Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 管理學院
  3. 資訊管理學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/43856
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor林永松
dc.contributor.authorJui-Pin Loen
dc.contributor.author駱睿斌zh_TW
dc.date.accessioned2021-06-15T02:30:42Z-
dc.date.available2009-08-19
dc.date.copyright2009-08-19
dc.date.issued2009
dc.date.submitted2009-08-15
dc.identifier.citation[1] M.J. Cerullo and V. Cerullo, “Business Continuity Planning: A Comprehensive Approach,” Information Systems Management, Volume 21, No. 3, pp. 70-78, June 2004.
[2] B. B.M. Shao, “Optimal Redundancy Allocation for Information Technology Disaster Recovery in the Network Economy,” IEEE Transactions on Dependable and Secure Computing, Volume 2, No. 3, pp. 262-267, July-September 2005.
[3] W. Lam, “Ensuring Business Continuity,” IT Professional, Volume 4, Issue 3, pp. 19-25, May-June 2002.
[4] British Standard Institution (BSI), “BS25999,” November 2006.
[5] Frost & Sullivan and (ISC)2, “The 2008 (ISC)2 Global Information Security Workforce Study,” April 2008.
[6] AT&T, “AT&T’s Business Continuity Survey: 2008,” July 2008.
[7] P. Fallara, “Disaster Recovery Planning,” IEEE Potentials, Volume 22, Issue 5, pp. 42-44, December 2003-January 2004.
[8] A. Joseph, A. Mobolurin, H. Millar, and K.-M. Bryson, “Using Formal MS/OR Modeling to Support Disaster Recovery Planning,” European Journal of Operational Research, Volume 141, pp. 679-688, 2002.
[9] A.E. Smith and D.W. Coit, “Reliability Optimization of Series-Parallel Systems Using a Genetic Algorithm,” IEEE Transactions on Reliability, Volume 45, No. 2, pp. 254-260, 266, June 1996.
[10] Y.-C. Hsieh, “A Linear Approximation for Redundant Reliability Problems with Multiple Component Choices,” Computers and Industrial Engineering, Volume 44, Issue 1, pp. 91-103, January 2003.
[11] A. Konak, D.W. Coit, and J.E. Ramirez-Marquez, “Redundancy Allocation for Series-Parallel Systems Using a Max-min Approach,” IIE Transactions, Volume 36, Issue 9, pp. 891-898, September 2004.
[12] G. Levitina and K. Hausken, “Protection vs. Redundancy in Homogeneous Parallel Systems,” Reliability Engineering and System Safety, Volume 93, Issue 10, pp. 1444-1451, November 2007.
[13] V.R. Westmark, “A Definition for Information System Survivability,” Proceedings of the 37th IEEE Hawaii International Conference on System Sciences, January 2004.
[14] D.A. Fisher, H.F. Lipson, N.R. Mead, R.C. Linger, R.J. Ellison, and T. Longstaff, “Survivable Network Systems: An Emerging Discipline,” Technical Report CMU/SEI-97-TR-013, November 1997 (Revised: May 1999).
[15] T.-Z. Jiang, “A New Definition on Survivability of Communication Networks,” Conference Record of IEEE Military Communications Conference 1991 (MILCOM'91), Volume 3, pp. 901-904, November 1991.
[16] A.D. Malloy, A.P. Snow, and U. Varshney, “Reliability and Survivability of Wireless and Mobile Networks,” Computer, Volume 33, Issue 7, pp. 49-55, July 2000.
[17] L. Guo, L.-J. Zhang, W. Wang, W. Yang, and Y.-T. Yang, “A Survivability Quantitative Analysis Model for Network System Based on Attack Graph,” International Conference on Machine Learning and Cybernetics 2007, Volume 6, pp. 3211-3216, August 2007.
[18] R. Richardson, “2008 CSI Computer Crime and Security Survey,” 2008.
[19] ATIS Telecom Glossary 2007, http://www.atis.org/glossary/definition.aspx?id=1039(Original: “Federal Standard 1037C,” August 1996).
[20] M.N. Azaiez and V.M. Bier, “Optimal Resource Allocation for Security in Reliability Systems,” European Journal of Operational Research, Volume 181, Issue 2, pp. 773-786, September 2007.
[21] A.M. Geoffrion, “Lagrangean Relaxation for Integer Programming,” Mathematical Programming Study, Volume 2, pp. 82-114, 1974.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/43856-
dc.description.abstract近年來企業持續營運管理逐漸受到企業組織的重視。於此範疇中,災害復原計畫是與資訊科技最息息相關的部分。而在實踐災害復原計畫的眾多辦法之中,冗餘的佈署是一項常被採用的有效解決方案;然而,過往探討冗餘配置問題的研究多聚焦於可靠性系統,較少著力於企業組織多所仰賴的網路系統。故本論文在考慮網路環境特性的條件之下,旨於將冗餘與額外防禦有效地搭配運用於網路系統,一方面達成其服務之持續性,另方面則提升其抵抗具備經驗累積能力之惡意攻擊的存活度。
於此論文中,我們建構了一個攻防雙方彼此角力的攻防情境,之後將其轉化為一個兩階段的非線性整數規劃問題:在內層問題(AEA模型)中,具備絕對經驗累積能力的攻擊者透過選擇適當的目標進行攻擊,企圖以最小化的成本攻克網路中的所有核心節點;反觀外層問題(RAP-EDM模型),防禦者則在有限的防禦資源預算之下,透過適當地佈署冗餘與額外防禦,以最大化被攻擊者最小化的總體攻擊成本。其後,我們採用以拉格蘭日鬆弛法為基礎的方法解決上述問題,並藉由電腦實驗結果證明所提出解決方案之優異性。
zh_TW
dc.description.abstractIn recent years, Business Continuity Management (BCM) has become an important issue to organizations. Within the scope of BCM, Disaster Recovery Planning (DRP) is one of the most IT-related problems, and redundancy is a frequently used approach to implement DRP. However, previous research on Redundancy Allocation Problem (RAP) focused on dealing with the problems related to reliable systems, instead of network systems that organizations rely on. Therefore, we discuss RAP in network environments. By efficient use of redundancy together with extra defense mechanisms, we attempt to ensure a network’s service continuity, and enhance its survivability against malicious attackers that utilizes accumulated experience.
We construct an attack/defense scenario, in which an attacker and a defender competing against each other, and formulate it as a two-phase nonlinear integer programming problem. In the inner problem, AEA model, the attacker that utilizes accumulated experience attempts to minimize the total attack cost of compromising all core nodes in the network by choosing appropriate targets to compromise. By contrast, in the outer problem, RAP-EDM model, the defender allocates proper redundancy and extra defense mechanisms to maximize the minimized total attack cost under the consideration of a limited defense budget. We adopt a Lagrangean Relaxation-based solution approach to resolve the problem above, and further prove the efficacy of our approach by computer experiments.
en
dc.description.provenanceMade available in DSpace on 2021-06-15T02:30:42Z (GMT). No. of bitstreams: 1
ntu-98-R96725009-1.pdf: 1057178 bytes, checksum: a0573b8be5f79b8a19b92195e2ecffb8 (MD5)
Previous issue date: 2009
en
dc.description.tableofcontents謝誌 I
論文摘要 III
THESIS ABSTRACT V
Table of Contents VII
List of Tables IX
List of Figures XI
Chapter 1 Introduction 1
1.1 Background 1
1.2 Motivation 5
1.3 Literature Survey 6
1.3.1 Survivability 7
1.3.2 Redundancy Allocation Problem 11
1.4 Proposed Approach 14
1.5 Thesis Organization 15
Chapter 2 Problem Formulation 16
2.1 Problem Description 16
2.2 Problem Formulation of the RAP-EDM Model 17
2.3 Problem Formulation of the AEA Model 35
Chapter 3 Solution Approach 39
3.1 Solution Approach for the AEA Model 39
3.1.1 Lagrangean Relaxation Method 39
3.1.2 Lagrangean Problem of the AEA Model 41
3.1.3 The Dual Problem and the Subgradient Method 47
3.1.4 Getting Primal Feasible Solutions 47
3.2 Solution Approach for the RAP-EDM Model 49
Chapter 4 Computational Experiments 52
4.1 Computational Experiments with the AEA Model 52
4.1.1 Simple Attack Algorithm 1 and Simple Attack Algorithm 2 52
4.1.2 Randomized Allocation Algorithm 53
4.1.3 Core Focused Allocation Algorithm 53
4.1.4 Experiment Environment 54
4.1.5 Experiment Results 56
4.1.6 Discussion of Results 61
4.2 Computational Experiments with the RAP-EDM Model 62
4.2.1 Experiment Environment 62
4.2.2 Experiment Results 62
4.2.3 Discussion of Results 69
Chapter 5 Conclusion and Future Work 71
5.1 Conclusion 71
5.2 Future Work 73
References 75
dc.language.isoen
dc.subject數學規劃zh_TW
dc.subject拉格蘭日鬆弛法zh_TW
dc.subject多重核心節點zh_TW
dc.subject攻防情境zh_TW
dc.subject攻擊經驗累積zh_TW
dc.subject存活度zh_TW
dc.subject冗餘配置問題zh_TW
dc.subject服務持續性zh_TW
dc.subject最佳化zh_TW
dc.subjectLagrangean Relaxationen
dc.subjectService Continuityen
dc.subjectRedundancy Allocation Problem (RAP)en
dc.subjectSurvivabilityen
dc.subjectAttack/Defense Scenarioen
dc.subjectMultiple Core Nodesen
dc.subjectAttack Experience Accumulationen
dc.subjectOptimizationen
dc.subjectMathematical Programmingen
dc.title考量自然災害與智慧型攻擊下確保服務持續性之冗餘及防禦資源配置演算法zh_TW
dc.titleRedundancy and Defense Resource Allocation Algorithms to Assure Service Continuity against Natural Disasters and Intelligent Attackersen
dc.typeThesis
dc.date.schoolyear97-2
dc.description.degree碩士
dc.contributor.oralexamcommittee呂俊賢,傅新彬,鐘嘉德,林盈達
dc.subject.keyword服務持續性,冗餘配置問題,存活度,攻防情境,多重核心節點,攻擊經驗累積,最佳化,數學規劃,拉格蘭日鬆弛法,zh_TW
dc.subject.keywordService Continuity,Redundancy Allocation Problem (RAP),Survivability,Attack/Defense Scenario,Multiple Core Nodes,Attack Experience Accumulation,Optimization,Mathematical Programming,Lagrangean Relaxation,en
dc.relation.page79
dc.rights.note有償授權
dc.date.accepted2009-08-17
dc.contributor.author-college管理學院zh_TW
dc.contributor.author-dept資訊管理學研究所zh_TW
顯示於系所單位:資訊管理學系

文件中的檔案:
檔案 大小格式 
ntu-98-1.pdf
  未授權公開取用
1.03 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved