Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 管理學院
  3. 資訊管理學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/29049
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor林永松(Yeong-Sung Lin)
dc.contributor.authorYi-Tzu Chenen
dc.contributor.author陳怡孜zh_TW
dc.date.accessioned2021-06-13T00:37:00Z-
dc.date.available2009-02-11
dc.date.copyright2007-07-30
dc.date.issued2007
dc.date.submitted2007-07-26
dc.identifier.citation[1]S. P. Gorman, L. Schintler, R. Kulkarni, and R. Stough, “The Revenge of Distance: Vulnerability Analysis of Critical Information Infrastructure”, Journal of Contingencies and Crisis Management, Volume 12, Number 2, pp. 48-63, June 2004.
[2]B. Blakley, “The Emperor’s Old Armor”, Proceedings of the 1996 New Security Paradigms Workshop, Lake Arrowhead, California, September 17-20, 1996, Association for Computing Machinery, 1997.
[3]H. F. Lipson and D. A. Fisher, “Survivability – A New Technical and Business Perspective on Security”, Proceedings of the 1999 ACM Workshop on New Security Paradigms, pp. 33-39, September 1999.
[4]R. J. Ellison, D. A. Fisher, R. C. Linger, H. F. Lipson, T. A. Longstaff, and N. R. Mead, “Survivable Network Systems: An Emerging Discipline”, Technical Report CMU/SEI-97-TR-013, Software Engineering Institute, Carnegie Mellon University, November 1997 (Revised: May 1999).
[5]J. C. Knight, K. J. Sullivan, M. C. Elder, and C. Wang, “Survivability Architectures: Issues and Approaches”, Proceedings of the DARPA Information Survivability Conference and Exposition, Volume 2, pp.157-171, January 2000.
[6]J. C. Knight and K. J. Sullivan, “On the Definition of Survivability”, Technical Report CS-TR-33-00, Department of Computer Science, University of Virginia, December 2000.
[7]J. C. Knight, E. A. Strunk, and K. J. Sullivan, “Towards a Rigorous Definition of Information System Survivability”, Proceedings of the DARPA Information Survivability Conference and Exposition, Volume 1, pp.78-89, April 2003.
[8]Y. Liu and K. S. Trivedi, “A General Framework for Network Survivability Quantification”, Proceedings of the 12th GI/ITG Conference on Measuring, Modeling and Evaluation of Computer and Communication Systems, September 2004.
[9]Y. Liu, V.B. Mendiratta, and K.S. Trivedi, “Survivability Analysis of Telephone Access Network”, Proceedings of the 15th IEEE International Symposium for Software Reliability Engineering, pp.367-378, November 2004.
[10]Report spells out global attack patterns: More zero-days and phishing, but less critical flaws Computer Fraud & Security, Volume 2007, Number 4, pp. 3-4, April 2007.
[11]http://www.windowsnetworking.com/articles_tutorials/Trust-Relationships-Windows-Server-2003-Environment.html
[12]http://technet.microsoft.com/en-us/windowsserver/default.aspx
[13]E.Jonsson and T. Olovsson, “A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior”, IEEE Transactions of Software Engineering, Volume 23, Number 4, pp. 235-245, April 1997.
[14]R. Ortalo, Y. Deswarte, and M. Kaˆaniche, “Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security”, IEEE Transactions on Software Engineering, Volume 25, Number 5, pp. 633-650, September 1999.
[15]J. McDermott, “Attack-Potential-Based Survivability Modeling for High-Consequence Systems”, Proceedings of the 3rd IEEE International Workshop on Information Assurance, pp. 119-130, March 2005.
[16]C.H. Chen, Y.L. Lin, F.Y.S. Lin, P.H. Tsang, C.L. Tseng and H.H. Yen, “Evaluation of Network Robustness for Given Defense Resource Allocation Strategies, Proceedings of IEEE ARES’06, 2006
[17]G. B. Dantzig, R. Fulkerson, and S. M. Johnson, “Solution of a Large-scale Traveling Salesman Problem”, Operations Research 2, pp.393-410, 1954.
[18]E. L. Lawler and Jan Karel Lenstra and A. H. G. Rinnooy Khan and D. B. Shmoys, “The Traveling Salesman Problem: A Guided Tour of Combinatorial Optimization”, John Wiley & Sons, Inc. ISBN 0-471-90413-9, 1985.
[19]G. Gutin and A. P. Punnen, “The Traveling Salesman Problem and Its Variations”, Springer, ISBN 0-387-44459-9, 2006.
[20]M. R. Garey and D. S. Johnson, “Computers and Intractability: A Guide to the Theory of NP-Completeness”, W.H. Freeman, ISBN 0-7167-1045-5, 1979.
[21]Charles E. Noon. and James C. Bean, “A Lagrangian Based Approach for the Asymmetric Generalized Traveling Salesman Problem”, Operations Research, Volume 39, Number 4, pp. 623-632, 1991.
[22]J. Choi, M. J. Realff_and J. H. Lee, “An Algorithmic Framework for Improving Heuristic Solutions Part I: A Deterministic Discount Coupon Traveling Salesman Problem”, Computers & Chemical Engineering, Volume 28, Number 8, pp. 1285-1296, 2004.
[23]R.K. Ahuja, T.L. MAgnagti and J.B.Orlin, “Network Flows”, Prentice Hall, Englewood Cliffs, ISBN 978-0136175490, 1993.
[24]V. Batagelj, F.J. Brandenburg, P.O.D. Mendez, and A. Sen, “The Generalized Shortest Path Problem”, The Pennsylvania State University CiteSeer Archives, July 2000.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/29049-
dc.description.abstract在九零年代開始,網際網路逐漸演變成全球共通的溝通媒介,許多恐怖份子開始利用其攻擊政府及國家,此一行為嚴重危害國家安全。是故,資訊安全逐漸演變成重要的議題。因此對網路營運者而言,如何有效評估網路攻擊者的威脅,達到提升網路存活度的問題已愈趨重要。
因此,本研究利用數學規劃及圖形理論為工具,建構網路攻防情境的資源分配問題,分別提出AEA(Accumulated Experiences of Attacker)與AAEA(Advanced Accumulated Experiences of Attacker)。於AEA模型中,先轉化存在旅行推銷員問題中,於不同城鎮間購買折扣券以降低旅行成本的概念,茲代表網路在攻擊者利用自身經驗及攻克節點成功時所獲得的經驗,以影響未來攻擊成本之情境,即:所有節點一經攻克後,所獲得之經驗將有效地降低後續發生的攻擊成本,並考慮攻擊者以一節點為入口進入目標網路之後,在經驗值影響下尋求一條最短路徑,俾便攻克網路中的一個目標節點,使目標網路無法存活,且利用圖形理論將問題轉化,運用一般化最短路徑演算法求解之;在AAEA模型中,考慮相同的攻擊者問題下,更考量攻擊者可在節點上花費不同等級之額外成本,以獲取對攻擊其餘網路節點不同等級的資訊(如:使用者權限或是網路拓撲圖…等),達到有效地降低後續攻擊成本,由於此問題藉由圖形理論的轉化,也將AAEA模型利用一般化最短路徑演算法求解之。
zh_TW
dc.description.abstractInternet has become worldwide, publicly accessible network of interconnected computer networks since 1980s. Specifically, it becomes the tools that terrorists can use to attack the nations and their economy. Thus, any network operator could improve the network’s survivability by effectively evaluating the attacker behavior.
As a result, this thesis focuses on the resource allocation of network attack and defense with mathematical programming and graph modeling to optimize the problems, and adopts a concept, discount coupon which is applied in TSP, to represent the attacker behavior of taking advantage of accumulated experiences from his previous attack actions of minimizing the total attack cost. In AEA, the attacker somehow gains some free experiences from a compromised node which could further reduce the cost of an attack. The attacker’s objective is to minimize the total attack cost, while the core node is compromised and the network could not survive. Here, by transforming AEA with node splitting into a generalized shortest path problem and applying the algorithm to optimally solve it. In AAEA, the attacker not only gains some free experiences from a compromised node but could spend different levels of extra expenses, probing fee, gaining different levels of valuable experiences, such as diverse user’s rights or a network topology. Therefore, AAEA is proposed to describe such behavior which is also analyzed as a mixed nonlinear integer programming optimization problem. With node splitting technique, AAEA is transformed into a shortest path problem and is optimally solved by generalized shortest path algorithm.
en
dc.description.provenanceMade available in DSpace on 2021-06-13T00:37:00Z (GMT). No. of bitstreams: 1
ntu-96-R94725054-1.pdf: 590421 bytes, checksum: 2677814022382e9975c242a2c1a95498 (MD5)
Previous issue date: 2007
en
dc.description.tableofcontents論文口試委員審定書 I
謝誌 II
論文摘要 III
THESIS ABSTRACT IV
Table of Contents VI
List of Figures VIII
Chapter 1 Introduction 1
1.1 Background 1
1.2 Motivation 3
1.3 Literature Review 6
1.3.1 Survivability of Quantitative Analysis with Attacker Behavior 6
1.3.2 Traveling Salesman Problem 9
1.4 Proposed Approach 11
1.5 Thesis Organization 12
Chapter 2 Graph Modeling of AEA and AAEA Models 13
2.1 Problem Description and Graph Modeling of AEA 13
2.1.2 Graph Modeling of AEA 14
2.2 Problem Description and Graph Modeling of AAEA 18
2.2.1 Problem Description of AAEA 18
2.2.2 Graph Modeling of AAEA 18
Chapter 3 Problem Formulation 21
3.1 Problem Formulation of AEA 21
3.1.1 Problem Assumptions 21
3.1.2 Notation and Formulation 23
3.2 Problem Formulation of AAEA 26
3.2.1 Problem Assumptions 26
3.2.2 Notation 27
Chapter 4 Solution Approach 30
4.1 Generalized Shortest Path Problem 31
4.2 Solution Approach to AEA 32
4.3 Solution Approach to AAEA 33
Chapter 5 Conclusion and Future Work 34
5.1 Conclusion 34
5.2 Future Work 35
Reference 42
簡歷 46
dc.language.isoen
dc.subject存活度zh_TW
dc.subject網路攻防zh_TW
dc.subject資訊安全zh_TW
dc.subject最佳化zh_TW
dc.subject節點分裂法zh_TW
dc.subject一般化最短路徑zh_TW
dc.subject圖形理論zh_TW
dc.subject經驗折扣zh_TW
dc.subject旅行推銷員問題zh_TW
dc.subject資源分配zh_TW
dc.subjectNetwork Attack and Defenseen
dc.subjectOptimizationen
dc.subjectGeneralized Shortest Path Problemen
dc.subjectNode Splittingen
dc.subjectGraph Modelingen
dc.subjectDiscount Couponen
dc.subjectTraveling Salesman problem (TSP)en
dc.subjectResource Allocationen
dc.subjectSurvivabilityen
dc.subjectInternet Securityen
dc.title考慮攻擊者學習效應下之網路存活度衡量zh_TW
dc.titleAn Evaluation of Network Survivability under the Effect of Discounted Defense Levels by Accumulated Experiences of Attackersen
dc.typeThesis
dc.date.schoolyear95-2
dc.description.degree碩士
dc.contributor.oralexamcommittee孫雅麗(Yea-li Sun),呂俊賢(Chun-Shien Lu),祝國忠(Kuo-Chung Chu),顏宏旭(Hong-Hsu Yen)
dc.subject.keyword資訊安全,網路攻防,存活度,資源分配,旅行推銷員問題,經驗折扣,圖形理論,節點分裂法,一般化最短路徑,最佳化,zh_TW
dc.subject.keywordInternet Security,Network Attack and Defense,Survivability,Resource Allocation,Traveling Salesman problem (TSP),Discount Coupon,Graph Modeling,Node Splitting,Generalized Shortest Path Problem,Optimization,en
dc.relation.page45
dc.rights.note有償授權
dc.date.accepted2007-07-26
dc.contributor.author-college管理學院zh_TW
dc.contributor.author-dept資訊管理學研究所zh_TW
顯示於系所單位:資訊管理學系

文件中的檔案:
檔案 大小格式 
ntu-96-1.pdf
  未授權公開取用
576.58 kBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved