Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 管理學院
  3. 資訊管理學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/29260
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor林永松
dc.contributor.authorKun-Dao Jiangen
dc.contributor.author江坤道zh_TW
dc.date.accessioned2021-06-13T01:03:31Z-
dc.date.available2008-07-27
dc.date.copyright2007-07-27
dc.date.issued2007
dc.date.submitted2007-07-23
dc.identifier.citation[1] Wojciech Molisz, “Survivability Function ─ A Measure of Disaster-Based Routing Performance,” IEEE Journal on Selected Areas in Communication, vol. 22, no. 9, November 2004
[2] Howard F. Lipson, David A. Fish, “Survivability ─ A New Technical and Business Perspective on Security,” CERT ® Coordination Center Software Engineering Institute
[3] Benjamin B.M. Shao, “Optimal Redundancy Allocation for Information Technology Disaster Recovery in the Network Economy,” IEEE Transactions on Dependable and Secure Computing, Vol. 2, No.3, July-September 2005
[4] David W. Coit, Abdullah Konak, “Multiple Weighted Objectives Heuristic for the Redundancy Allocation Problem,” IEEE Transactions on Reliability, Vol. 55, No. 3 September 2006
[5] Jose E. Ramirez-Marquez, David W. Coit, Abdullah Konak, “Redundancy Allocation for series-parallel systems using a max-min approach,” IIE Transactions (2004) 36, 891-898
[6] Yong Jiang, James D. McCalley, Tim Van Voorhis, “Risk-Based Resource Optimization for Transmission System Maintenace,” IEEE Transactions on Power Systems, Vol. 21, No. 3, August 2006
[7] Chunghun Ha, Way Kuo, “Multi-Path Heiristic for Redundancy Allocation: The Tree Heuristic,” IEEE Transactions on Reliability, Vol. 55, No. 1, March 2006
[8] Herve Kerivin, Dritan Nace, Thi-Tuyet-Loan Pham, “Design of Capacitated Survivable Network with a Single Facility,” IEEE/ACM Transactions on Networking, Vol. 13, No. 2, April 2005
[9] Young-Soo Myung, Hyun-joon Kim, Dong-wan Tcha, “Design of Communication Networks with Survivability Constraints,” Management Science, Vol. 45, No. 2 (Feb., 1999), 238-252
[10] Soumyo D. Moitra, Suresh L. Konda, “A Simulation Model for Managing Survivability of Networked Information Systems,” Technical Report CMU/SEI-2000-Tr-020 ESC-TR-2000-020
[11] Chenxi Wang, “A Security Architecture for Survivability Mechanisms,” a dissertation presented to the School of Engineering and Applied Science at the University of Virginia
[12] John Koroma, Wei Li, Demetrios Kazakos, “A Generalized Model for Network Survivability,” TAPIA’03 October 15-18, 2003, Atlanta, Georgia., USA
[13] David M. Nicol, William H. Sanders, Kishor S. Trivedi, “Model-Based Evaluation: From Dependability to Security,” IEEE Transactions on Dependable and Secure Computing, Vol.1, No. 1, January-March 2004
[14] Zeev Zeitlin, “Integer Allocation Problems of Min-Max Type with Quasiconvex Separable Functions,” Operation Research, Vol. 29, No. 1, January-February 1981
[15] John C. Knight, Elisabeth A. Strunk, Kevin J. Sullivan, “Towards a Rigorous Definition of Information System Survivability,” Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX’03)
[16] J. McDermott,” Attack-Potential-Based Survivability Modeling for High-Consequence System,” Proceedings of the Third IEEE International Workshop on Information Assurance (IWIA’05)
[17] M. S. Chern, “On The Computational Complexity of Reliability Redundancy Allocation in A Series System,” IEEE Transactions on Reliability, Vol. R-36, No. 5 pp.621-623, 1987
[18] Marshall L. Fisher, “An Applications Oriented Guide to Lagrangian Relaxation,” Interfaces, Vol. 15, No. 2, pp. 10-21, April 1985
[19] M. L. Fisher, “The Lagrangian Relaxation Method for Solving Integer Programming Problem,” Management Science, Vol. 27, No. 1, pp. 1-18, January 1981
[20] L.A. Gordon, M.P. Loeb, W. Lucyshyn, R. Richardson, “2006 CSI/FBI Computer Crime and Security Survey,” Computer Security Institute, 2006, http://GoCSI.com
[21] Fotios Harmantzis, Manu Malek, “Security Risk Analysis and Evalution,” IEEE Communication Society
[22] Ram Dantu, Kall Loper, Prakash Kolan, “Risk Management using Behavior based Attack Graphs,” Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC’04)
[23] Stefano Bistarelli, Fabio Fioravanti, Pamela Peretti, “Defense Tree for Economic Evaluation of Security Investments,” Proceedings of the First International Conference on Availability, Reliability and Security (ARES’06)
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/29260-
dc.description.abstract現代組織企業越來越倚重資訊科技來協助日常的營運作業。然而,這樣的依賴性卻是建立在危害事件發生頻繁且惡意攻擊層出不窮的環境下,任何的綱路斷線或是機器故障都會造成嚴重的經濟損失。因此,為了達到持續性服務的目標,我們提出一個植基於冗餘配置的方法,期望將潛在威脅發生的可能性降到一個可以接受的程度。
在本論文中,我們將攻防雙方的戰役模擬成一個兩階的非線性整數規劃問題。在內層問題中 (ARS模型),攻擊者透過分配有限的攻擊能量來最大化網路元件面對危害事件的脆弱度。相反地,在外層問題中 (RAPMA模型),防守者嘗試在有限的預算限制下,透過冗餘元件的適當部署來最小化攻擊者所帶來的傷害。其中,我們發展一個以拉格蘭日鬆弛法為基礎的演算法來快速地解決此數學規劃問題。
zh_TW
dc.description.abstractModern organizations have increasingly relied on information technology to facilitate daily business operations. However, the dependency is built upon an environment where hazardous events happen frequently and malicious attacks emerge in an endless stream. To attain the objective of “continuity of services”, we propose an approach based on redundancy allocation to reduce the possibility of threats occurring to an acceptable degree.
In the thesis, we formulate a “battle” between the attacker and the network into a two-level programming problem. In the inner problem (ARS model) an attacker allocates the limited attack powers to maximize the vulnerability of network against hazardous events. Contrarily, in the outer problem (RAPMA model) a defender attempts to minimize the damages by deploying redundant components appropriately with the limited budgets. We develop a Lagrangean Relaxation-based algorithm to solve the programming problem efficiently.
en
dc.description.provenanceMade available in DSpace on 2021-06-13T01:03:31Z (GMT). No. of bitstreams: 1
ntu-96-R94725018-1.pdf: 657714 bytes, checksum: 6b17a078f62298be406843e2bb8f5349 (MD5)
Previous issue date: 2007
en
dc.description.tableofcontents謝辭 i
論文摘要 ii
THESIS ABSTRACT iii
Table of Content v
List of Tables vii
List of Figures ix
Chapter 1 Introduction 1
1.1 Background 1
1.2 Motivation 3
1.3 Literature Survey 5
1.3.1 Risk Management 6
1.3.2 Survivability 7
1.3.3 Redundancy Allocation Problem 11
1.4 Proposed Approach 13
1.5 Thesis Organization 14
Chapter 2 RAPMA and ARS Model 17
2.1. Problem Description 17
2.2. Problem Formulation of RAPMA Model 21
2.3. Problem Formulation of ARS Model 32
Chapter 3 37
3.1. Solution Approach for the ARS Model 37
3.1.1 Lagrangean Relaxation Method 37
3.1.2 Lagrangean Problem of ARS Model 41
3.1.3 The Dual Problem and Subgradient Method 47
3.1.4 Getting Primal Feasible Solutions 48
3.2. Solution Approach for the RAPMA Model 51
Chapter 4 Computational Experiments 53
4.1. Experiment Environment 53
4.2. Simple Algorithms 54
4.2.1 Minimum Cost Spanning Tree Algorithm 54
4.2.2 Greedy-based Algorithm 55
4.3. Experiment Results 56
4.3.1. Experiments for ARS Model 56
4.3.2. Experiments for RAPMA Model 64
4.4. Discussion of Experiment Results 70
Chapter 5 Conclusion and Future Work 73
5.1. Conclusion 73
5.2. Future Works 75
References 77
dc.language.isoen
dc.subject網路存活度zh_TW
dc.subject冗餘配置問題zh_TW
dc.subject網路最佳化zh_TW
dc.subject數學規劃zh_TW
dc.subject資源配置zh_TW
dc.subject拉格蘭氏鬆弛法zh_TW
dc.subject網路脆弱度zh_TW
dc.subjectNetwork Vulnerabilityen
dc.subjectNetwork Survivabilityen
dc.subjectRedundancy Allocation Problemen
dc.subjectNetwork Optimizationen
dc.subjectMathematical Programmingen
dc.subjectResources Allocationen
dc.subjectLagrangean Relaxationen
dc.title考量危害事件與惡意攻擊下系統脆弱度最小化之近似最佳化冗餘配置策略zh_TW
dc.titleA Near-Optimal Redundancy Allocation Policy to Minimize System Vulnerability against Hazardous Events and Malicious Attacksen
dc.typeThesis
dc.date.schoolyear95-2
dc.description.degree碩士
dc.contributor.oralexamcommittee孫雅麗,呂俊賢,祝國忠,顏宏旭
dc.subject.keyword冗餘配置問題,網路最佳化,數學規劃,資源配置,拉格蘭氏鬆弛法,網路脆弱度,網路存活度,zh_TW
dc.subject.keywordRedundancy Allocation Problem,Network Optimization,Mathematical Programming,Resources Allocation,Lagrangean Relaxation,Network Vulnerability,Network Survivability,en
dc.relation.page80
dc.rights.note有償授權
dc.date.accepted2007-07-24
dc.contributor.author-college管理學院zh_TW
dc.contributor.author-dept資訊管理學研究所zh_TW
顯示於系所單位:資訊管理學系

文件中的檔案:
檔案 大小格式 
ntu-96-1.pdf
  未授權公開取用
642.3 kBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved