Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 管理學院
  3. 資訊管理學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/63781
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor林永松
dc.contributor.authorChi-Hsiang Chanen
dc.contributor.author詹棨翔zh_TW
dc.date.accessioned2021-06-16T17:18:59Z-
dc.date.available2014-08-20
dc.date.copyright2012-08-20
dc.date.issued2012
dc.date.submitted2012-08-16
dc.identifier.citation[1] “State of Enterprise Security,” Symantec Corporation Technical report, February 2010.
[2] “IBM X-Force 2011 Mid-year Trend and Risk Report,” IBM Corporation Technical report, September 2011.
[3] “McAfee Threats Report: First Quarter 2011,” McAfee Lab Technical report, 2011.
[4] “Key findings from the 2012 Global State of Information Security Survey,” PwC Technical report, 2011.
[5] Y. Huang, D. Arsenault and A. Sood, “Incorruptible System Self-cleansing for Intrusion Tolerance,” Performance, Computing, and Communications Conference, IPCCC 2006. 25th IEEE International, 2006, pp.4 -496.
[6] Y. Huang, D. Arsenault and A. Sood, “Closing Cluster Attack Windows through Server Redundancy and Rotations,' the Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid, 2006.
[7] S. Xu, “Collaborative Attack vs. Collaborative Defense,” Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2009, Volume 10, Part 2, 217-228, 2009.
[8] R. J. Ellison, D. A. Fisher, R.C. Linger, H. F. Lipson, T. Longstaff and N. R. Mead, “Survivable Network Systems: An Emerging Discipline,” Technical Report CMU/SEI-97-TR-013, Novermber 1997.
[9] D. Medhi and D. Tipper, “Multi-layered Network Survivability-models, Analysis, Architecture, Framework and Implementation: An Overview,” Proceedings of DARPA Information Survivability Conference and Exposition 2000 (DISCEX’00), Volume 1, pp. 173-186, January 2000.
[10] D. Zhou and S. Subramaniam, “Survivability in Optical Networks,” IEEE Network, Volume 14, Issue 6, pp. 16-23, November-December 2000.
[11] A.P. Moore and R.C. Linger, “Foundations for Survivable System Development: Service Traces, Intrusion Traces, and Evaluation Models,” Technical Report CMU/SEI-2001-TR-029, October 2001.
[12] V.R. Westmark, “A Definition for Information System Survivability,” Proceedings of the 37th IEEE Hawaii International Conference on System Sciences, pp. 10, January 2004.
[13] A. Snow, G. Weckman, and P. Rastogi, “Assessing Dependability of Wireless Networks Using Neural Networks,” IEEE Military Communications Conference, 2005 (MILCOM’05), Vol. 5, pp. 2809-2815, October 2005.
[14] D. Tipper, K. Lu, and Y. Qian, “A Design for Secure and Survivable Wireless Sensor Networks,” IEEE Wireless Communications, Vol. 14, Issue 5, pp. 30-37, October 2007.
[15] P. E. Heegaard and K. S. Trivedi, 'Network Survivability Modeling,' Computer Networks, vol. 53, pp. 1215-1234, 2009.
[16] J. Huang, J. Jiang and L. Zhang, 'A Novel Transient System Survivability Quantitative Evaluation Framework,' Computer Engineering and Applications (ICCEA), 2010 Second International Conference on, pp. 34-39, 2010.
[17] S. Braynov and M. Jadiwala, “Representation and Analysis of Coordinated Attacks,” Proceedings of the 2003 ACM workshop on Formal methods in security engineering, pp. 43-51, October, 2003.
[18] M. Atighetchi, P. Pal, F. Webber and C. Jones, “Adaptive Use of Network-Centric Mechanisms in Cyber-Defense,” Proceedings of the Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing, pp. 183-192, May 2003.
[19] 'Intrusion Detection Systems Definition, Need and Challenges,' SANS Institute Technical report, 2001.
[20] K. Scarfone and P. Mell, 'Guide to Intrusion Detection and Prevention Systems (IDPS),' NIST Interagency/Internal Report (NISTIR) - 800-94, 2007.
[21] M. Laureano, C. Maziero and E. Jamhou, 'Intrusion Detection in Virtual Machine Environments,' the Proceedings of the 30th EUROMICRO Conference, 2004.
[22] VMware. VMware vShieldTM Product Family. Available: http://www.vmware.com/products/vshield/
[23] T. Micro. Trend Micro Deep Security. Available: http://tw.trendmicro.com/tw/products/enterprise/deep-security/index.html
[24] P. Mell and T. Grance, “The NIST Definition of Cloud Computing,” NIST Special Publication 800-145, September 2011.
[25] 'Cloud Computing - Benefits, Risks and Recommendations for Information Security,' European Network and Information Security Agency technical report, 2009.
[26] Zscaler Products. Available: http://www.zscaler.com/productsataglance.html
[27] F. Cohen, 'Managing Network Security: Attack and Defence Strategies,' Network Security, vol. 1999, pp. 7-11, 1999.
[28] G. Fandel, A. Giese and B. Mohn, “Measuring Synergy Effects of a Public Social Private Partnership,” International Journal of Production Economics, March, 2012.
[29] S. Saperdas, “Contest Success Functions,” Economic Theory, vol. 7, pp. 283-290, 1996.
[30] K. Hausken and G. Levitin, “Protection vs. Flase Targets in Series Systems,” Reliability Engineering & System Safety, vol. 94, pp. 973-987, 2009.
[31] P. Ferrie, “Attacks on Virtual Machine Emulators,” Symantec Advanced Threat Research, 2006.
[32] M.H. Kalos and P.A. Whitlock, “Monte Carlo Methods,” John Wilet & Sons Incs, ISBN 978-3-527-40760-6, November 2008.
[33] S. Nagaraja and R. Anderson, “Dynamic Topologies for Robust Scale-Free Networks,” Bio-inspired Computing and Communication, pp. 411-426, 2008.
[34] J. Blitzstein and P. Diaconis, “A Seuential Improtance Sampling Algorihm for Generating Random Graphs with Prescribed Drgrees,” Internet Mathematics, Vol. 6, No. 4, pp. 489-522, March 2011.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/63781-
dc.description.abstract雲端運算使用了虛擬化和網路技術。這個最近熱門的議題,讓使用者和組織可以去除地理上的限制在任何時間、地點存取所需的應用服務。這個方便的技術帶來了許多的利益但也造成了資訊安全上的複雜度提高。
在本論文中,我們利用數學模型描述一個網路攻防情境,並且配合模擬和數學規劃法解決雙層問題。由於攻防策略的多變性造成情境具高複雜度且不可預期,因此透過模擬評估平均的網路存活度,接著使用了模試圖最佳化攻擊方的策略,攻擊方將試著最大化服務被攻克率而防禦方則希望最小化被攻擊者最大化之服務被攻克率。
在我們考量的攻防情境中,攻擊方會採用協同攻擊策略,此種策略可帶給攻擊方更多的優勢。另一方面,防禦者在考量有限的資源預算和合法使用者的服務品質下,決定適合的策略以保護服務,防禦策略包含佈置即時防禦機制,如:動態網路拓樸調整、區域防禦以及雲端安全服務,另外也利用了虛擬化技術建置網路拓樸。
zh_TW
dc.description.abstractRecently, Cloud computing which base on virtualization and network technology becomes a popular issue. Through the novel model it provides, users and organizations can decrease the cost on resources and access the applications without geographic limit. The convenient technologies bring a lot of profits but also raise the complexity of information security.
In this thesis, we model the network attack and defense scenario as a mathematical formulation and solve the bi-level problem through simulation and mathematical programming. Because of the complexity and non-deterministic characteristic of both attack and defense strategies, we adopt simulation to evaluate the average network survivability. Furthermore, several methods are used to help us discover the optimal strategies. The attack commander tries to maximize the service compromise probabilities and the defender has to minimize the maximized probabilities.
As for the attack and defense scenario, collaborative attack is considered. This kind of attack is advantageous to the commanders. On the other hand, the defender must decide the appropriate strategies under budget and predefined quality of service constraints, which including deploying various reactive defense mechanisms such as dynamic topology reconfiguration, local defense function, and cloud security service to protect the system. The Virtualization technology is also considered as a strategy for constructing the topology.
en
dc.description.provenanceMade available in DSpace on 2021-06-16T17:18:59Z (GMT). No. of bitstreams: 1
ntu-101-R99725049-1.pdf: 1836978 bytes, checksum: 59c62ce437fb4d1835ebd78b598e3711 (MD5)
Previous issue date: 2012
en
dc.description.tableofcontents論文摘要 ………………………………………………………………………………………………………………………………………….I
THESIS ABSTRACT III
TABLE OF CONTENTS V
LIST OF TABLES VII
LIST OF FIGURES IX
CHAPTER 1 INTRODUCTION 1
1.1 BACKGROUND 1
1.2 MOTIVATION 7
1.3 LITERATURE SURVEY 9
1.3.1 Survivability 9
1.3.2 Collaborative Attack 11
1.3.3 Dynamic Topology Reconfiguration 12
1.3.4 Intrusion Detection and Prevention System 13
1.3.5 Security as a Service in Cloud computing 14
1.4 PROPOSED APPROACH 15
1.5 THESIS ORGANIZATION 16
CHAPTER 2 PROBLEM FORMULATION 17
2.1 PROBLEM DESCRIPTION 17
2.1.1 Commander Perspective 19
2.1.2 Defender Perspective 22
2.2 ATTACK AND DEFENSE SCENARIO 26
2.3 PROBLEM FORMULATION 38
CHAPTER 3 SOLUTION APPROACH 45
3.1 MATHEMATICAL PROGRAMMING 45
3.2 MONTE CARLO SIMULATION 46
3.3 ENHANCEMENT PROCEDURE BASED ON INFORMATION COLLECTED DURING SIMULATION 47
3.3.1 Evaluation Process 47
3.3.2 Policy Enhancement 50
3.4 INITIAL ALLOCATION SCHEME 54
3.4.1 Topology Generation 54
3.4.2 Proactive Defense Resource Allocation 54
3.4.3 Reactive Defense Resource Allocation 55
CHAPTER 4 COMPUTATIONAL SIMULATIONS 57
4.1 SIMULATION ENVIRONMENT 57
4.2 SIMULATION RESULT 59
4.2.1 Evaluation Times 59
4.2.2 Robustness Experiment 61
4.2.3 Enhancement 62
CHAPTER 5 CONCLUSION AND FUTURE WORK 65
REFERENCES 67
dc.language.isoen
dc.subject網路存活度zh_TW
dc.subject雲端運算zh_TW
dc.subject協同攻擊zh_TW
dc.subject虛擬化zh_TW
dc.subject資源配置zh_TW
dc.subject模擬zh_TW
dc.subject數學規劃法zh_TW
dc.subjectVirtualizationen
dc.subjectNetwork Survivabilityen
dc.subjectMathematical Programmingen
dc.subjectSimulationen
dc.subjectCloud Computingen
dc.subjectCollaborative Attacken
dc.subjectResource Allocationen
dc.title考量惡意合作攻擊下最小化服務被攻克率之有效網路建置與防禦策略zh_TW
dc.titleEffective Network Planning and Defending Strategies to Minimize Service Compromise Probabilities under Malicious Collaborative Attacksen
dc.typeThesis
dc.date.schoolyear100-2
dc.description.degree碩士
dc.contributor.oralexamcommittee呂俊賢,莊東穎,傅新彬,鍾順平
dc.subject.keyword協同攻擊,網路存活度,數學規劃法,模擬,雲端運算,虛擬化,資源配置,zh_TW
dc.subject.keywordCollaborative Attack,Network Survivability,Mathematical Programming,Simulation,Cloud Computing,Virtualization,Resource Allocation,en
dc.relation.page69
dc.rights.note有償授權
dc.date.accepted2012-08-17
dc.contributor.author-college管理學院zh_TW
dc.contributor.author-dept資訊管理學研究所zh_TW
顯示於系所單位:資訊管理學系

文件中的檔案:
檔案 大小格式 
ntu-101-1.pdf
  未授權公開取用
1.79 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved