透過您的圖書館登入
IP:18.222.156.75
  • 學位論文

考量惡意攻擊情況下多階段防禦資源分配以最大化網路存活度之修復與資源重分配策略

Recovery and Resource Reallocation Strategies to Maximize Network Survivability for Multi-Stage Defense Resource Allocation under Malicious Attacks

指導教授 : 林永松

摘要


網際網路豐富了我們的生活,卻也為個人與企業帶來許多資訊安全威脅。由於網際網路使攻擊者能不限時間與地點的進行攻擊,所以難以保持網路系統能永久的安全。因此,如何評估網路存活度,是一個重要且值得探討的議題。在本篇論文中,我們提出了一個新的網路存活指標稱為平均網路分割度(Average Degree of Disconnectivity, Average DOD )。Average DOD指標結合機率的概念與DOD指標,以評估所有情況下之網路破壞程度,其值越大表示網路破壞的程度越高。 我們模擬一個網路攻防情境問題,並建立一個最佳化資源配置目標之數學模型,並以Average DOD指標評量網路在多階段攻防情境下的網路存活度,以提供網路營運者來預測網路攻防雙方最有可能採取的資源分配策略。在此情境中,每階段中攻擊者利用資源對網路中的節點進行攻擊;同時防禦者透過重新分配資源,並使用防禦資源於修復已被攻克的節點與防禦存活節點上。在求解過程中,採用了「梯度法」及「賽局」技巧協助尋找出攻防雙方的最佳化資源分配決策。

並列摘要


The Internet enriches our lives, but it also brings lots of threats to individuals and cooperates from information security. It is difficult to keep network safe forever because cyber attacker could launch attack through the network unlimited by time and space. Consequently, it is a more and more important and critical issue about how to efficiently evaluate network survivability. In this thesis, an innovative metric called Average Degree of Disconnectivity (Average DOD) is proposed. The Average DOD combining the concept of the probability calculated by contest success function with the DOD metric would be used to evaluate the damage degree of network. The larger value of the Average DOD, the more damage degree of the network would be. A multi-stage network attack-defense scenario as a mathematical model would be used to support network operators to predict that all the likelihood strategies both cyber attacker and network defender would take. In addition, the Average DOD would be used to evaluate damage degree of network. In each stage, the attacker could use the attack resources to launch attack on the nodes of network. On the other hand, the network defender could reallocate existed resources of defender to recover compromised nodes and allocate defense resources to protect survival nodes of network. In the process of problem solving, the “gradient method” and “game theory” would be adopted to find the optimal resource allocation strategies for both cyber attacker and network defender.

參考文獻


[4] S. Jhay, J. Wingy, R. Lingerz and T. Longstaffz, “Survivability Analysis of Network Specifications”, International Conference on Dependable Systems and Networks, IEEE, pp. 53-58, 2000.
[5] U.S. Department of Commerce, National Telecommunications and Information Administration, Institute for Telecommunications Services, ATIS Telecom Glossary 2007.
[8] F. Xing and W. Wang, “On the Survivability of Wireless Ad Hoc Networks with Node Misbehaviors and Failures”, IEEE Transactions on Dependable and Secure Computing, Volume 7, 2010.
[9] W. Jiang, B.X. Fang, H.l. Zhang and Z.H. Tian, “A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy”, International Conference on Computational Intelligence and Security, 2007.
[10] W. Jiang, B.X. Fang, H.l. Zhang and Z.H. Tian, “Optimal Network Security Strengthening Using Attack-Defense Game Model”, Sixth International Conference on Information Technology: New Generations, 2009.

延伸閱讀