ANALISIS VULNERABILITAS BERBASIS GRAF SERANGAN TERHADAP KEAMANAN E-VOTING

Authors

  • Teguh Nurhadi Suharsono Program Studi S1 Teknik Informatika Universitas Sangga Buana YPKP

DOI:

https://doi.org/10.32897/infotronik.2016.1.1.3

Abstract

Dengan semakin banyak dan luasnya persebaran pemilih, semakin kompleksnya aspek kehidupan sosial, dan kebutuhan untuk mengelola proses pemungutan suara dengan efisien dan penetapan hasil dengan lebih cepat, pemungutan suara berbasis elektronik (e-voting) menjadi pilihan yang lebih menjanjikan.  Sistem e-Voting membutuhkan perhatian yang tinggi terhadap persyaratan keamanan, baik keamanan informasi maupun jaringan. Pada penelitian  ini dikembangkan framework untuk analisa keamanan e-Voting dan Algoritma untuk keamanan jaringan berbasis graf serangan.  Dalam penelitian ini juga digunakan metode untuk menghasilkan graf yang mempertimbangkan kinerja jaringan dan privilege attacker pada setiap host dan dapat dipakai sebagai alat untuk menganalisis vulnerabilitas jaringan.  Algoritma yang diusulkan untuk menghasilkan graf status, graf host dan graf vulnerabilitas. Framework untuk mengevaluasi dan meningkatkan keamanan jaringan e-Voting.

Kata Kunci: e-voting, persyaratan keamanan, framework evaluasi analisa vulnerabilitas,  graf serangan, algoritma graf serangan


References

M Bellis. (2015, Desember) The History of Voting Machines - History of the Voting. [Online]. http://inventors.about.com/library/weekly/aa111300b.htm

VoteHere Inc, Network Voting Systems Standards.: Public Draft 2, April 2002.

O Centinkaya and D Cetinkaya, "Verification and Validation Issues in Electronic Voting," The Electronic Journal of e-Government, vol. 5 (2), pp. 117 - 126, 2007.

A Riera and P Brown , "Bringing Confidence to Electronic Voting," Electronic Journal of e-Government, vol. 1 (1), pp. 14-21, 2003.

B de Vuyst and A Fairchild, "Experimenting with Electronic Voting Registration: the Case of Belgium," The Electronic Journal of e-Government, vol. 2 (2), pp. 87-90, 2005.

D Gritzalis, Secure Electronic Voting; New Trends New Threats.. Athens: Dept. of Informatics Athens University of Economics & Business and Data Protection Commission of Greece., 2002.

L Hayden, IT Security Metrics. New York: The McGraw-Hill Companies, 2010.

S.M. Furnell, S. Katsikas, J. Lopez, and A. Patel, Securing Information and Communications Systems: Principles, Technologies, and Applications.: Artech House, Inc., 2008.

T.W. Purboyo, Pengembangan Metrik Keamanan Berbasis Graf., 2016.

A Fujioka, T Okamoto, and K Ohta, "A Practical Secret Voting Scheme," Advances in Cryptology - AUSCRYPT ’92, 1992.

L. F. Cranor and R. K. Cytron, "Sensus: A Security-Conscious Electronic," in Proceedings of the Hawai`i International Conference on System Sciences, 1997.

P Salini and S Kanmani, "Application of Model Oriented Security Requirements Engineering Framework for secure E-Voting," in 2012 CSI Sixth International Conference on Software Engineering (CONSEG), 2012, pp. 1–6.

Z. Y. Wu, J.-C. Wu, S.-C. Lin, and C Wang, "An electronic voting mechanism for fighting bribery and coercion," J. Netw. Comput. Appl, vol. 40, pp. 139–150, April 2014.

S. A. Adeshina and A. Ojo, "Design imperatives for e-voting as a sociotechnical system," 2014 11th International Conference on Electronics, Computer and Computation (ICECCO), pp. 1–4, 2014.

Ahmed, M. S., Al-Shaer, E., Khan, E., "A novel quantitative approach for measuring network security.," in Proceedings of IEEE INFO COM 2008., 2008.

Nwokedi C. Idika, "Characterizing and Aggregating Attack Graph-Based Security Metrics," Purdue University, West Lafayette, Indiana, PhD Dissertation 2010.

Valentina Viduto , "A Risk Assessment and Optimisation Model for Minimising Network Security Risk and Cost," Bedfordshire: University of Bedfordshire, 2012.

Kenneth H. Rosen, Discrete Mathematics and Its Applications, Seventh Edition ed.: The McGraw-Hill Companies, Inc, 2012.

Ravindra K. Ahuja, Thomas L. Magnanti, and James B. Orlin, Network Flows Theory, Algorithms, and Applications. New Jersey: PRENTICE HALL, 1993.

I. N. Bronshtein, K. A. Semendyayev, G. Musiol, and H. Muehlig, Handbook of Mathematics, 5th ed. Verlag Berlin Heidelberg: Springer, 2007.

Oleg Sheyner, Joshua Haines, Somesh Jha, Richard Lippmann, and Jeannette M. Wing, "Automated Generation and Analysis of Attack Graphs," in IEEE Symposium on Security and Privacy, 2002.

P. Ammann, D. Wijesekera, and S. Kaushik, "Scalable, graph-based network vulnerability analysis," in 9th ACM conference on Computer and communications security, 2002, pp. 217–224.

Yiuan Zhao, Zulin Wang, Xudong Zhang, and Jing Zheng, "An Improved Algorithm for Generation of Attack Graph Based on Virtual Performance Node," in International Conference on Multimedia Information Networking and Security, Beijing: Beijing University of Aeronautics and Astronautics, 2009.

Published

2017-11-14