Skip navigation

DSpace JSPUI

DSpace preserves and enables easy and open access to all types of digital content including text, images, moving images, mpegs and data sets

Learn More
DSpace logo
English
中文
  • Browse
    • Communities
      & Collections
    • Publication Year
    • Author
    • Title
    • Subject
    • Advisor
  • Search TDR
  • Rights Q&A
    • My Page
    • Receive email
      updates
    • Edit Profile
  1. NTU Theses and Dissertations Repository
  2. 管理學院
  3. 資訊管理學系
Please use this identifier to cite or link to this item: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/43852
Title: 考量誘捕系統下攻擊者成功機率最小化之近似最佳化防禦策略
Near Optimal Defense Strategies to Minimize Attackers’ Success Probabilities for Networks of Honeypots
Authors: Yu-Shun Wang
王猷順
Advisor: 林永松
Keyword: 網路,攻防,網路,存活&#64001,最佳化,資源配置,數學規劃,誘捕系統,不完美知識,
Network Attack and Defense,Network Survivability,Optimization, Resource Allocation,Mathematical Programming,Honeypots,Imperfect Knowledge,
Publication Year : 2009
Degree: 碩士
Abstract: 由於攻擊者的手法與策略日新月異,對於防禦者而言,網路系統時常被不同類型的攻擊者同時攻擊,因此,如何衡量系統在此種情境下的存活度是防禦者的首要任務。除此之外,從攻擊者的角度而言,其對於欲攻擊的目標通常僅具部分資訊,即「不完美知識」。有鑒於此,發展出了一種欺騙攻擊者與消耗其資源的防禦機制,稱為誘捕系統。該系統除了具備上述的重要功能之外,還可用於學習攻擊者技巧並記錄其所使用之系統漏洞,以降低核心節點被攻克的機率,增進整體系統的存活度。
在本論文中,我們將一個攻防情境轉化成數學規劃問題,用以描述系統被攻擊者攻克的機率,並且透過「評估流程」找出能讓該機率最小化之防禦資源配置模式。該法是利用一連串的評估以及策略強化逐步地提升解的品質,並在每一次的循環中,藉由現有的資訊推導出最適當的修正方向,持續的強化現有的配置方法,以期求得最佳解;此外,該法能夠用於解決具備不完美資訊特質的問題,透過適當的情境描述,加入隨機的變異性情況,使問題更貼近於真實情況,有效地提升對防禦者的正面效益。
Since the attack level and tactics of network systems grow with each passing day. Network systems are usually simultaneously attacked by different types of attackers. Therefore, the most important issue for defenders is to evaluate the system survivability under this scenario. Besides, from the view point of attackers, they usually only have partial information of the targeted system. In other words, they only have “imperfect knowledge”. As a result, a mechanism which is capable to distract attackers and waste their budget is emerged. This defense technique, called honeypot, can not only assist defender to learn attack strategy and record system vulnerabilities attackers used but also allows defender to understand system vulnerabilities. Therefore, whole system compromised probability is reduced. In other words, survivability is raised.
In this thesis, we model the attack defense scenario as a mathematical programming problem that describes attackers’ success probability. The optimal defense resource allocation is discovered by evaluation process. This approach applies a serious of evaluations and policy enhancements gradually improve the quality of solution. For each round, we derive the most appropriate direction to amend and continually enhance the allocation scheme to achieve optimal solution. Besides, this approach can be applied to solve problems with imperfect knowledge property. Through appropriate scenario description and randomness involved, the problem can be closer to realistic, thus enhance the positive benefits effectively for the defenders.
URI: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/43852
Fulltext Rights: 有償授權
Appears in Collections:資訊管理學系

Files in This Item:
File SizeFormat 
ntu-98-1.pdf
  Restricted Access
1.98 MBAdobe PDF
Show full item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved