請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/48381
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 林永松 | |
dc.contributor.author | Po-Hao (Joseph) Tsang | en |
dc.contributor.author | 臧柏皓 | zh_TW |
dc.date.accessioned | 2021-06-15T06:54:37Z | - |
dc.date.available | 2012-02-20 | |
dc.date.copyright | 2011-02-20 | |
dc.date.issued | 2011 | |
dc.date.submitted | 2011-02-10 | |
dc.identifier.citation | M. Abramowitz and I. A. Stegun, “Normal or Gaussian Probability Function,” Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables, Dover Publications, p.931, 1965.
R. K. Ahuja, T. L. Magnanti, and J. B. Orlin, Network Flows: Theory, Algorithms and Applications, Prentice Hall, 1993. R. Albert, H. Jeong, and A.-L. Barabasi, “Error and Attack Tolerance of Complex Networks,” Nature, Volume 406, pp.378-382, July 2000. F. A. Al-Zahrani, “Survivability Performance Evaluation of Slotted Multi-fiber Optical Packet Switching Networks With and Without Wavelength Conversion,” Proceedings of the 2nd Information and Communication Technologies (ICTTA'06), pp.2242-2247, April 2006. K. M. M. Aung, K. Park, and J. S. Park, “A Survivability Model for Cluster System,” Lecture Notes in Computer Science (LNCS), Volume 3719, pp.73-82, October 2005. K. M. M. Aung, K. Park, and J. S. Park, “Survivability Analysis of a Cluster System with 4th Generation Security Mechanism: Regeneration,” International Journal of Network Security, Volume 3, Number 3, pp.271–278, November 2006. D. Awduche, A. Chiu, A. Elwalid, I. Widjaja, and X. Xiao, “Overview and Principles of Internet Traffic Engineering,” RFC3272, May 2002. M. N. Azaiez and V. M. Bier, “Optimal Resource Allocation for Security in Reliability Systems,” European Journal of Operational Research, Volume 181, Issue 2, pp.773-786, September 2007. V. Batagelj, F. J. Brandenburg, P. O. D. Mendez, and A. Sen, “The Generalized Shortest Path Problem,” The Pennsylvania State University CiteSeer Archives, 2000. L. Bai, S. Biswas, and E. P. Blasch, “Survivability - An Information Fusion Process Metric from an Operational Perspective,” Proceedings of the 10th International Conference on Information Fusion, pp.1-8, July 2007. L. Bai, S. Biswas, A. Ortiz, F. Ferrese, D. Dalessandro, and Q. Dong, “Survivability Analysis of Reconfigurable Systems,” Proceedings of the 2007 IEEE International Conference on Industrial Engineering and Engineering Management, pp.663-667, December 2007. S. Balasubramaniam, D. Botvich, W. Donnelly, and N. Agoulmine, “A Multi-layered Approach Towards Achieving Survivability in Autonomic Network,” Proceedings of the 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications (ICT-MICC‘07), pp.360-365, May 2007. A.-L. Barabasi and R. Albert, “Emergence of Scaling in Random Networks,” Science, Volume 286, Number 5439, pp.509-512, October 1999. M. Barbacci, “Survivability in the Age of Vulnerable Systems,” Computer, Volume 29, Issue 11, p.8, November 1996. V. M. Bier and V. Abhichandani, “Optimal Allocation of Resources for Defense of Simple Series and Parallel Systems from Determined Adversaries,” Proceedings of the Engineering Foundation Conference on Risk-Based Decision making in Water Resources X, pp.59–76, 2003. V. M. Bier, A. Nagaraj, and V. Abhichandani, “Protection of Simple Series and Parallel Systems with Components of Different Values,” Reliability Engineering and System Safety, Volume 87, Issue 3, pp.315–323, March 2005. S. Bowers, L. Delcambre, D. Maier, C. Cowan, P. Wagle, D. McNamee, A-F. L. Meur, and H. Hinton, “Applying Adaptation Spaces to Support Quality of Service and Survivability,” Proceedings of the 2000 DARPA Information Survivability Conference and Exposition (DISCEX’00), Volume 2, pp.271-283, January 2000. R. Bracewell, 'Convolution and Two-Dimensional Convolution,' The Fourier Transform and Its Applications, 3rd Edition, McGraw-Hill, pp.25-50 & 243-244, 1999. K. Burbeck, S. G. Andres, S. Nadjm-Tehrani, M. Semling, and T. Dagonnier, “Time as a Metric for Defence in Survivable Networks,” Proceedings of the Work in Progress session of the 24th IEEE Real-Time Systems Symposium (RTSS’03), December 2003. H. C. Cankaya and V. S. S. Nair, “Accelerated Reliability Analysis for Self-Healing SONET Networks,” Proceedings of the ACM SIGCOMM'98 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pp.268-277, October 1998. D.-Y. Chen, S. Garg, and K. S. Trivedi, “Network Survivability Performance Evaluation: A Quantitative Approach with Applications in Wireless Ad-hoc Networks,” Proceedings of the 5th ACM International Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems (MSWiM’02), pp.61-68, September 2002. J. Choi, M. J. Realff, and J. H. Lee, “An Algorithmic Framework for Improving Heuristic Solutions Part I: A Deterministic Discount Coupon Traveling Salesman Problem,” Computers & Chemical Engineering, Volume 28, Issue 8, pp.1285-1296, July 2004. L. Cloth and B. R. Haverkort, “Model Checking for Survivability,” Proceedings of the 2nd International Conference on the Quantitative Evaluation of Systems, pp.145-154, September 2005. S. Dharmaraja, V. Jindal, and U. Varshney, “Reliability and Survivability Analysis for UMTS Networks - An Analytical Approach,” IEEE Transactions on Network and Service Management, Volume 5, Issue 3, pp.132-142, September 2008. J. E. Eggleston, S. Jamin, T. P. Kelly, J. K. Mackie-Mason, W. E. Walsh, and M. P. Wellman, “Survivability through Market Based Adaptivity: the MARX Project,” Proceedings of the 2000 DARPA Information Survivability Conference and Exposition (DISCEX’00), Volume 2, pp.145-156, January 2000. R. J. Ellison, D. A. Fisher, R. C. Linger, H. F. Lipson, T. A. Longstaff, and N. R. Mead, “Survivable Network Systems: An Emerging Discipline,” Technical Report CMU/SEI-97-TR-013, Software Engineering Institute, Carnegie Mellon University, November 1997 (Revised: May 1999). R. J. Ellison and A. P. Moore, “Architectural Refinement for the Design of Survivable Systems,” Technical Notes CMU/SEI-2001-TN-008, Software Engineering Institute, Carnegie Mellon University, October 2001. M. Faloutsos, P. Faloutsos, and C. Faloutsos, “On Power-Law Relationships of the Internet Topology,” ACM SIGCOMM Computer Communication Review, Volume 29, Issue 4, pp. 251-262, October 1999. M. L. Fisher, “The Lagrangean Relaxation Method for Solving Integer Programming Problems,” Management Science, Volume 27, Number 1, pp.1-18, January 1981. M. L. Fisher, “An Application Oriented Guide to Lagrangean Relaxation,” Interfaces, Volume 15, Number 2, pp.10-21, April 1985. C. Fung, Y.-L. Chen, X. Wang, J. Lee, R. Tarquini, M. Anderson, and R. Linger, “Survivability Analysis of Distributed Systems Using Attack Tree Methodology,” Proceedings of the 2005 IEEE Military Communications Conference (MILCOM'05), Volume 1, pp.583-589, October 2005. N. Garg, R. Simha, and W. Xing, “Algorithms for Budget-Constrained Survivable Topology Design,” Proceedings of the 2002 IEEE International Conference on Communications (ICC’02), Volume 4, pp.2162-2166, April 2002. A. M. Geoffrion, “Lagrangean Relaxation and its Use in Integer Programming,” Mathematical Programming Study, Volume 2, pp.82-114, 1974. S. P. Gorman, L. Schintler, R. Kulkarni, and R. Stough, “The Revenge of Distance: Vulnerability Analysis of Critical Information Infrastructure,” Journal of Contingencies and Crisis Management, Volume 12, Issue 2, pp.48-63, June 2004. A. A. Hagin, “Performability, Reliability, and Survivability of Communication Networks: System of Methods and Models for Evaluation,” Proceedings of the 14th International Conference on Distributed Computing Systems, pp.562-573, June 1994. K. Hausken, “Defense and Attack of Complex and Dependent Systems,” Reliability Engineering and System Safety, Volume 95, Issue 1, pp.29–42, January 2010. P. E. Heegaard and K. S. Trivedi, “Network Survivability Modeling,” Computer Networks, Volume 53, Issue 8, pp.1215-1234, June 2009. M. Held, P. Wolfe, and H. P. Crowder, “Validation of Subgradient Optimization,” Mathematical Programming, Volume 6, Number 1, pp.62-88, 1974. M. A. Hiltunen, R. D. Schlichting, C. A. Ugarte, and G. T. Wong, “Survivability through Customization and Adaptability: The Cactus Approach,” Proceedings of the 2000 DARPA Information Survivability Conference and Exposition (DISCEX’00), Volume 1, pp.294-307, January 2000. M. A. Hiltunen, R. D. Schlichting, and C. A. Ugarte, “Building Survivable Services Using Redundancy and Adaptation,” IEEE Transactions on Computers, Volume 52, Number 2, pp.181-194, February 2003. K. S. Ho and K. W. Cheung, “Generalized Survivable Network,” IEEE/ACM Transactions on Networking, Volume 15, Issue 4, pp.750-760, August 2007. S. Huffman, T. Altes, and K. Chahine, “Issues for Proliferated Survivable Network Design,” Proceedings of the 1988 IEEE Military Communications Conference (MILCOM‘88), Volume 2, pp.489-492, October 1988. S. Jha, J. Wing, R. Linger, and T. Longstaff, “Survivability Analysis of Network Specifications,” Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN’00), pp.613-622, June 2000. S. Jha and J. M. Wing, “Survivability Analysis of Networked Systems,” Proceedings of the 23rd International Conference on Software Engineering (ICSE'01), pp.307-317, May 2001. T.-Z. Jiang, “A New Definition on Survivability of Communication Networks,” Proceedings of the 1991 IEEE Military Communications Conference (MILCOM'91), Volume 3, pp.901-904, November 1991. E. Jonsson and T. Olovsson, “A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior,” IEEE Transactions of Software Engineering, Volume 23, Issue 4, pp.235-245, April 1997. H. Kalyoncu and B. Sankur, “Estimation of Survivability of Communication Networks,” IEEE Electronics Letters, Volume 28, Issue 19, pp.1790-1791, September 1992. L. Kant, H. Kim, D.-P. Hsing, and T.-H. Wu, “Modeling and Simulation Study of Survivability Mechanisms in WDM-based High-speed Networks,” Proceedings of the 1999 IEEE Global Telecommunications Conference (GLOBECOM‘99), Volume 1B, pp.1028-1034, December 1999. M. Keshtgary, F. A. Al-Zahrani, and A. P. Jayasumana, “Network Survivability Performance Evaluation with Applications in WDM Networks with Wavelength Conversion,” Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks (LCN’04), pp.344-351, November 2004. D. S. Kim, K. M. Shazzad, and J. S. Park, “A Framework of Survivability Model for Wireless Sensor Network,” Proceedings of the 1st International Conference on Availability, Reliability and Security (ARES’06), pp.515-522, April 2006. D. S. Kim and J. S. Park, “A Survivable Distributed Sensor Networks through Stochastic Models,” Lecture Notes in Computer Science (LNCS), Volume 4331, pp.185-194, December 2006. J. C. Knight, K. J. Sullivan, M. C. Elder, and C. Wang, “Survivability Architectures: Issues and Approaches,” Proceedings of the 2000 DARPA Information Survivability Conference and Exposition (DISCEX’00), Volume 2, pp.157-171, January 2000. J. C. Knight, E. A. Strunk, and K. J. Sullivan, “Towards a Rigorous Definition of Information System Survivability,” Proceedings of the 2003 DARPA Information Survivability Conference and Exposition (DISCEX’03), Volume 1, pp.78-89, April 2003. A. W. Krings and A. Azadmanesh, “A Graph Based Model for Survivability Applications,” European Journal of Operational Research, Volume 164, Issue 3, pp.680-689, August 2005. K. Kyamakya, K. Jobmann, and M. Meincke, “Security and Survivability of Distributed Systems: An Overview,” Proceedings of the 21st Century Military Communications Conference (MILCOM'00), Volume 1, pp.449-454, October 2000. K. G. Laretto, “Sprint Network Survivability,” Proceedings of the 1994 IEEE Military Communications Conference, Volume 2, pp.375-379, October 1994. G. Levitin, “Optimal Defense Strategy against Intentional Attacks,” IEEE Transactions on Reliability, Volume 56, Issue 1, pp.148-157, March 2007. S. C. Liew and K. W. Lu, “A Framework for Network Survivability Characterization,” Proceedings of the 1992 IEEE International Conference on Communications (ICC'92), Volume 1, pp.405-410, June 1992. S. C. Liew and K. W. Lu, “A Framework for Characterizing Disaster-based Network Survivability,” IEEE Journal on Selected Areas in Communications, Volume 12, Issue 1, pp.52-58, January 1994. X. Lin, R. Xu, and M. Zhu, “Survivability Computation of Networked Information Systems,” Lecture Notes in Computer Science (LNCS), Volume 3802, pp.407-414, December 2005. R. C. Linger, N. R. Mead, and H. F. Lipson, “Requirements Definition for Survivable Network Systems,” Proceedings of the 3rd International Conference on Requirements Engineering (ICRE’98), pp.14-23, April 1998. R. C. Linger and A. P. Moore, “Foundations for Survivable System Development: Service Traces, Intrusion Traces, and Evaluation Models,” Technical Report CMU/SEI-2001-TR-029, Software Engineering Institute, Carnegie Mellon University, October 2001. H. F. Lipson and D. A. Fisher, “Survivability ─ A New Technical and Business Perspective on Security,” Proceedings of the 1999 Workshop on New Security Paradigms (NSPW’99), pp.33-39, September 1999. Y. Liu and K. S. Trivedi, “A General Framework for Network Survivability Quantification,” Proceedings of the 12th GI/ITG Conference on Measuring, Modeling and Evaluation of Computer and Communication Systems, pp.369-378, September 2004. Y. Liu, V. B. Mendiratta, and K. S. Trivedi, “Survivability Analysis of Telephone Access Network,” Proceedings of the 15th IEEE International Symposium on Software Reliability Engineering (ISSRE’04), pp.367-377, November 2004. Y. Liu and K. S. Trivedi, “Survivability Quantification - The Analytical Modeling Approach,” International Journal of Performability Engineering, Volume 2, Number 1, pp.29-44, January 2006. S. Louca, A. Pitsillides, and G. Samaras, “On Network Survivability Algorithms Based on Trellis Graph Transformations,” Proceedings of the 4th IEEE International Symposium on Computers and Communications (ISCC’99), pp.235-243, July 1999. K.-W. Lye and J. M. Wing, “Game Strategies in Network Security,” International Journal of Information Security, Volume 4, Numbers 1-2, pp.71-86, February. 2005. Z. Ma and A. W. Krings, “Survival Analysis Approach to Reliability, Survivability and Prognostics and Health Management (PHM),” Proceedings of the 2008 IEEE Aerospace Conference, pp.1-20, March 2008. N. R. Mead, “Panel: Issues in Software Engineering for Survivable Systems,” Proceedings of the 21st International Conference on Software Engineering (ICSE’99), pp.592-593, May 1999. N. R. Mead, R. J. Ellison, R. C. Linger, T. Longstaff, and J. McHugh, “Survivable Network Analysis Method,” Technical Report CMU/SEI-2000-TR-013, Software Engineering Institute, Carnegie Mellon University, September 2000. D. Medhi, “A Unified Framework for Survivable Telecommunications Network Design,” Proceedings of the 1992 IEEE International Conference on Communications (ICC'92), Volume 1, pp.411-415, June 1992. D. Medhi and D. Tipper, “Multi-layered Network Survivability-models, Analysis, Architecture, Framework and Implementation: An Overview,” Proceedings of the 2000 DARPA Information Survivability Conference and Exposition (DISCEX’00), Volume 1, pp.173-186, January 2000. M. Milena, D. Shallcross, N. Dean, and M. Mostrel, “A Commercial Application of Survivable Network Design,” Proceedings of the 7th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA’96), pp.279-287, January 1996. S. D. Moitra and S. L. Konda, “A Simulation Model for Managing Survivability of Networked Information Systems,” Technical Report CMU/SEI-2000-TR-020, Software Engineering Institute, Carnegie Mellon University, December 2000. W. Molisz, “Survivability Function—A Measure of Disaster-Based Routing Performance,” IEEE Journal on Selected Areas in Communications, Volume 22, Issue 9, pp.1876-1883, November 2004. Y.-S. Myung, H.-J. Kim, and D.-W. Tcha, “Design of Communication Networks with Survivability Constraints,” Management Science, Volume 45, Number 2, pp.238-252, February 1999. National Security Agency, “Information Assurance Technical Framework (IATF)”, Release 3.1, September 2002. P. G. Neumann, “Survivable Systems,” Communications of the ACM, Volume 35, Number 5, pp.130, May 1992. D. M. Nicol, W. H. Sanders, and K. S. Trivedi, “Model-Based Evaluation: From Dependability to Security,” IEEE Transactions on Dependable and Secure Computing, Volume 1, Number 1, pp. 48-65, January-March 2004. S. D. Nikolopoulos, A. Pitsillides, and D. Tipper, “Addressing Network Survivability Issues by Finding the K-best Paths through A Trellis Graph,” Proceedings of the16th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM’97), Volume 1, pp.370-377, April 1997. K. Park, K. Lee, S. Park, and H. Lee, “Telecommunication Node Clustering with Node Compatibility and Network Survivability Requirements,” Management Science, Volume 46, Number 3, pp. 363-374, March 2000. Y. Qian, K. Lu, and D. Tipper, “A Design for Secure and Survivable Wireless Sensor Networks,” IEEE Wireless Communications, Volume 14, Issue 5, pp.30-37, October 2007. S. Rani, A. K. Sharma, and P. Singh, “Resource Allocation Strategies for Survivability in WDM Optical Networks,” Optical Fiber Technology, Volume 13, Issue 3, pp.202-208, July 2007. G. H. Sasaki and C.-F. Su, “The Interface between IP and WDM and Its Effect on the Cost of Survivability,” IEEE Communications Magazine, Volume 41, Issue 1, pp.74-79, January 2003. A. Shamir, “How to Share a Secret,” Communications of the ACM, Volume 22, Issue 11, pp.612-613, November 1979. B. B. M. Shao, “Optimal Redundancy Allocation for Information Technology Disaster Recovery in the Network Economy,” IEEE Transactions on Dependable and Secure Computing, Volume 2, Issue 3, pp. 262-267, July-September 2005. J. Shi and J. P. Fonseka, “Traffic-based Survivability Analysis of Telecommunications Networks,” Proceedings of the 1995 IEEE Global Telecommunications Conference (GLOBECOM‘95), Volume 2, pp.936-940, November 1995. G. Siganos, M. Faloutsos, P. Faloutsos, and C. Faloutsos, “Power-Laws and the AS-level Internet Topology,” IEEE/ACM Transactions on Networking, Volume 11, Issue 4, pp. 514-524, August 2003. M. Sivakumar and K. M. Sivalingam, “A Routing Algorithm Framework for Survivable Optical Networks Based on Resource Consumption Minimization,” Journal of Lightwave Technology, Volume 25, Issue 7, pp.1684-1692, July 2007. J. C. Smith, C. Lim, and F. Sudargho, “Survivable Network Design under Optimal and Heuristic Interdiction Scenarios,” Journal of Global Optimization, Volume 38, Number 2, pp.181-199, June 2007. A. P. Snow, U. Varshney, and A. D. Malloy, “Reliability and Survivability of Wireless and Mobile Networks,” Computer, Volume 33, Issue 7, pp.49-55, July 2000. A. Snow, P. Rastogi, and G. Weckman, “Assessing Dependability of Wireless Networks Using Neural Networks,” Proceedings of the 2005 IEEE Military Communications Conference (MILCOM’05), Volume 5, pp.2809-2815, October 2005. A. Stewart, “On Risk: Perception and Direction,” Computers and Security, Volume 23, Issue 5, pp.362-370, July 2004. K. Struyve, B. V. Caenegem, K. V. Doorselare, M. Gryseels, and P. Demeester, “Design and Evaluation of Multi-layer Survivability for SDH-based ATM Networks,” Proceedings of the 1997 IEEE Global Telecommunications Conference (GLOBECOM‘97), Volume 3, pp.1466-1470, November 1997. K. J. Sullivan, S. Geist, and P. Shaw, “Mediators in Infrastructure Survivability Enhancement,” Proceedings of the 3rd International Workshop on Software Architecture (ISAW’98), pp.141-144, November 1998. K. J. Sullivan, J. C. Knight, X. Du, and S. Geist, “Information Survivability Control Systems,” Proceedings of the 21st International Conference on Software Engineering (ICSE’99), pp.184-192, May 1999. T1A1.2 Working Group on Network Survivability Performance, “Technical Report on Enhanced Network Survivability Performance,” Technical Report Number 68, ATIS-T1.TR.68-2001, February 2001. D. Tipper, S. Ramaswamy, and T. Dahlberg, “PCS Network Survivability,” Proceedings of the 1999 IEEE Wireless Communications and Networking Conference (WCNC‘99), Volume 2, pp.1028-1032, September 1999. D. Tipper, T. Dahlberg, H. Shin, and C. Charnsripinyo, “Providing Fault Tolerance in Wireless Access Networks,” IEEE Communications Magazine, Volume 40, Issue 1, pp.58-64, January 2002. D. Tipper, C. Charnsripinyo, H. Shin, and T. Dahlberg, “Survivability Analysis for Mobile Cellular Networks,” Proceedings of the 2002 Conference on Communication Networks and Distributed Systems Modeling and Simulation (CNDS’02), January 2002. J. M. Voas, and A. K. Ghosh, “Software Fault Injection for Survivability,” Proceedings of the 2000 DARPA Information Survivability Conference and Exposition (DISCEX’00), Volume 2, pp.338-346, January 2000. H. Wang, J. Wang, and G. Zhao, “A Comprehensive Assessment Method for Network Survivability,” Proceedings of the 2008 International Conference on Internet Computing in Science and Engineering (ICICSE’08), pp.335-338, January 2008. H. Wang, G. Zhao, and J. Wang, “A Strategy Selection Model for Network Survivability,” Proceedings of the 2008 International Conference on Internet Computing in Science and Engineering (ICICSE’08), pp.332-334, January 2008. H. F. Wedde, S. Bohm, and W. Freund, “Adaptive Protocols for Survivability of Transactions Operating on Replicated Objects,” Proceedings of the 6th International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS'01), pp.169-176, January 2001. V. R. Westmark, “A Definition for Information System Survivability,” Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS’04), Volume 9, p.90303.1, January 2004. L. Wu and P. K. Varshney, “On Survivability Measures for Military Networks,” Proceedings of the 1990 IEEE Military Communications Conference (MILCOM'90), A New Era, Volume 3, pp.1120-1124, October 1990. W. Yurcik, D. Doss, and H. Kruse, “Survivability-Over-Security: Providing Whole System Assurance,” Proceedings of the 2000 Information Survivability Workshop, pp.201-204, October 2000. L.-J. Zhang, W. Wang, L. Guo, W. Yang, and Y.-T. YANG, “A Survivability Quantitative Analysis Model for Network System Based on Attack Graph,” Proceedings of the 2007 International Conference on Machine Learning and Cybernetics, pp.3211-3216, August 2007. L.-J. Zhang, L. Guo, W. Yang, W. Wang, and Y. Yang, “An Efficient Survivability Hierarchy Analysis Model for Networked Information System,” Proceedings of the 2007 International Conference on Computational Intelligence and Security (CIS’07), pp.759-762, December 2007. D. Zhou and S. Subramaniam, “Survivability in Optical Networks,” IEEE Network, Volume 14, Issue 6, pp.16-23, November-December 2000. A. Zolfaghari and F. J. Kaudel, “Framework for Network Survivability Performance,” IEEE Journal on Selected Areas in Communications, Volume 12, Issue 1, pp.46-51, January 1994. ATIS Telecom Glossary, http://www.atis.org/glossary/definition.aspx?id=1039, 2007 (Original: “Federal Standard 1037C”, August 1996). SANS-ISC (SysAdmin, Audit, Network, Security Institute - Internet Storm Center), http://isc.sans.org/survivaltime.html. WIKIPEDIA (The Free Encyclopedia), http://en.wikipedia.org/wiki/Main_Page. | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/48381 | - |
dc.description.abstract | 自從美國9/11恐怖攻擊活動以降,安全議題已受到全球之高度重視,特別是如何以效果與效率兼備的方式,保護對社會運作至為重要之關鍵資訊基礎建設。從商業的觀點與脈絡來看,資訊安全漸次著重於管理各類型風險,並逐漸由探討「絕對的安全性」延伸至「相對的存活性(Survivability)」,也就是關注在確保資訊可用性及服務持續性(Service Continuity)。為了有效提升網路遭到智慧型攻擊後的存活性,防禦者(網路營運者)必須對所管控之網路,投注其有限的資源並加以妥善配置,用來建立各類型安全防禦機制。另防禦者在建立其防禦資源配置策略(Resource Allocation Strategy)之際,亦需同步考量潛在攻擊者會隨著其所採行防禦策略之不同、所引致攻擊策略之調整。
本論文主要針對網路攻防(Network Attack and Defense)議題,從防禦者的觀點探討如何推導出適切的資源配置策略來嚇阻智慧型攻擊,以提升網路存活性,並進而降低整體風險。我們係從防禦者在建立資源配置策略時所需考量的三個重要因素(核心節點之數量、攻擊作為之相依性、防禦資源投資之效用)來進行分析;植基於這三個要素,我們建立了一個整合性的框架用以分類網路存活性問題,該框架並提供防禦者一個較為宏觀的角度來進行資源配置之決策。 由於此些問題的本質具備高度複雜性與困難度,為求得近似最佳化的決策品質與時效,我們運用數學規劃法(Mathematical Programming)之最佳化(Optimization)技巧為基礎方略、使用數學最佳化模型來描述網路存活性問題、採用拉格蘭日鬆弛法(Lagrangean Relaxation)進行求解(此法在解決複雜度高之最佳化數學問題上有較佳之表現),並輔以基於該法之解題過程所妥善設計出的啟發式演算法,來解決這一系列最佳化問題,是故本論文中各網路存活性問題之實驗結果相較於一般性方法所得之實驗結果,獲致了相當程度之效能改良。 本論文之貢獻包括:採行一種系統性的流程進行網路存活性文獻之探討;針對網路存活性問題,提出一個整合性的框架,用以幫助防禦者建立資源配置策略;發展出一個一般性的最佳化模型,來描述各類網路存活性問題之共同假設、概念及數學模型結構;針對真實環境中的網路存活性問題,使用適切的數學最佳化模型來描述;植基於拉格蘭日鬆弛法,發展出近似最佳化的啟發式演算法來解題;各問題的實驗結果顯示出設計防禦策略時所應考量的重要參數及因素,並提供適切的工程指引與建議給防禦者進行資源配置時之參考。 | zh_TW |
dc.description.abstract | Since the 9/11 terrorist attacks in the United States, the focus on security has become increasingly global, especially the effective and efficient protection of critical information infrastructures that are crucial to society. From a business perspective and context, information security has expanded to embrace risk management and evolved into a new concept called survivability, which focuses on ensuring the availability of information and the continuity of services. To enhance survivability, a defender (network operator) must invest a fixed amount of resources and distribute it among different defensive measures appropriately. The defender’s strategy should consider that an attacker will constantly adjust his strategy to achieve his goals.
In this dissertation, we focus on the crucial research domain that enables defenders to gain a global understanding of how to derive adequate resource allocation strategies against intelligent attackers in the context of network survivability. We also analyze three key characteristics of resource allocation (core node(s), attack action dependency, and defensive investment effectiveness) that defenders should consider when designing their defense strategies. Based on these characteristics, we create an integrated framework, which provides a comprehensive macro view of decision-making for defenders to categorize network survivability problems. We express attack-defense problems in terms of mathematical formulations, solution approaches, and the experimental performance of the approaches. To solve these complicated optimization-based problems, we apply the Lagrangean Relaxation (LR) method as our main solution approach. In addition, we propose several optimization-based techniques and heuristics to address different categories of network survivability problems. The contributions of this dissertation are as follows: a systematic process is adopted to conduct a survey of the literature on network survivability; an integrated framework of network survivability problems is proposed to help defenders design defense resource allocation strategies; a generic optimization model is developed to describe the common assumptions, concepts, and structures in the mathematical formulations; and suitable mathematical formulations are presented to model complex real-world network survivability problems clearly. In addition; based on the LR approach with related Lagrangean multipliers, we have developed several heuristics to solve the optimization problems. The related experiments identify the parameters, variables, issues, and characteristics that should be considered when designing a defense strategy, and also provide engineering guidelines or references for defenders. | en |
dc.description.provenance | Made available in DSpace on 2021-06-15T06:54:37Z (GMT). No. of bitstreams: 1 ntu-100-D91725002-1.pdf: 1248690 bytes, checksum: 216bf0bf6d68e7270491579982e89cba (MD5) Previous issue date: 2011 | en |
dc.description.tableofcontents | 口試委員會審定書 I
論文摘要 V Dissertation Abstract VII Table of Contents IX List of Figures XII List of Tables XIV Chapter 1 Introduction 1 1.1 Overview 1 1.2 Motivation and Purpose 3 1.3 Literature Survey 5 1.4 Research Approach 12 1.5 Research Scope 17 1.6 Generic Model of Research Problems 22 1.7 Dissertation Organization 31 Chapter 2 Near Optimal Protection Strategies for Network Survivability 33 2.1 Overview 33 2.2 Problem Formulation 34 2.2.1 Problem Description and Assumptions of Problem 1 34 2.2.2 Mathematical Formulation of Problem 1 36 2.2.3 Problem Description and Assumptions of Problem 2 39 2.2.4 Mathematical Formulation of Problem 2 42 2.3 Solution Approach 50 2.3.1 Lagrangean Relaxation of Problem 1 50 2.3.2 Getting Primal Feasible Solutions for Problem 1 52 2.3.3 Lagrangean Relaxation of Problem 2 53 2.3.4 Getting Primal Feasible Solutions for Problem 2 57 2.4 Computational Experiments 58 2.4.1 Experimental Results and Findings for Problem 1 58 2.4.2 Experimental Results and Findings for Problem 2 62 2.5 Concluding Remarks 69 2.5.1 Concluding Remarks on Problem 1 70 2.5.2 Concluding Remarks on Problem 2 71 Chapter 3 Near Optimal Defense Resource Allocation Strategies for Network Survivability when Accumulated Attack Experience is Considered 73 3.1 Overview 73 3.2 Problem Formulation 73 3.2.1 Problem Description and Assumptions of Problem 3 73 3.2.2 Mathematical Formulation of Problem 3 76 3.3 Solution Approach 81 3.3.1 Solution Approach for the AEA Model of Problem 3 81 3.3.2 Solution Approach for Problem 3 84 3.3.2.1 Lagrangean Relaxation of Problem 3 84 3.3.2.2 Getting Primal Feasible Solutions for Problem 3 86 3.4 Computational Experiments 88 3.4.1 Experimental Results and Findings for Problem 3 88 3.5 Concluding Remarks 91 Chapter 4 Near Optimal Protection Strategies for Survivability of Multiple Core Nodes 93 4.1 Overview 93 4.2 Problem Formulation 93 4.2.1 Problem Description and Assumptions of Problem 4 93 4.2.2 Mathematical Formulation of Problem 4 96 4.2.3 Mathematical Formulation of the AS Model for Problem 4 100 4.3 Solution Approach 102 4.3.1 Solution Approach for the AS Model of Problem 4 102 4.3.1.1 Lagrangean Relaxation of the AS Model 102 4.3.1.2 Getting Primal Feasible Solutions for the AS Model 107 4.3.2 Solution Approach for Problem 4 109 4.4 Computational Experiments 111 4.4.1 Experimental Results and Findings for the AS Model of Problem 4 111 4.4.2 Experimental Results and Findings for Problem 4 122 4.5 Concluding Remarks 128 Chapter 5 Near Optimal Redundancy and Defense Resource Allocation Strategies for Survivability of Multiple Core Nodes 131 5.1 Overview 131 5.2 Problem Formulation 131 5.2.1 Problem Description and Assumptions of Problem 5 131 5.2.2 Mathematical Formulation of Problem 5 135 5.2.3 Mathematical Formulation of the AEA Model for Problem 5 142 5.3 Solution Approach 144 5.3.1 Solution Approach for the AEA Model of Problem 5 144 5.3.1.1 Lagrangean Relaxation of the AEA Model 144 5.3.1.2 Getting Primal Feasible Solutions for the AEA Model 148 5.3.2 Solution Approach for Problem 5 148 5.4 Computational Experiments 150 5.4.1 Experimental Results and Findings for the AEA Model of Problem 5 150 5.4.2 Experimental Results and Findings for Problem 5 156 5.5 Concluding Remarks 162 Chapter 6 Conclusion and Future Research 165 6.1 Conclusion 165 6.2 Future Research 168 References 171 Appendix A The Survey Result of Survivability Literatures 181 Appendix B The Summary of Survivability Definitions 203 Appendix C The Threat Types of Survivability by Level of Analysis 213 Appendix D The Analysis Metrics of Survivability by Level of Analysis 217 | |
dc.language.iso | en | |
dc.title | 以最佳化技術為基礎之網路存活性優化法 | zh_TW |
dc.title | An Optimization-based Methodology for Maximization of Network Survivability against Intelligent Attacks | en |
dc.type | Thesis | |
dc.date.schoolyear | 99-1 | |
dc.description.degree | 博士 | |
dc.contributor.oralexamcommittee | 翁崇雄,謝清佳,趙啟超,呂俊賢 | |
dc.subject.keyword | 拉格蘭日鬆弛法,數學規劃法,網路攻防,存活性,最佳化,資源配置策略,服務持續性, | zh_TW |
dc.subject.keyword | Lagrangean Relaxation,Mathematical Programming,Network Attack and Defense,Survivability,Optimization,Resource Allocation Strategy,Service Continuity, | en |
dc.relation.page | 218 | |
dc.rights.note | 有償授權 | |
dc.date.accepted | 2011-02-11 | |
dc.contributor.author-college | 管理學院 | zh_TW |
dc.contributor.author-dept | 資訊管理學研究所 | zh_TW |
顯示於系所單位: | 資訊管理學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-100-1.pdf 目前未授權公開取用 | 1.22 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。