalence Partitioning (Studi Kasus: Aplikasi Homelab),” E-Proceeding Eng., vol. 9, no. 2, p. 746, Apr. 2022.
[6] R. Gunawan, Y. P. Wibisono, C. H. Primasari, and D. Budiyanto, “Blackbox Testing on Virtual Reality Gamelan Saron Using Equivalence Partition Method,” J. Buana Inform., vol. 14, no. 01, pp. 11–19, Apr. 2023, doi: 10.24002/jbi.v14i01.6606.
[7] F. Wardah Gracillaria Suharyono, K. Kartini, and A. Junaidi, “PENERAPAN METODE BOUNDARY VALUE ANALYSIS DAN EQUIVALENCE PARTITIONING DALAM PENGUJIAN BLACK BOX UNTUK APLIKASI SIADITA,” JATI J. Mhs. Tek. Inform., vol. 8, no. 1, pp. 1013–1020, Mar. 2024, doi: 10.36040/jati.v8i1.8921.
[8] D. Ahrizal, M. K. Miftah, R. Kurniawan, T. Zaelani, and Y. Yulianti, “Pengujian Perangkat Lunak Sistem Informasi Peminjaman PlayStation dengan Teknik Boundary Value Analysis Menggunakan Metode Black Box Testing,” J. Inform. Univ. Pamulang, vol. 5, no. 1, p. 73, Mar. 2020, doi: 10.32493/informatika.v5i1.4338.
[9] P. A. D. A. Santi, R. Afwani, Moh. A. Albar, S. E. Anjarwani, and A. Z. Mardiansyah, “Black Box Testing with Equivalence Partitioning and Boundary Value Analysis Methods (Study Case: Academic Information System of Mataram University),” in Proceedings of the First Mandalika International Multi-Conference on Science and Engineering 2022, MIMSE 2022 (Informatics and Computer Science), Dordrecht: Atlantis Press International BV, 2022, pp. 207–219. doi: 10.2991/978-94-6463-084-8_19.
[10] M. Sholeh, I. Gisfas, Cahiman, and M. A. Fauzi, “Black Box Testing on ukmbantul.com Page with Boundary Value Analysis and Equivalence Partitioning Methods,” J. Phys. Conf. Ser., vol. 1823, no. 1, p. 012029, Mar. 2021, doi: 10.1088/1742-6596/1823/1/012029.
[11] F. K. Kartono et al., “Pengujian Black Box Testing Pada Sistem Website Osha Snack: Pendekatan Teknik Boundary Value Analysis,” J. KRIDATAMA SAINS DAN Teknol., vol. 6, no. 02, pp. 754–766, Dec. 2024, doi: 10.53863/kst.v6i02.1407.
[12] B. Hardika et al., “Pengujian Blackbox Testing Website Garuda Farm Menggunakan Teknik Equivalence Partitioning,” J. KRIDATAMA SAINS DAN Teknol., vol. 6, no. 02, pp. 740–753, Dec. 2024, doi: 10.53863/kst.v6i02.1420.
[13] A. Amrulloh, A. D. Septiadi, M. Septiara, and P. A. Wicaksono, “Black Box Testing Using the Equivalence Partitions Technique to Test the Functionality of the Ternaku.id Website,” J. Multimed. Trend Technol., vol. 2, no. 3, pp. 171–178, Dec. 2023, doi: 10.35671/jmtt.v2i3.43.
[14] Y. Nam and S. Choi, “Analysis of Vulnerabilities in College Web-Based System,” Electronics, vol. 13, no. 12, p. 2261, June 2024, doi: 10.3390/electronics13122261.
[15] I. Indrianto and E. Edwar, “Vulnerability Evaluation for Student Enrollment at SMKS Pandawa Bali Global Abiansemal,” Sebatik, vol. 28, no. 2, Dec. 2024, doi: 10.46984/sebatik.v28i2.2510.
[16] S. Bose and A. K. Narayanan, “Security Analysis of CMS based Websites through CMSPY,” ICRRD J., vol. 4, no. 4, pp. 162–174, 2023, doi: 10.53272/icrrd.
[17] G. Wassermann and Z. Su, “Static detection of cross-site scripting vulnerabilities,” in Proceedings of the 13th international conference on Software engineering - ICSE ’08, Leipzig, Germany: ACM Press, 2008, p. 171. doi: 10.1145/1368088.1368112.
[18] R. Verma, N. Dhanda, and V. Nagar, “Enhancing Security with In-Depth Analysis of Brute-Force Attack on Secure Hashing Algorithms,” in Proceedings of Trends in Electronics and Health Informatics, vol. 376, M. S. Kaiser, A. Bandyopadhyay, K. Ray, R. Singh, and V. Nagar, Eds., in Lecture Notes in Networks and Systems, vol. 376. , Singapore: Springer Nature Singapore, 2022, pp. 513–522. doi: 10.1007/978-981-16-8826-3_44.
[19] G. Wijaya, H. Winata, S. Aji, and M. N. Faiz, “Website Security Analysis Using Vulnerability Assessment Method (Case Study: Universitas Internasional Batam),” vol. 6, no. 2, 2024.
[20] X. Guo, H. Okamura, and T. Dohi, “Optimal test case generation for boundary value analysis,” Softw. Qual. J., vol. 32, no. 2, pp. 543–566, June 2024, doi: 10.1007/s11219-023-09659-9.
[21] P. Huriati, H. Azmi, Y. Wati, D. Meidelfi, and T. Lestari, “Black box testing on the online quiz application using the Equivalence Partitions method,” Int. J. Adv. Sci. Comput. Eng., vol. 2, no. 2, pp. 51–56, Aug. 2020, doi: 10.62527/ijasce.2.2.48.
[22] M. Nasir et al., “Implementasi Equivalence Partitioning Testing Pada Fitur Booking dan Jadwal Website Praktik Gigi Mandiri drg. Susilawati (https://frontend-webklinik.vercel.app/),” STRING Satuan Tulisan Ris. Dan Inov. Teknol., vol. 9, no. 3, p. 371, Apr. 2025, doi: 10.30998/string.v9i3.26570.
[23] C. Vikasari, “Pengujian Sistem Informasi Magang Industri dengan Metode Blackbox Testing Boundary Value Analysis,” Syntax J. Inform., vol. 7, no. 1, pp. 44–51, June 2018, doi: 10.35706/syji.v7i1.1291.
[24] S. J. Putri, D. G. P. Putri, and W. H. N. Putra, “Analisis Komparasi pada Teknik Black Box Testing (Studi Kasus: Website Lars),” J. Internet Softw. Eng., vol. 5, no. 1, pp. 23–28, May 2024, doi: 10.22146/jise.v5i1.9446.
[25] Mohd. Ehmer Khan, “Different Approaches To Black box Testing Technique For Finding Errors,” Int. J. Softw. Eng. Appl., vol. 2, no. 4, pp. 31–40, Oct. 2011, doi: 10.5121/ijsea.2011.2404.
[26] I. E. Tsalatsah, D. Pratama, A. R. Hakim, L. A. Budiman, and J. Riyanto, “Penggunaan Teknik Boundary Value Analysis untuk Pengujian Aplikasi Stok Barang,” J. Teknol. Sist. Inf. Dan Apl., vol. 5, no. 1, p. 14, Jan. 2022, doi: 10.32493/jtsi.v5i1.14987.
Published
2025-12-04
How to Cite
Putri, A. T., Husnaya, A. A., Dzaky Fachri Hadafi, Abdulmalik, H. I., Muhammad Nasir, & Indriasari, S. (2025). Implementation of Equivalence Partitioning and Boundary Value Analysis in Black Box Testing A Case Study on the Admin Website of PAUD KB Al Husna. JURNAL TEKNOLOGI DAN OPEN SOURCE, 8(2), 776 - 787. https://doi.org/10.36378/jtos.v8i2.5028
Abstract viewed = 8 times
PDF downloaded = 14 times