請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/43856完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 林永松 | |
| dc.contributor.author | Jui-Pin Lo | en |
| dc.contributor.author | 駱睿斌 | zh_TW |
| dc.date.accessioned | 2021-06-15T02:30:42Z | - |
| dc.date.available | 2009-08-19 | |
| dc.date.copyright | 2009-08-19 | |
| dc.date.issued | 2009 | |
| dc.date.submitted | 2009-08-15 | |
| dc.identifier.citation | [1] M.J. Cerullo and V. Cerullo, “Business Continuity Planning: A Comprehensive Approach,” Information Systems Management, Volume 21, No. 3, pp. 70-78, June 2004.
[2] B. B.M. Shao, “Optimal Redundancy Allocation for Information Technology Disaster Recovery in the Network Economy,” IEEE Transactions on Dependable and Secure Computing, Volume 2, No. 3, pp. 262-267, July-September 2005. [3] W. Lam, “Ensuring Business Continuity,” IT Professional, Volume 4, Issue 3, pp. 19-25, May-June 2002. [4] British Standard Institution (BSI), “BS25999,” November 2006. [5] Frost & Sullivan and (ISC)2, “The 2008 (ISC)2 Global Information Security Workforce Study,” April 2008. [6] AT&T, “AT&T’s Business Continuity Survey: 2008,” July 2008. [7] P. Fallara, “Disaster Recovery Planning,” IEEE Potentials, Volume 22, Issue 5, pp. 42-44, December 2003-January 2004. [8] A. Joseph, A. Mobolurin, H. Millar, and K.-M. Bryson, “Using Formal MS/OR Modeling to Support Disaster Recovery Planning,” European Journal of Operational Research, Volume 141, pp. 679-688, 2002. [9] A.E. Smith and D.W. Coit, “Reliability Optimization of Series-Parallel Systems Using a Genetic Algorithm,” IEEE Transactions on Reliability, Volume 45, No. 2, pp. 254-260, 266, June 1996. [10] Y.-C. Hsieh, “A Linear Approximation for Redundant Reliability Problems with Multiple Component Choices,” Computers and Industrial Engineering, Volume 44, Issue 1, pp. 91-103, January 2003. [11] A. Konak, D.W. Coit, and J.E. Ramirez-Marquez, “Redundancy Allocation for Series-Parallel Systems Using a Max-min Approach,” IIE Transactions, Volume 36, Issue 9, pp. 891-898, September 2004. [12] G. Levitina and K. Hausken, “Protection vs. Redundancy in Homogeneous Parallel Systems,” Reliability Engineering and System Safety, Volume 93, Issue 10, pp. 1444-1451, November 2007. [13] V.R. Westmark, “A Definition for Information System Survivability,” Proceedings of the 37th IEEE Hawaii International Conference on System Sciences, January 2004. [14] D.A. Fisher, H.F. Lipson, N.R. Mead, R.C. Linger, R.J. Ellison, and T. Longstaff, “Survivable Network Systems: An Emerging Discipline,” Technical Report CMU/SEI-97-TR-013, November 1997 (Revised: May 1999). [15] T.-Z. Jiang, “A New Definition on Survivability of Communication Networks,” Conference Record of IEEE Military Communications Conference 1991 (MILCOM'91), Volume 3, pp. 901-904, November 1991. [16] A.D. Malloy, A.P. Snow, and U. Varshney, “Reliability and Survivability of Wireless and Mobile Networks,” Computer, Volume 33, Issue 7, pp. 49-55, July 2000. [17] L. Guo, L.-J. Zhang, W. Wang, W. Yang, and Y.-T. Yang, “A Survivability Quantitative Analysis Model for Network System Based on Attack Graph,” International Conference on Machine Learning and Cybernetics 2007, Volume 6, pp. 3211-3216, August 2007. [18] R. Richardson, “2008 CSI Computer Crime and Security Survey,” 2008. [19] ATIS Telecom Glossary 2007, http://www.atis.org/glossary/definition.aspx?id=1039(Original: “Federal Standard 1037C,” August 1996). [20] M.N. Azaiez and V.M. Bier, “Optimal Resource Allocation for Security in Reliability Systems,” European Journal of Operational Research, Volume 181, Issue 2, pp. 773-786, September 2007. [21] A.M. Geoffrion, “Lagrangean Relaxation for Integer Programming,” Mathematical Programming Study, Volume 2, pp. 82-114, 1974. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/43856 | - |
| dc.description.abstract | 近年來企業持續營運管理逐漸受到企業組織的重視。於此範疇中,災害復原計畫是與資訊科技最息息相關的部分。而在實踐災害復原計畫的眾多辦法之中,冗餘的佈署是一項常被採用的有效解決方案;然而,過往探討冗餘配置問題的研究多聚焦於可靠性系統,較少著力於企業組織多所仰賴的網路系統。故本論文在考慮網路環境特性的條件之下,旨於將冗餘與額外防禦有效地搭配運用於網路系統,一方面達成其服務之持續性,另方面則提升其抵抗具備經驗累積能力之惡意攻擊的存活度。
於此論文中,我們建構了一個攻防雙方彼此角力的攻防情境,之後將其轉化為一個兩階段的非線性整數規劃問題:在內層問題(AEA模型)中,具備絕對經驗累積能力的攻擊者透過選擇適當的目標進行攻擊,企圖以最小化的成本攻克網路中的所有核心節點;反觀外層問題(RAP-EDM模型),防禦者則在有限的防禦資源預算之下,透過適當地佈署冗餘與額外防禦,以最大化被攻擊者最小化的總體攻擊成本。其後,我們採用以拉格蘭日鬆弛法為基礎的方法解決上述問題,並藉由電腦實驗結果證明所提出解決方案之優異性。 | zh_TW |
| dc.description.abstract | In recent years, Business Continuity Management (BCM) has become an important issue to organizations. Within the scope of BCM, Disaster Recovery Planning (DRP) is one of the most IT-related problems, and redundancy is a frequently used approach to implement DRP. However, previous research on Redundancy Allocation Problem (RAP) focused on dealing with the problems related to reliable systems, instead of network systems that organizations rely on. Therefore, we discuss RAP in network environments. By efficient use of redundancy together with extra defense mechanisms, we attempt to ensure a network’s service continuity, and enhance its survivability against malicious attackers that utilizes accumulated experience.
We construct an attack/defense scenario, in which an attacker and a defender competing against each other, and formulate it as a two-phase nonlinear integer programming problem. In the inner problem, AEA model, the attacker that utilizes accumulated experience attempts to minimize the total attack cost of compromising all core nodes in the network by choosing appropriate targets to compromise. By contrast, in the outer problem, RAP-EDM model, the defender allocates proper redundancy and extra defense mechanisms to maximize the minimized total attack cost under the consideration of a limited defense budget. We adopt a Lagrangean Relaxation-based solution approach to resolve the problem above, and further prove the efficacy of our approach by computer experiments. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-15T02:30:42Z (GMT). No. of bitstreams: 1 ntu-98-R96725009-1.pdf: 1057178 bytes, checksum: a0573b8be5f79b8a19b92195e2ecffb8 (MD5) Previous issue date: 2009 | en |
| dc.description.tableofcontents | 謝誌 I
論文摘要 III THESIS ABSTRACT V Table of Contents VII List of Tables IX List of Figures XI Chapter 1 Introduction 1 1.1 Background 1 1.2 Motivation 5 1.3 Literature Survey 6 1.3.1 Survivability 7 1.3.2 Redundancy Allocation Problem 11 1.4 Proposed Approach 14 1.5 Thesis Organization 15 Chapter 2 Problem Formulation 16 2.1 Problem Description 16 2.2 Problem Formulation of the RAP-EDM Model 17 2.3 Problem Formulation of the AEA Model 35 Chapter 3 Solution Approach 39 3.1 Solution Approach for the AEA Model 39 3.1.1 Lagrangean Relaxation Method 39 3.1.2 Lagrangean Problem of the AEA Model 41 3.1.3 The Dual Problem and the Subgradient Method 47 3.1.4 Getting Primal Feasible Solutions 47 3.2 Solution Approach for the RAP-EDM Model 49 Chapter 4 Computational Experiments 52 4.1 Computational Experiments with the AEA Model 52 4.1.1 Simple Attack Algorithm 1 and Simple Attack Algorithm 2 52 4.1.2 Randomized Allocation Algorithm 53 4.1.3 Core Focused Allocation Algorithm 53 4.1.4 Experiment Environment 54 4.1.5 Experiment Results 56 4.1.6 Discussion of Results 61 4.2 Computational Experiments with the RAP-EDM Model 62 4.2.1 Experiment Environment 62 4.2.2 Experiment Results 62 4.2.3 Discussion of Results 69 Chapter 5 Conclusion and Future Work 71 5.1 Conclusion 71 5.2 Future Work 73 References 75 | |
| dc.language.iso | en | |
| dc.subject | 數學規劃 | zh_TW |
| dc.subject | 拉格蘭日鬆弛法 | zh_TW |
| dc.subject | 多重核心節點 | zh_TW |
| dc.subject | 攻防情境 | zh_TW |
| dc.subject | 攻擊經驗累積 | zh_TW |
| dc.subject | 存活度 | zh_TW |
| dc.subject | 冗餘配置問題 | zh_TW |
| dc.subject | 服務持續性 | zh_TW |
| dc.subject | 最佳化 | zh_TW |
| dc.subject | Lagrangean Relaxation | en |
| dc.subject | Service Continuity | en |
| dc.subject | Redundancy Allocation Problem (RAP) | en |
| dc.subject | Survivability | en |
| dc.subject | Attack/Defense Scenario | en |
| dc.subject | Multiple Core Nodes | en |
| dc.subject | Attack Experience Accumulation | en |
| dc.subject | Optimization | en |
| dc.subject | Mathematical Programming | en |
| dc.title | 考量自然災害與智慧型攻擊下確保服務持續性之冗餘及防禦資源配置演算法 | zh_TW |
| dc.title | Redundancy and Defense Resource Allocation Algorithms to Assure Service Continuity against Natural Disasters and Intelligent Attackers | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 97-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 呂俊賢,傅新彬,鐘嘉德,林盈達 | |
| dc.subject.keyword | 服務持續性,冗餘配置問題,存活度,攻防情境,多重核心節點,攻擊經驗累積,最佳化,數學規劃,拉格蘭日鬆弛法, | zh_TW |
| dc.subject.keyword | Service Continuity,Redundancy Allocation Problem (RAP),Survivability,Attack/Defense Scenario,Multiple Core Nodes,Attack Experience Accumulation,Optimization,Mathematical Programming,Lagrangean Relaxation, | en |
| dc.relation.page | 79 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2009-08-17 | |
| dc.contributor.author-college | 管理學院 | zh_TW |
| dc.contributor.author-dept | 資訊管理學研究所 | zh_TW |
| 顯示於系所單位: | 資訊管理學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-98-1.pdf 未授權公開取用 | 1.03 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
