透過您的圖書館登入
IP:18.118.2.15
  • 學位論文

考量自然災害與智慧型攻擊下確保服務持續性之冗餘及防禦資源配置演算法

Redundancy and Defense Resource Allocation Algorithms to Assure Service Continuity against Natural Disasters and Intelligent Attackers

指導教授 : 林永松

摘要


近年來企業持續營運管理逐漸受到企業組織的重視。於此範疇中,災害復原計畫是與資訊科技最息息相關的部分。而在實踐災害復原計畫的眾多辦法之中,冗餘的佈署是一項常被採用的有效解決方案;然而,過往探討冗餘配置問題的研究多聚焦於可靠性系統,較少著力於企業組織多所仰賴的網路系統。故本論文在考慮網路環境特性的條件之下,旨於將冗餘與額外防禦有效地搭配運用於網路系統,一方面達成其服務之持續性,另方面則提升其抵抗具備經驗累積能力之惡意攻擊的存活度。 於此論文中,我們建構了一個攻防雙方彼此角力的攻防情境,之後將其轉化為一個兩階段的非線性整數規劃問題:在內層問題(AEA模型)中,具備絕對經驗累積能力的攻擊者透過選擇適當的目標進行攻擊,企圖以最小化的成本攻克網路中的所有核心節點;反觀外層問題(RAP-EDM模型),防禦者則在有限的防禦資源預算之下,透過適當地佈署冗餘與額外防禦,以最大化被攻擊者最小化的總體攻擊成本。其後,我們採用以拉格蘭日鬆弛法為基礎的方法解決上述問題,並藉由電腦實驗結果證明所提出解決方案之優異性。

並列摘要


In recent years, Business Continuity Management (BCM) has become an important issue to organizations. Within the scope of BCM, Disaster Recovery Planning (DRP) is one of the most IT-related problems, and redundancy is a frequently used approach to implement DRP. However, previous research on Redundancy Allocation Problem (RAP) focused on dealing with the problems related to reliable systems, instead of network systems that organizations rely on. Therefore, we discuss RAP in network environments. By efficient use of redundancy together with extra defense mechanisms, we attempt to ensure a network’s service continuity, and enhance its survivability against malicious attackers that utilizes accumulated experience. We construct an attack/defense scenario, in which an attacker and a defender competing against each other, and formulate it as a two-phase nonlinear integer programming problem. In the inner problem, AEA model, the attacker that utilizes accumulated experience attempts to minimize the total attack cost of compromising all core nodes in the network by choosing appropriate targets to compromise. By contrast, in the outer problem, RAP-EDM model, the defender allocates proper redundancy and extra defense mechanisms to maximize the minimized total attack cost under the consideration of a limited defense budget. We adopt a Lagrangean Relaxation-based solution approach to resolve the problem above, and further prove the efficacy of our approach by computer experiments.

參考文獻


[14] D.A. Fisher, H.F. Lipson, N.R. Mead, R.C. Linger, R.J. Ellison, and T. Longstaff, “Survivable Network Systems: An Emerging Discipline,” Technical Report CMU/SEI-97-TR-013, November 1997 (Revised: May 1999).
[1] M.J. Cerullo and V. Cerullo, “Business Continuity Planning: A Comprehensive Approach,” Information Systems Management, Volume 21, No. 3, pp. 70-78, June 2004.
[2] B. B.M. Shao, “Optimal Redundancy Allocation for Information Technology Disaster Recovery in the Network Economy,” IEEE Transactions on Dependable and Secure Computing, Volume 2, No. 3, pp. 262-267, July-September 2005.
[4] British Standard Institution (BSI), “BS25999,” November 2006.
[5] Frost & Sullivan and (ISC)2, “The 2008 (ISC)2 Global Information Security Workforce Study,” April 2008.

延伸閱讀