請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/40971完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 林永松 | |
| dc.contributor.author | "Chih-Hao, Su" | en |
| dc.contributor.author | 蘇至浩 | zh_TW |
| dc.date.accessioned | 2021-06-14T17:09:30Z | - |
| dc.date.available | 2010-07-23 | |
| dc.date.copyright | 2008-08-05 | |
| dc.date.issued | 2008 | |
| dc.date.submitted | 2008-07-26 | |
| dc.identifier.citation | [1] R. Richardson, “2007 CSI Computer Crime and Security Survey”, Computer Security Institute, 2007, http://GoCSI.com.
[2] L.A. Gordon, M.P. Loeb, W. Lucyshyn, and R. Richardson, “2006 CSI/FBI Computer Crime and Security Survey”, Computer Security Institute, 2006, http://GoCSI.com. [3] P. Tarvainen, “Survey of the Survivability of IT Systems,” The 9th Nordic Workshop on Secure IT-systems, November 2004. [4] J.C. Knight and K.J. Sullivan, “On the Definition of Survivability,” Technical Report CS-TR-33-00, Department of Computer Science, University of Virginia, December 2000. [5] J.C. Knight, E.A. Strunk, and K.J. Sullivan, “Towards a Rigorous Definition of Information System Survivability,” Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX 2003), Volume 1, pp. 78-89, April 2003. [6] V.R. Westmark, “A Definition for Information System Survivability,” Proceedings of the 37th IEEE Hawaii International Conference on System Sciences, Vol. 9, 2004. [7] S.C. Liew and K.W. Lu, “A Framework for Network Survivability Characterization,” IEEE Journal on Selected Areas in Communications, Vol. 12, No. 1, pp. 52-58, January 1994 (ICC, 1992). [8] J.L Tzeng, “Near Optimal Network Defense Resource Allocation Strategies for the Minimization of Information Leakage”, Department of Information Management, National Taiwan University, 2006. [9] Adi Shamir, “How to Share a Secret”, Massachusetts Institute of Technology, 1979. [10] S.C. Cha, Y.J. Joung, and Y.E. Lue, “Building Universal Profile System over a Peer-to-Peer Network”, Department of Information Management, National Taiwan University, 2003. [11] C.S. Laih, L. Harn, and C.C. Chang, “Contemporary Cryptography and Its Applications”, PP 231-245, 1995. [12] Andrew S. Tanenbaum, “Computer Networks”, 3rd Edition, 1997. [13] “INFORMATION SECURITY TAIWAN”, pp. 22-23, No.47, November 2007. [14] M.L. Fisher, “The Lagrangean Relaxation Method for Solving Integer Programming Problems,” Management Science, Vol. 27, No. 1, pp. 1-18, January 1981. [15] M.L. Fisher, “An Application Oriented Guide to Lagrangean Relaxation,” Interfaces, Vol. 15, No 2, pp. 10-21, April 1985. [16] A.M. Geoffrion, “Lagrangean Relaxation and its Use in Integer Programming,” 86 Mathematical Programming Study, Vol. 2, pp. 82-114, 1974. [17] Hakim Weatherspoon and John D. Kubiatowicz “Erasure coding vs. replication: A quantitative comparison”. Lecture Notes in Computer Science, 2429:328-339, 2002 [18] S. Rhea, C. Wells, P. Eaton, D. Geels, B. Zhao, H. Weatherspoon, and J. Kubiatowicz. “Maintenance-free global datastorage,” IEEE Internet Computing, pages 40–49, 2001. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/40971 | - |
| dc.description.abstract | 隨著資訊科技的進步以及儲存設備價格的遞減,不管是個人、企業體、或是政府單位皆大量使用電子化的方式儲存資訊。再者,伴隨著網路使用率的提升以及電子商務的出現,經由網路竊取資訊的犯罪行為也迅速的增加。像是釣魚行為或是安裝木馬程式於受害者的電腦以竊取資訊等的犯罪,對個人或企業體皆造成重大的傷害。因此,如何發展防禦策略以保護儲存在網路上的資訊,已經變成很重要的議題。
在這篇論文中,我們將攻防情境轉化成一個最小-最大化的雙層數學規劃問題。在內層的問題中,攻擊者想在有限的攻擊能量下藉由竊取資訊對網路造成最大的傷害;另一方面,在外層的問題中,防禦者想在有限的防禦預算下利用秘密分享的概念,最佳化防禦資源配置策略以及資訊切割與分配策略來最小化傷害。除此之外,防禦者也必須考慮到合法使用者對存取資訊的服務品質要求。為了解決這個問題,我們採用了拉格蘭日鬆弛法以及次梯度法。我們假設防禦策略已知下,先解決內層攻擊者的選徑問題,再根據內層解完後的結果藉由以次梯度法為基礎的演算法來調整防禦策略。 | zh_TW |
| dc.description.abstract | Information technology has been increasingly progressing, and the storage cost has been reducing. Thus, individuals, enterprises and government organizations are likely to store secret data through electronic way. Moreover, along with the rise of the use of network and the prevalence of e-commerce, the crime of information theft through network has grown in high-speed. Cyber crimes, like phishing or installing Trojan horse in victims’ computers to steal information, will cause serious damage to individuals or enterprises. From the above reasons, to protect secret information stored on networks becomes an essential issue.
In this thesis, we formulate the attack-defense scenario as a min-max mathematical programming problem, which is a two-level mathematical problem. In the inner problem, the attacker wants to maximize the total damage by stealing information under limited attack power. In the outer problem, the defender wants to minimize the total damage by defense resource allocation and information-dividing under limited budget. In addition, the defender also has to consider QoS requirements of authorized users. In order to solve the considered problem, we use the Lagrangean Relaxation method and the subgradient method [14][15]. We solve the inner problem under a given defense strategy first, and then propose a subgrandient-based heuristic to adjust the defender’s strategy according to attacker’s attack strategy. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-14T17:09:30Z (GMT). No. of bitstreams: 1 ntu-97-R95725046-1.pdf: 1899598 bytes, checksum: 0f537b0c7407a3de6c1ca42086be8ff8 (MD5) Previous issue date: 2008 | en |
| dc.description.tableofcontents | Chapter 1 Introduction 1
1.1 Background 1 1.2 Motivation 5 1.3 Literature Survey 7 1.3.1 Survivability 7 1.3.2 Secret Sharing 11 1.3.3 Personal Data Objects Management 13 1.4 Proposed Approach 13 1.5 Thesis Organization 14 Chapter 2 Problem Formulation 16 2.1 Problem Description 16 2.2 Problem Formulation of the DRAID Model 19 2.3 Problem Formulation of the APS Model 31 Chapter 3 Solution Approach 35 3.1 Solution Approach for the APS Model 35 3.1.1 Lagrangean Relaxation Method 35 3.1.2 First-Stage Lagrangean Relaxation 39 3.1.3 Second-Stage Relaxation 51 3.1.4 Summary of the Solution Approach for APS Model 60 3.2 Solution Approach for the DRAID Model 62 Chapter 4 Computational Experiments 68 4.1 Computational Experiment with the APS Model 68 4.1.1 Simple Algorithm 1 68 4.1.2 Simple Algorithm 2 69 4.1.3 Experiment Environment 70 4.1.4 Experiment Results 73 4.1.5 Discussion of Results 99 4.2 Computational Experiment with the DRAID Model 102 4.2.1 Experiment Environment 102 4.2.2 Experiment Results 104 4.2.3 Discussion of Results 106 Chapter 5 Conclusion and Future Work 107 5.1 Conclusion 107 5.2 Future Work 109 References 111 | |
| dc.language.iso | en | |
| dc.subject | 資訊切割 | zh_TW |
| dc.subject | 資源配置 | zh_TW |
| dc.subject | 最佳化 | zh_TW |
| dc.subject | 拉格蘭日鬆弛法 | zh_TW |
| dc.subject | 數學規劃 | zh_TW |
| dc.subject | 資訊竊取 | zh_TW |
| dc.subject | 秘密分享 | zh_TW |
| dc.subject | Information Theft | en |
| dc.subject | Secret Sharing | en |
| dc.subject | Information Dividing | en |
| dc.subject | Resource Allocation | en |
| dc.subject | Optimization | en |
| dc.subject | Mathematical Programming | en |
| dc.subject | Lagrangean Relaxation | en |
| dc.title | 考慮隨機錯誤與惡意攻擊下資訊洩漏程度最小化之近似最佳化防禦資源分配與資訊切割配置策略 | zh_TW |
| dc.title | Near Optimal Defense Resource Allocation and Information Dividing-and-Allocation Strategies to Minimize Information Leakage Considering both Random Errors and Malicious Attacks | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 96-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 孫雅麗,莊裕澤,趙啟超,呂俊賢 | |
| dc.subject.keyword | 最佳化,數學規劃,資訊竊取,拉格蘭日鬆弛法,資源配置,資訊切割,秘密分享, | zh_TW |
| dc.subject.keyword | Optimization,Mathematical Programming,Information Theft,Lagrangean Relaxation,Resource Allocation,Information Dividing,Secret Sharing, | en |
| dc.relation.page | 112 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2008-07-29 | |
| dc.contributor.author-college | 管理學院 | zh_TW |
| dc.contributor.author-dept | 資訊管理學研究所 | zh_TW |
| 顯示於系所單位: | 資訊管理學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-97-1.pdf 未授權公開取用 | 1.86 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
