請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/37124
標題: | 考慮智慧型攻擊者權限提升及經驗累積下網路強韌性之最大化 Maximization of Network Robustness Considering the Effect of Escalation and Accumulated Experience of Intelligent Attackers |
作者: | Huan-Ting Chen 陳奐廷 |
指導教授: | 林永松 |
關鍵字: | 網路攻防,存活度,多核心節點,權限提升,累積經驗,模擬退火法,最佳化, Network Attack and Defense,Survivability,Multiple Core Nodes,Escalation,Accumulated Experience,Simulated Annealing,Optimization, |
出版年 : | 2008 |
學位: | 碩士 |
摘要: | 網路的日益普及,帶來了日常生活上的便利,卻也伴隨而來更多的網路犯罪,因此網路安全及其強韌性之衡量已逐漸受到重視;對網路營運者而言,如何能有效的評估攻擊者行為及威脅也已日趨重要。
在本篇論文中,我們提出一個兩階的數學規劃模型來描繪網路攻防情境以及攻擊者行為;其中內層問題,我們探討攻擊者欲利用最小攻擊成本來攻克網路上多個核心節點,而在其攻擊過程中,會不斷的累積攻擊經驗,使未來的攻擊成本有效的降低;此外,在攻擊者攻克某一節點後,亦可在此節點上進行權限提昇,如此攻擊者便可擁有足夠的權限來探測更多此節點上所擁有的資訊;在此,亦衡量這些資訊可能會對網路所造成的影響,亦即,攻擊者在攻克多個核心節點時,會同時讓這些資訊所造成的影響,達到一定程度的傷害;而在外層問題中,目標網路的管理者則能有效配置其有限防禦資源,使攻擊者需花費的攻擊成本最大化。為了求得此問題的最佳解,我們採用以模擬退火法為基礎的演算法來處理此問題,並設計出多種不同的初始解以及尋找鄰近解的方法,藉此獲得近似最佳解。 Internet has become much more important and worldwide, but it gives cyber criminals opportunities to crash a network system and conduct other cyber-crimes. Therefore, the issues of network security and robustness have come into notice. It is necessary for a network operator to understand the attacker behavior in order to efficiently allocate his limited budget. In this thesis, we propose a two-level mathematical programming model to describe the network attack and defense scenario. In the inner problem, an attacker’s objective is to compromise multiple core nodes using the minimum total attack cost. During the attack actions, the attacker may gain some experience from previous attacks to further reduce the attack costs in the future. Moreover, he can also pay extra fee to escalate on a compromised node to get higher user privileges, so that he will have higher authority to access more information on the node. We also measure the impact incurred by such information leakage in our model. As a result, the attacker will try to compromise multiple core nodes and collect valuable information, so that the total impact incurred by information leakage will exceed a threshold. Meanwhile, in the outer problem, the network operator of the target network allocates limited defense resources appropriately to maximize the total attack cost of the attacker. We adopt some Simulated Annealing-based algorithms to solve the problem and develop some initial solutions and several kinds of methods for searching neighbor solutions. |
URI: | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/37124 |
全文授權: | 有償授權 |
顯示於系所單位: | 資訊管理學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-97-1.pdf 目前未授權公開取用 | 949.05 kB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。