透過您的圖書館登入
IP:3.142.96.146
  • 學位論文

考量智慧攻擊與天然災害下透過機密共享與防禦資源分配以最大化網路存活度之研究

Maximization of Network Survivability with Secret Sharing and Defense Resource Allocation Against Intelligent Attacks and Natural Disasters

指導教授 : 林永松

摘要


近年來,由於網際網路與資訊科技的發展,越來越多的交易服務提供都在網路上。越來越多的企業開始在網路上提供服務與創造新的事業,正因如此,持續性的服務提供與可靠的資料儲存對於企業與客戶來說越來越重要。然而,網路世界的駭客也隨著科技發展使得攻擊手法與能力與日俱增,協同攻擊就是一個很好的例子。一群網路上的攻擊者可以一起合作來發動協同攻擊,他能帶給目標網路更大更強的傷害。另一方面,在真實世界上常常會發生許多的天然災害,舉例來說,台灣在1999年發生的921大地震與日本在2011年發生的311大地震伴隨著海嘯,都帶來了巨大的生命財產損失。 由於這些天災人禍,它們可能會對於企業網路產生重大的影響,企業必須要抵抗這些惡意攻擊與天然災害來使得使用者能持續使用網路服務,並且有著安全的資料儲存空間。因此,本研究的目標就是要幫助企業找到一個好的防禦方式來抵抗這些惡意攻擊與天然災害。基於數學規劃與Monte Carlo simulation,我們將採用“Definition of Gradient”與“Local Information Estimation”來找到一個最佳的資源分配方式,讓防禦者能在有限資源下達到對大的防禦效果。

並列摘要


Nowadays, more and more transactions and services are provided on internet, thanks to the development of the Internet and information technologies. There are many enterprises provide businesses and services on internet. Therefore, service continuity and data storage reliability are very important to both companies and customers. However, attackers like hackers have being more and more powerful and skillful on cyber-attacks. For example, collaborative attack is a powerful attack method that enables a group of attackers working together and every attacker can cooperate with each other. Therefore, attackers can group together and make more powerful attack on their target network because of collaborative attack. Moreover, enterprise network may be impacted by serious natural disasters. For example, the earthquake on September 21, 1999 in Taiwan and the one on March 11, 2011 in Japan which was followed by a large tsunami. They both caused tremendous damages in society. Enterprises and organizations may face with varieties of threats such as cyber-attacks and natural disasters. These threats could cause serious impact on company network or system. It is important for system or network to improve its robustness by adopting Quality of Service (QoS) requirements on user service satisfaction and data storage, so that all categories of malicious assaults and natural disasters can be prevented. Our goal is to help defender find out the trade-off balance and offer a guideline to allocate defense resources. Since the attacking process might be complicated and non-deterministic, we resort to the Monte Carlo simulation method to simulate a variety of feasible attack strategies. First, we look for a powerful and efficient attack method to attack target network. Then, we carry out an attack-defense simulation and gather information to evaluate the optimal method of allocating defense resources according to the topology and defending strategies.

參考文獻


[1] Symantec, Inc., “State of Security Survey”, 2011
[4] UNESCAP, UNISDR “The Asia-Pacific Disaster Report 2010”,The UN Office for Disaster Risk Reduction (UNISDR) and the UN Economic and Social Commission for Asia and the Pacific (ESCAP), October 2010
[5] UNESCAP, UNISDR “The Asia-Pacific Disaster Report 2012”,The UN Office for Disaster Risk Reduction (UNISDR) and the UN Economic and Social Commission for Asia and the Pacific (ESCAP), October 2012
[6] Ramirez-Marquez, J.E. and Rocco, C. (2012), “Vulnerability Based Robust Protection Strategy. Selection in Service Networks”, Computers & Industrial Engineering, Volume 63, Issue 1, August 2012, Pages 235–242
[7] Li Wang, Shangping Ren, Ke Yue, and Kevin Kwiat, "Optimal Resource Allocation for Protecting System Availability against Random Cyber Attacks", Proceedings of IEEE Conference on Computer Research and Development, 2011

延伸閱讀