Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 管理學院
  3. 資訊管理學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/31960
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor林永松
dc.contributor.authorYi-Luen Linen
dc.contributor.author林義倫zh_TW
dc.date.accessioned2021-06-13T03:25:59Z-
dc.date.available2007-07-31
dc.date.copyright2006-07-31
dc.date.issued2006
dc.date.submitted2006-07-29
dc.identifier.citation[1] http://www.cert.org/stats/cert_stats.html
[2] Simon Hansman, Ray Hunt, “A Taxonomy of Network and Computer Attacks,” Computers and Security, Elsevier, U.K., Vol 24, No 1, 2005, pp31-43.
[3] Michael Faloutsos, Petros Faloutsos , and Christos Faloutsos , “On Power-Law Relationships of the Internet Topology,” Computer Communications Review 29, pp. 251-263, 1999.
[4] Westmark V. R, “A Definition for Information System Survivability,” in Proceedings of the 37th Hawaii Internal Conference on System Sciences (HICSS'04), Track 9, 2004.
[5] Ellison, R. J., R. C. Linger, T. Longstaff, N. R. Mead, “A Case Study in Survivable Network System Analysis,” SEI, Sep 1998.
[6] U.S. Department of Commerce, National Telecommunications and Information Administration, Institute for Telecommunications Services, Federal Standard 1037C.
[7] Nicol, DM; Sanders, WH; Trivedi, KS, “Model-Based Evaluation: from Dependability to Security”, Dependable and Secure Computing, IEEE Transactions on Volume 1, Issue 1, Jan 2004.
[8] J. C. Knight and K. J. Sullivan, “On the definition of survivability,” Technical Report CS-TR-33-00, University of Virginia, Department of Computer Science, 2000.
[9] D. Y. Chen, S. Garg, and K. S. Trivedi, “Network Survivability Performance Evaluation: A Quantitative Approach with Applications in Wireless Ad-hoc Networks,” MSWiM’02, page 61-68, September 28, 2002.
[10] Molisz, W., “Survivability Function - a Measure of Disaster-Based Routing Performance,” Selected Areas in Communications, IEEE Journal on Volume 22, Issue 9, Nov. 2004 pp. 1876 – 1883.
[11] J.C. Knight, K. Sullivan, M.C. Elder, and C. Wang, “Survivability Architectures: Issues and Approaches,” in Proceedings of the DARPA Information Survivability Conference and Exposition, pages 157–171, Los Alamitos, California, January 2000. IEEE Computer Society Press.
[12] Erdos, P. & Renyi A., “On the evolution of random graphs,” Publ. Math. Inst. Sci. 5, pp. 17-60, 1960.
[13] Albert-Laszlo Barabasi and E. Bonabeau, “Scale-Free Networks,” Scientific American 288, 60-69 (2003).
[14] Duncan J. Watts and Steven H. Strogatz, “Collective Dynamics of ‘Small-World’ Networks,” Nature 393, pp. 440-442, 1998.
[15] Reka Albert, Hawoong Jeong, and Albert-Laszlo Barabasi, “Diamater of the World Wide Web,” Nature 401, pp. 130-131, 1999.
[16] Reka Albert, Hawoong Jeong, and Albert-Laszlo Barabasi, “Error and Attack Tolerance of Complex Networks,” Nature 406, pp. 378-381, 2000.
[17] M. L. Fisher, “The Lagrangean Relaxation Method for Solving Integer Programming Problems,” Management Science, Volume 27, Number 1, pp. 1-18, January 1981.
[18] M. L. Fisher, “An Application Oriented Guide to Lagrangean Relaxation,” Interfaces, Volume 15, Number 2, pp. 10-21, April 1985.
[19] A. M. Geoffrion, “Lagrangean Relaxation and its Use in Integer Programming,” Mathematical Programming Study, Volume 2, pp. 82-114, 1974.
[20] M.S. Bazaraa, H.D. Sherali, and C.M. Shetty, “Lagrangian Duality and Saddle Point Optimality Conditions,” Nonlinear Programming: Theory and Algorithms, 2nd Edition, pp. 199-242, John Wiley & Sons, Inc, Singapore, 1993.
[21] M. Held, et al., “Validation of subgradient optimization,” Math. Programming, vol. 6, pp. 62-88, 1974.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/31960-
dc.description.abstract隨著近年來網路科技的蓬勃發展,網際網路已成為21世紀最重要的傳播媒體,伴隨而來,資訊安全的議題也越形重要。我們發現,在網路攻防下,攻防雙方都會依據對方的策略而改變自己的對策,就如矛與盾一般地相互抗衡。
在本篇論文中,我們以防守方的角度來思考,在有限的防禦資源限制下,提出一個有效的防禦資源配置策略,來最大化攻擊者的攻擊成本,以提高核心節點的防護能力。分析此問題,為一非線性混合整數規劃的數學最佳化問題,由於問題本身高度的複雜性與困難度,所以我們以格拉蘭日鬆弛法為基礎的演算法來處理此問題,並針對與真實網路環境相似之無尺度網路,進行其存活度分析與探討。
zh_TW
dc.description.abstractWith the rapid growth of network technologies, the Internet may well become the single most important medium of the 21st century. Therefore, the issue of information security has drawn increasing attention. In network attack and defense, attackers and defenders constantly change their respective strategies. The situation is like the balance between a lance and a targe.
In this thesis, we view the problem of security from the defender’s perspective. Given that defense resources are limited, we propose an effective defense resource allocation strategy that maximizes the attackers’ costs, and improves the protection of the core node. The problem is analyzed as a mixed nonlinear integer programming optimization problem. The solution approach is based on the Lagrangean relaxation method, which effectively solves this complicated problem. Furthermore, we evaluate the survivability of real network environment-like scale-free networks.
en
dc.description.provenanceMade available in DSpace on 2021-06-13T03:25:59Z (GMT). No. of bitstreams: 1
ntu-95-R93725041-1.pdf: 1144863 bytes, checksum: eccd1d07f23f545920ad9ea0f386033f (MD5)
Previous issue date: 2006
en
dc.description.tableofcontents謝 詞.......................................................................................................................I
論文摘要....................................................................................................................III
THESIS ABSTRACT.................................................................................................V
Contents....................................................................................................................VII
List of Figures............................................................................................................IX
List of Tables..............................................................................................................XI
Chapter 1 Introduction................................................................................................1
1.1 Background......................................................................................................1
1.2 Motivation........................................................................................................3
1.3 Literature Survey.............................................................................................4
1.3.1 Survivability..........................................................................................4
1.3.2 Scale-Free Networks.............................................................................7
1.4 Proposed Approach..........................................................................................9
Chapter 2 Problem Formulation..............................................................................11
2.1 Protection Strategy for Defenders (PSD) Model...........................................11
2.1.1 Problem Description and Assumptions...............................................11
2.1.2 Notations.............................................................................................15
2.1.3 Problem Formulation..........................................................................16
2.1.4 Problem Reformulation.......................................................................17
2.2 Probabilistic Protection Strategy for Defenders (PPSD) Model....................18
2.2.1 Problem Description and Assumptions...............................................18
2.2.2 Notations.............................................................................................21
2.2.3 Problem Formulation..........................................................................22
2.2.4 Problem Reformulation.......................................................................23
Chapter 3 Solution Approach...................................................................................25
3.1 Lagrangean Relaxation Method.....................................................................25
3.2 PSD Model.....................................................................................................28
3.2.1 Solution Approach..............................................................................28
3.2.2 Lagrangean Relaxation.......................................................................28
3.2.3 The Dual Problem and the Subgradient Method.................................31
3.2.4 Getting Primal Feasible Solution........................................................32
3.3 PPSD Model...................................................................................................34
3.3.1 Solution Approach..............................................................................34
3.3.2 Lagrangean Relaxation.......................................................................34
3.3.3 The Dual Problem and the Subgradient Method.................................37
3.3.4 Getting Primal Feasible Solution........................................................38
Chapter 4 Computational Experiments...................................................................41
4.1 Computational Experiments on the PSD Model............................................41
4.1.1 Experiment Environments..................................................................41
4.1.2 Experiment Results.............................................................................42
4.2 Computational Experiments on the PPSD Model..........................................46
4.2.1 Experiment Environments..................................................................46
4.2.2 Experiment Results.............................................................................48
Chapter 5 Conclusion................................................................................................63
5-1 Summary........................................................................................................63
5-2 Future Work...................................................................................................64
References...................................................................................................................66
List of Figures
Figure 1-1 Trend of Incidents......................................................................................1
Figure 1-2 Attack Tree Example.................................................................................5
Figure 1-3 Random Network Example......................................................................7
Figure 1-4 Scale-Free Network Example...................................................................9
Figure 2-1 Network Attack and Defense Behavior.................................................12
Figure 3-1 Illustration of the Lagrangean Relaxation Method.............................27
Figure 3-2 Procedures of the Lagrangean Relaxation Method..............................28
Figure 4-1 Experiment Results for Grid Networks.................................................43
Figure 4-2 Survivability of Scale-Free Networks....................................................43
Figure 4-3 Experiment Results for Different Network Topologies........................44
Figure 4-4 Average Number of Nodes Must be Compromised Distribution........44
Figure 4-5 Experiment Results for the PPSD Model Scenario 1 in Grid Networks (λ1=0.1, λ2=0.2)............................................................................................................48
Figure 4-6 Survivability of the PPSD Model Scenario 1 in Random Networks (λ1=0.1, λ2=0.2)............................................................................................................48
Figure 4-7 Experiment Results for the PPSD Model Scenario 1 in Different Network Topologies (λ1=0.1, λ2=0.2).........................................................................49
Figure 4-8 Experiment Results for the PPSD Model Scenario 1 in Different Network Topologies (λ1=0.1, λ2=0.4).........................................................................50
Figure 4-9 Experiment Results for the PPSD Model Scenario 1 in Different Network Topologies (λ1=0.2, λ2=0.4).........................................................................50
Figure 4-10 Experiment Results for the PPSD Model Scenario 1 in Different Network Topologies (λ1=0.2, λ2=0.8).........................................................................51
Figure 4-11 Experiment Results for the PPSD Model Scenario 2 in Scale-Free Networks.....................................................................................................................52
Figure 4-12 Survivability of the PPSD Model Scenario 2 in Random Networks.52
Figure 4-13 Experiment Results for the PPSD Model Scenario 2 in Different Network Topologies....................................................................................................52
Figure 5-1 Choke Point Example..............................................................................65
List of Tables
Table 2-1 Problem Description of the PSD Model..................................................13
Table 2-2 Problem Assumptions of the PSD Model................................................14
Table 2-3 Problem Description of the PPSD Model................................................19
Table 2-4 Problem Assumptions of the PPSD Model..............................................20
Table 3-1 Heuristic for the PSD Model....................................................................33
Table 3-2 Heuristic for the PPSD Model..................................................................39
Table 4-1 Experimental Parameter Settings for the PSD Model...........................42
Table 4-2 Experiment Results for the PSD Model..................................................45
Table 4-3 Experimental Parameter Settings for the PPSD Model........................47
Table 4-4 Experiment Results for the PPSD Model Scenario 1 (λ1=0.1, λ2=0.2)...53
Table 4-5 Experiment Results for the PPSD Model Scenario 1 (λ1=0.1, λ2=0.3)...54
Table 4-6 Experiment Results for the PPSD Model Scenario 1 (λ1=0.1, λ2=0.4)...55
Table 4-7 Experiment Results for the PPSD Model Scenario 1 (λ1=0.2, λ2=0.4)..56
Table 4-8 Experiment Results for the PPSD Model Scenario 1 (λ1=0.2, λ2=0.6)..57
Table 4-9 Experiment Results for the PPSD Model Scenario 1 (λ1=0.2, λ2=0.8)..58
Table 4-10 Experiment Results for the PPSD Model Scenario 1 (λ1=0.3, λ2=0.5)59
Table 4-11 Experiment Results for the PPSD Model Scenario 1 (λ1=0.3, λ2=0.7)60
Table 4-12 Experiment Results for the PPSD Model Scenario 1 (λ1=0.3, λ2=0.9)61
Table 4-13 Experiment Results for the PPSD Model Scenario 2...........................62
dc.language.isoen
dc.subject無尺度網路zh_TW
dc.subject防禦資源配置策略zh_TW
dc.subject資訊安全zh_TW
dc.subject網路攻防zh_TW
dc.subject存活度zh_TW
dc.subject拉格蘭日鬆弛法zh_TW
dc.subject最佳化zh_TW
dc.subjectOptimizationen
dc.subjectScale-Free Networksen
dc.subjectNetwork Attack and Defenseen
dc.subjectInformation Securityen
dc.subjectDefense Resource Allocation Strategyen
dc.subjectSurvivabilityen
dc.subjectLagrangean Relaxation Methoden
dc.title考慮單一核心節點攻擊下
網路近似最佳化防護策略
zh_TW
dc.titleNear Optimal Protection Strategies
against Targeted Attacks
on the Core Node of a Network
en
dc.typeThesis
dc.date.schoolyear94-2
dc.description.degree碩士
dc.contributor.oralexamcommittee孫雅麗,林盈達,趙啟超,呂俊賢
dc.subject.keyword防禦資源配置策略,資訊安全,網路攻防,存活度,拉格蘭日鬆弛法,最佳化,無尺度網路,zh_TW
dc.subject.keywordDefense Resource Allocation Strategy,Information Security,Lagrangean Relaxation Method,Network Attack and Defense,Optimization,Scale-Free Networks,Survivability,en
dc.relation.page69
dc.rights.note有償授權
dc.date.accepted2006-07-29
dc.contributor.author-college管理學院zh_TW
dc.contributor.author-dept資訊管理學研究所zh_TW
顯示於系所單位:資訊管理學系

文件中的檔案:
檔案 大小格式 
ntu-95-1.pdf
  未授權公開取用
1.12 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved