透過您的圖書館登入
IP:3.147.103.202
  • 學位論文

達成資訊洩漏程度最小化之近似最佳化防禦資源配置策略

Near Optimal Network Defense Resource Allocation Strategies for the Minimization of Information Leakage

指導教授 : 林永松

摘要


網際網路的普及和便利造成人們對網路的依賴,然而這也使得網路犯罪有機可乘。資訊竊取是造成最嚴重損失的網路犯罪之一,它不但造成金錢、財產之類的有形損失,還讓無形的企業及個人聲譽受損;因此如何幫助網際網路發展有效防禦策略,以降低資訊洩露的程度,就成了急需探討的研究議題。 在這篇論文中,我們將一個攻防情境轉化成二階的數學規劃問題;其中內層問題(AS模型)敘述一個惡意攻擊者該如何配置其有限攻擊資源到目標網路,以竊取最多的機敏資訊,而在外層問題(DRAS模型)中,目標網路的管理者則希望能有效配置其有限防禦資源,來將由資訊洩漏所引發的損失最小化。為了求得此問題的最佳解,我們採用以拉格蘭日鬆弛法為基礎的演算法來處理AS模型,而利用以次梯度法為基礎的演算法來處理DRAS模型。

並列摘要


Dependency on the Internet is giving cyber criminals increasing opportunities to steal information. Information theft, one of the most damaging cyber-crimes, not only causes property damage and monetary loss to victims, it can also ruin their reputations. As a result, research into developing defense strategies against information theft on the Internet is a pressing need. In this paper, we model an offence-defense scenario as a two-level mathematical programming problem. In the inner problem, defined by the AS model, an attacker allocates his limited attack power intelligently to the targeted network in order to steal as much valuable information as possible. Meanwhile, in the outer problem, defined by the DRAS model, the operator of the targeted network allocates limited defense resources appropriately to minimize the damage incurred by information theft. The Lagrangean relaxation-based algorithm is adopted to solve the AS problem, and a subgradient-based algorithm is proposed to solve the DRAS problem.

參考文獻


[4] J.C. Knight, E.A. Strunk, and K.J. Sullivan, “Towards a Rigorous Definition of Information System Survivability,” Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX 2003), Volume 1, pp.78-89, April 2003.
[6] R.J. Ellison, D.A. Fisher, R.C. Linger, H.F. Lipson, T.A. Longstaff, and N.R. Mead, “Survivable Network Systems: An Emerging Discipline,” Technical Report CMU/SEI-97-TR-013, Software Engineering Institute, Carnegie Mellon University, November 1997 (Revised: May 1999).
[9] V.R. Westmark, “A Definition for Information System Survivability,” Proceedings of the 37th IEEE Hawaii International Conference on System Sciences, Volume 9, p. 90303.1, 2004.
[12] S. Louca, A. Pitsillides and G. Samaras, “On Network Survivability Algorithms Based on Trellis Graph Transformations,” Fourth IEEE Symposium on Computers and Communications (ISCC”99), pp. 235-243, July 1999,
[14] R. Albert, H. Jeong, and A.-L. Barabási, “Error and Attack Tolerance of Complex Networks,” Nature, Volume 406, pp. 378-382, July 2000.

延伸閱讀