OPTIMIZATION ON SECURITY SYSTEM WITH GAME THEORETICAL APPROACH

A good website security system is needed to protect the information contained on the website. In the field of information technology, the existence of a bug can disrupt the security system and can be used by hacker to break-ins the website which is protected by the web master. Game theory is one of...

Full description

Saved in:
Bibliographic Details
Main Author: TSAKILA (NIM: 10114075), FAIRUS
Format: Final Project
Language:Indonesia
Online Access:https://digilib.itb.ac.id/gdl/view/27085
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Institut Teknologi Bandung
Language: Indonesia
id id-itb.:27085
spelling id-itb.:270852018-06-05T13:55:07ZOPTIMIZATION ON SECURITY SYSTEM WITH GAME THEORETICAL APPROACH TSAKILA (NIM: 10114075), FAIRUS Indonesia Final Project INSTITUT TEKNOLOGI BANDUNG https://digilib.itb.ac.id/gdl/view/27085 A good website security system is needed to protect the information contained on the website. In the field of information technology, the existence of a bug can disrupt the security system and can be used by hacker to break-ins the website which is protected by the web master. Game theory is one of the approaches that can be used to study the interaction between two players in the case of website security system to get optimal results for each player. By using the game theory approach, mathematical results will be obtained for each player as a decision that can be confirmed through the idea of game theory. The case of website security system will be assumed to be a stackelberg security games model, which is a non-cooperative sequential game with the web master as a leader who will choose his strategy first and continued by the hacker as a follower who will choose the strategy according to the last condition of the game. Each chosen strategy will provide a payoff for each player and there will be a reward which is calculated from the expectations of each strategy selected in a game. The maximizing reward problem is considered as an optimization problem that will be solved by using mixed integer linear programming method. The results shown that the reward of each game depends on how the payoff matrix is constructed. The calculation with a non-uniform probablity assumption gives a more optimal result rather than the uniform probability assumption in each of player strategies. It is also shown that the substitution of follower type from hacker to lamer will still give an optimal result for the leader. text
institution Institut Teknologi Bandung
building Institut Teknologi Bandung Library
continent Asia
country Indonesia
Indonesia
content_provider Institut Teknologi Bandung
collection Digital ITB
language Indonesia
description A good website security system is needed to protect the information contained on the website. In the field of information technology, the existence of a bug can disrupt the security system and can be used by hacker to break-ins the website which is protected by the web master. Game theory is one of the approaches that can be used to study the interaction between two players in the case of website security system to get optimal results for each player. By using the game theory approach, mathematical results will be obtained for each player as a decision that can be confirmed through the idea of game theory. The case of website security system will be assumed to be a stackelberg security games model, which is a non-cooperative sequential game with the web master as a leader who will choose his strategy first and continued by the hacker as a follower who will choose the strategy according to the last condition of the game. Each chosen strategy will provide a payoff for each player and there will be a reward which is calculated from the expectations of each strategy selected in a game. The maximizing reward problem is considered as an optimization problem that will be solved by using mixed integer linear programming method. The results shown that the reward of each game depends on how the payoff matrix is constructed. The calculation with a non-uniform probablity assumption gives a more optimal result rather than the uniform probability assumption in each of player strategies. It is also shown that the substitution of follower type from hacker to lamer will still give an optimal result for the leader.
format Final Project
author TSAKILA (NIM: 10114075), FAIRUS
spellingShingle TSAKILA (NIM: 10114075), FAIRUS
OPTIMIZATION ON SECURITY SYSTEM WITH GAME THEORETICAL APPROACH
author_facet TSAKILA (NIM: 10114075), FAIRUS
author_sort TSAKILA (NIM: 10114075), FAIRUS
title OPTIMIZATION ON SECURITY SYSTEM WITH GAME THEORETICAL APPROACH
title_short OPTIMIZATION ON SECURITY SYSTEM WITH GAME THEORETICAL APPROACH
title_full OPTIMIZATION ON SECURITY SYSTEM WITH GAME THEORETICAL APPROACH
title_fullStr OPTIMIZATION ON SECURITY SYSTEM WITH GAME THEORETICAL APPROACH
title_full_unstemmed OPTIMIZATION ON SECURITY SYSTEM WITH GAME THEORETICAL APPROACH
title_sort optimization on security system with game theoretical approach
url https://digilib.itb.ac.id/gdl/view/27085
_version_ 1822922124061310976