透過您的圖書館登入
IP:3.144.42.196
  • 學位論文

網路特徵與攻擊防禦策略之關係

Characteristics of a Network vs. Protection Strategies against Attacks

指導教授 : 蔡憶佳

摘要


現實世界中的各種網路,往往是龐大且複雜的,在資訊安全的議題上,研究者提出了各種模擬現實網路結構的數學模型,來做為資訊安全的實驗平台。本研究設定攻擊與防禦者的策略,攻擊者進行有目的的攻擊行為,而防禦者以有限的資源進行防禦,本研究以提高攻擊者的攻擊成本為目的,在資源防禦的前提下,研究不同網路的網路特徵,對於資源分配的防禦方式有何影響。

並列摘要


The real networks are always large and complex. The researchers propose the mathematical models to simulate real network structure. In order to research the topic about relation between network characteristics and the issue of the information security, this paper creates a platform to simulate protection strategies against attacks. We set up several attack and protection strategies in three network models. The attacker carries out the purpose of attack. And the protector use limited resources to improve the defenses of network. For increase the cost of attacks, we will analyze characteristics of the network, and show the impact of the protection.

參考文獻


[2] V. R. Westmark, “A Definition for Information System Survivability,” Proceedings of the 37th IEEE Hawaii International Conference on System Sciences (HICSS’04), p. 90303.1, Volume 9, 2004.
[3] Y. S. Lin, P. H. Tsang, C. H. Chen, C. L. Tseng, Y. L. Lin, “Evaluation of Network Robustness for Given Defense Resource Allocation Strategies,” Proceedings of 1st International Conference on Availability, Reliability and Security (ARES'06), pp. 182-189, 2006.
[4] F. Y. S. Lin, P. H. Tsang, Y. L. Lin, “Near Optimal Protection Strategies Against Targeted Attacks on the Core Node of a Network,” Proceedings of 2nd International Conference on Availability, Reliability and Security (ARES'07), pp. 213-222, 2007.
[7] F. Black, R. Litterman, “Global Portfolio Optimization,” Financial Analysts Journal, pp. 28-43, 1992.
[8] T. Lewis and J. Rinzel, “Self-organized synchronous oscillations in a network of excitable cells coupled by gap junctions,” Network Comput. Neural Syst. 11, pp. 299-320, 2000.

延伸閱讀