請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/41642完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 林永松(Frank Yeong-Sung Lin) | |
| dc.contributor.author | Hubert Jing-Wei Wang | en |
| dc.contributor.author | 王經維 | zh_TW |
| dc.date.accessioned | 2021-06-15T00:25:51Z | - |
| dc.date.available | 2014-08-20 | |
| dc.date.copyright | 2011-08-20 | |
| dc.date.issued | 2011 | |
| dc.date.submitted | 2011-08-15 | |
| dc.identifier.citation | [1] M. Gast, 802.11 wireless networks: the definitive guide , 2/e, 2005.
[2] A. Goldsmith, WIRELESS COMMUNICATIONS: Cambridge University Press, 2005. [3] I. F. Akyildiz, et al., 'Wireless mesh networks: a survey,' Computer Networks, vol. 47, pp. 445-487, 2005. [4] A. Campbell, et al., 'A quality of service architecture,' SIGCOMM Comput. Commun. Rev., vol. 24, pp. 6-27, 1994. [5] Z. Liu, et al., 'Wireless Jamming Localization by Exploiting Nodes’ Hearing Ranges,' in Distributed Computing in Sensor Systems. vol. 6131, R. Rajaraman, et al., Eds., ed: Springer Berlin / Heidelberg, 2010, pp. 348-361. [6] PricewaterhouseCoopers. 2011 Global State of Information Security Survey. Available: http://www.pwc.com/gx/en/information-security-survey/pdf/giss-2011-survey-report.pdf [7] 'IBM X-Force 2010 Mid-Year Trend and Risk Report ' IBM. [8] 'CSI Computer Crime and Security Survey Executive Summary,' December 2009. [9] S. Misra, et al., 'Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks,' Computers & Electrical Engineering, vol. 36, pp. 367-382, 2010. [10] K. Pelechrinis, et al., 'Lightweight Jammer Localization in Wireless Networks: System Design and Implementation,' in Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE, 2009, pp. 1-6. [11] H. Liu, et al., 'Localizing jammers in wireless networks,' in Pervasive Computing and Communications, 2009. PerCom 2009. IEEE International Conference on, 2009, pp. 1-6. [12] S. Balasubramaniam, et al., 'A multi-layered approach towards achieving survivability in autonomic network,' in Telecommunications and Malaysia International Conference on Communications, 2007. ICT-MICC 2007. IEEE International Conference on, 2007, pp. 360-365. [13] Z. Ma, 'Towards a unified definition for reliability, survivability and resilience (I): the conceptual framework inspired by the handicap principle and ecological stability,' in Aerospace Conference, 2010 IEEE, 2010, pp. 1-12. [14] K. Hausken and G. Levitin, 'Protection vs. false targets in series systems,' Reliability Engineering & System Safety, vol. 94, pp. 973-981, 2009. [15] G. Levitin and K. Hausken, 'False targets efficiency in defense strategy,' European Journal of Operational Research, vol. 194, pp. 155-162, 2009. [16] S. Skaperdas, 'Contest success functions,' Economic Theory, vol. 7, pp. 283-290, 1996. [17] P. E. Heegaard and K. S. Trivedi, 'Network survivability modeling,' Computer Networks, vol. 53, pp. 1215-1234, 2009. [18] R. J. Ellison, et al., 'Survivable Network Systems: An Emerging Discipline,' Technical Report CMU/SEI-97-TR-013, November 1997 (Revised: May 1999). [19] V. R. Westmark, 'A definition for information system survivability,' in System Sciences, 2004. Proceedings of the 37th Annual Hawaii International Conference on, 2004, p. 10 pp. [20] C. Fung, et al., 'Survivability analysis of distributed systems using attack tree methodology,' in Military Communications Conference, 2005. MILCOM 2005. IEEE, 2005, pp. 583-589 Vol. 1. [21] ATIS Telecom Glossary 2007. Available: http://www.atis.org/glossary/definition.aspx?id=1039 [22] Z. Ma and A. W. Krings, 'Survival Analysis Approach to Reliability, Survivability and Prognostics and Health Management (PHM),' in Aerospace Conference, 2008 IEEE, 2008, pp. 1-20. [23] M. Garg and J. C. Smith, 'Models and algorithms for the design of survivable multicommodity flow networks with general failure scenarios,' Omega, vol. 36, pp. 1057-1071, 2008. [24] M. N. Lima, et al., 'A survey of survivability in mobile ad hoc networks,' Communications Surveys & Tutorials, IEEE, vol. 11, pp. 66-77, 2009. [25] S. Xing, et al., 'Honeypot Protection Detection Response Recovery Model for Information Security Management Policy,' Asian Social Science, vol. 6, December 2010. [26] C. K. Dimitriadis, 'Improving Mobile Core Network Security with Honeynets,' IEEE Security and Privacy, vol. 5, pp. 40-47, 2007. [27] M. Sink. The Use of Honeypots and packet Sniffers for Intrusion Detection. Available: http://www.lib.iup.edu/comscisec/SANSpapers/msink.htm [28] H. Debar, et al., 'White Paper: “Honeypot, Honeynet, Honeytoken: Terminological issues”,' Institut Eurécom Research Report RR-03-081September 2003. [29] L. Spitzner, Honeypot: Tracking Hackers: Addison-Wesley. [30] A. Mpitziopoulos, et al., 'A survey on jamming attacks and countermeasures in WSNs,' Communications Surveys & Tutorials, IEEE, vol. 11, pp. 42-56, 2009. [31] W. Xu, et al., 'Jamming sensor networks: attack and defense strategies,' Network, IEEE, vol. 20, pp. 41-47, 2006. [32] A. Perrig, et al., 'Security in wireless sensor networks,' Commun. ACM, vol. 47, pp. 53-57, 2004. [33] W. Xu, et al., 'The feasibility of launching and detecting jamming attacks in wireless networks,' presented at the Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, Urbana-Champaign, IL, USA, 2005. [34] D. J. Thuente and M. Acharya, 'Intelligent Jamming in Wireless Networks with Applications to 802.11b and Other Networks ' in Proc. of IEEE MILCOM, 2006. [35] M. Li, et al., 'Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks,' in IEEE INFOCOM, 2007. [36] W. Xu, et al., 'Channel surfing and spatial retreats: defenses against wireless denial of service,' presented at the Proceedings of the 3rd ACM workshop on Wireless security, Philadelphia, PA, USA, 2004. [37] A. D. Wood, et al., 'JAM: a jammed-area mapping service for sensor networks,' in Real-Time Systems Symposium, 2003. RTSS 2003. 24th IEEE, 2003, pp. 286-297. [38] F. Cohen. Managing Network Security: Attack and Defense Strategies. Available: http://www.blacksheepnetworks.com/security/info/misc/9907.html [39] R. Y. Rubinstein and D. P. Kroese, Simulation and the Monte Carlo Method, 2nd Edition: Wiley, 2008. [40] D. S. Burdick and T. H. Naylor, 'Design of computer simulation experiments for industrial systems,' Commun. ACM, vol. 9, pp. 329-339, 1966. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/41642 | - |
| dc.description.abstract | 由於無線網路的便利性,近十幾年來快速發展出許多服務與應用,例如:行動電話網路、Wi-Fi、WiMAX等,為我們的生活帶來很多便利。然而,有部分的無線網路服務是應用於所謂safe-critical或是life-critical的系統,例如病患的追縱、交通監視、以及緊急救援等等,一旦系統無法使用將會造成嚴重的問題。因此,資訊安全,特別是持續性(continuity)在無線網路裡是一項重要的議題。
但在無線網路裡,有一種攻擊形式對於無線網路服務的持續性會有極大威脅,這種攻擊形式稱為「阻斷式攻擊」(Jamming Attack)。這種攻擊的目標是阻斷特定或是一定範圍的無線通訊頻道,使其無法進行通訊。由於無線傳輸媒介的開放特性,任何只要有無線通訊能力的網路裝置都能發起這樣的攻擊。而當網路中存在多個阻斷器時,情況又更加複雜。然而,目前對於防禦者應如何規劃網路或是分配資源以最小化由惡意攻擊者使用發起的阻斷式攻擊對網路的影響之研究仍尚付闕如,更不用提具有多重阻斷器的情境。 因此,在本論文中提出一個數學模型來描述這個問題的攻防情境。該問題的解法是藉由一連串的評估與策略強化的「評估流程」,逐步提升解的品質。最終為防禦者找出一個高效的網路規劃以及防禦策略。藉著模擬的優勢,我們可以考量「不完全資訊」(imcomplete information)的概念,使這個問題情境更貼近於真實情況。 | zh_TW |
| dc.description.abstract | Owing to the convenience of wireless networks, there are many mature applications which have been developed in recent years, for example, cellular telephone systems, Wi-Fi and WiMAX. However, some wireless applications are safe-critical or life-critical, such as patient tracking, traffic monitoring and emergency rescue. Therefore, security, especially continuity, of wireless networks is a critical issue in wireless networks.
Unfortunately, there is a category of attacks that seriously threatens the continuity of wireless networks, which is called jamming attack. The objective of such attacks focuses on interdiction of any communication on the targeted channels or a range of frequency. The open nature of wireless mediums makes it vulnerable to any wireless capable devices. Worst of all, the wireless environment become more sophisticated when there are multiple jammers in one single channel. However, there have not been any researches address the issue of how the service providers should deploy its topology or allocate its resources to minimize the impact of jamming attacks of multiple jammers launched by malicious attackers. Therefore, in this thesis, we proposed a mathematical model to formulate an attack-defense scenario of the problem. The solution is derived by evaluation process which applies a series of evaluations and policy enhancements to improve the quality of solution. Finally, obtain an effect solution of topology planning and defending strategies for the defenders. With the advantage of simulations, we can take the concept of incomplete information into consideration which makes the problem closer to reality. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-15T00:25:51Z (GMT). No. of bitstreams: 1 ntu-100-R98725045-1.pdf: 1845379 bytes, checksum: eef031b09c55ac043c7c3892edac16c6 (MD5) Previous issue date: 2011 | en |
| dc.description.tableofcontents | 謝誌 I
論文摘要 III THESIS ABSTRACT V Table of Contents VII List of Tables IX List of Figures X Chapter 1 INTRODUCTION 1 1.1 Background 1 1.2 Motivation 6 1.3 Literature Survey 8 1.3.1 Survivability 8 1.3.2 Deception Based Mechanisms 13 1.3.3 Jamming Attacks 16 1.3.4 Jamming Countermeasures 21 1.3.5 Jammer Localization 22 1.4 Proposed Approach 24 1.5 Thesis Organization 25 Chapter 2 Problem Formulation 26 2.1 Problem Description 26 2.1.1 Defender Perspective 28 2.1.1.1 Nodes 28 2.1.1.2 Budget 29 2.1.1.3 Strategy 30 2.1.2 Attacker Perspective 33 2.1.2.1 Budget 33 2.1.2.2 Capability 34 2.1.2.3 Aggressiveness 35 2.1.2.4 Goal, Strategy and Preference 35 2.2 A Possible Scenario 41 2.2.1 Planning Phase 42 2.2.2 Preparing Phase 44 2.2.3 Attacking Phase 49 2.2.4 Defending Phase 50 2.3 Problem Formulation 54 Chapter 3 Solution Approach 64 3.1 Mathematical Programming 64 3.2 Monte Carlo Simulation 65 3.3 The Combination of Mathematical Programming and Monte Carlo Simulation 67 3.3.1 Evaluation Process 67 3.3.2 Policy Enhancement 70 3.4 Initial Allocation Scheme 77 Chapter 4 Computational Experiments 79 4.1 Experiment Environment 79 4.2 Experiment Results 81 Chapter 5 Conclusion and Future Work 87 5.1 Conclusion 87 5.2 Future work 88 Reference 89 | |
| dc.language.iso | en | |
| dc.subject | 拉格蘭日鬆弛法 | zh_TW |
| dc.subject | 網路攻防 | zh_TW |
| dc.subject | 無線網狀網路 | zh_TW |
| dc.subject | 阻斷式攻擊 | zh_TW |
| dc.subject | 網路存活度 | zh_TW |
| dc.subject | 最佳化 | zh_TW |
| dc.subject | 資源配置 | zh_TW |
| dc.subject | 數學規劃 | zh_TW |
| dc.subject | 誘捕系統 | zh_TW |
| dc.subject | 不完美知識 | zh_TW |
| dc.subject | Honeypots | en |
| dc.subject | Network Survivability | en |
| dc.subject | Optimization | en |
| dc.subject | Resource Allocation | en |
| dc.subject | Mathematical Programming | en |
| dc.subject | Incomplete Information | en |
| dc.subject | Lagrangian Relaxation Method | en |
| dc.subject | Network Attack and Defense | en |
| dc.subject | Wireless Mesh Networks | en |
| dc.subject | Jamming Attack | en |
| dc.title | 無線網狀網路中考量惡意與多重干擾器攻擊下最大化系統存活度之高效網路規劃與防禦策略 | zh_TW |
| dc.title | Effective Network Planning and Defending Strategies to Maximize System Survivability of Wireless Mesh Networks under Malicious and Jamming Attacks | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 99-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 趙啟超(Chi-chao Chao),莊東穎(Tong-Ying Juang),呂俊賢(Chun-Hsien Lu),林盈達(Ying-Dar Lin) | |
| dc.subject.keyword | 網路攻防,無線網狀網路,阻斷式攻擊,網路存活度,最佳化,資源配置,數學規劃,誘捕系統,不完美知識,拉格蘭日鬆弛法, | zh_TW |
| dc.subject.keyword | Network Attack and Defense,Wireless Mesh Networks,Jamming Attack,Network Survivability,Optimization,Resource Allocation,Mathematical Programming,Honeypots,Incomplete Information,Lagrangian Relaxation Method, | en |
| dc.relation.page | 91 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2011-08-15 | |
| dc.contributor.author-college | 管理學院 | zh_TW |
| dc.contributor.author-dept | 資訊管理學研究所 | zh_TW |
| 顯示於系所單位: | 資訊管理學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-100-1.pdf 未授權公開取用 | 1.8 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
