The Study of Network Attrack and Defense Modeling

碩士 === 國防大學中正理工學院 === 資訊科學研究所 === 93 === Nowadays, the security of a computer network system has become a central part of the information warfare (IW), because the computer network is one of the primary ways for sending military commands and control information during the war. A fatal attack to a co...

Full description

Bibliographic Details
Main Authors: Yu Wan Yu, 余琬瑜
Other Authors: 陳宗煦
Format: Others
Language:zh-TW
Published: 2005
Online Access:http://ndltd.ncl.edu.tw/handle/09368920708648327449
id ndltd-TW-093CCIT0394001
record_format oai_dc
spelling ndltd-TW-093CCIT03940012015-10-13T12:56:40Z http://ndltd.ncl.edu.tw/handle/09368920708648327449 The Study of Network Attrack and Defense Modeling 網路攻防演練模式之研究 Yu Wan Yu 余琬瑜 碩士 國防大學中正理工學院 資訊科學研究所 93 Nowadays, the security of a computer network system has become a central part of the information warfare (IW), because the computer network is one of the primary ways for sending military commands and control information during the war. A fatal attack to a computer network system can cause the whole system a catastrophic destruction. As a result, it is worthy to pay our attentions to the study of the different computer network attack/defense actions to keep the network system secure. Our objective of this study is to classify and quantify the IW attack/defense actions in a computer network system. The proposed model is based on multivariate statistical analysis to analyze the different IW attack/defense actions. After studies, we provide a quantified method to measure the vitality of the different attack/defense actions. In the proposed model, we assume that the quantified value of the vitality of an attack/defense action can be calculated by a linear equation of some important factors. We collect weights of these factors in the linear equation from a survey to senior military information officers. In order to make these weights appropriation, advanced discussion with information exports were executed during our study. Then, we use multivariate statistical analysis method to analyze the different IW attack/defense actions and find out their principle components. These components make up the actions similar to those factors do. In other words, these components are just another way to describe the actions. We examine the multivariate statistical analysis results and give meanings to these components. With these components, we have a quantified method to value the vitality of the future IW attack/defense actions. Our result can also support the other military applications and risk assessments. In the military applications, our model can calculate the ability scores of different attack/defense actions. The ability scores are important index to help us make decisions. In the risk assessments, we can use the model to analyze the sensitivity of information equipments about their confidentiality, integrity, and availability. After the analysis, we have the components that make up the specific information equipments. These components give us the information about the possibility that the specific information equipment were intruded. 陳宗煦 蔡輝榮 2005 學位論文 ; thesis 67 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國防大學中正理工學院 === 資訊科學研究所 === 93 === Nowadays, the security of a computer network system has become a central part of the information warfare (IW), because the computer network is one of the primary ways for sending military commands and control information during the war. A fatal attack to a computer network system can cause the whole system a catastrophic destruction. As a result, it is worthy to pay our attentions to the study of the different computer network attack/defense actions to keep the network system secure. Our objective of this study is to classify and quantify the IW attack/defense actions in a computer network system. The proposed model is based on multivariate statistical analysis to analyze the different IW attack/defense actions. After studies, we provide a quantified method to measure the vitality of the different attack/defense actions. In the proposed model, we assume that the quantified value of the vitality of an attack/defense action can be calculated by a linear equation of some important factors. We collect weights of these factors in the linear equation from a survey to senior military information officers. In order to make these weights appropriation, advanced discussion with information exports were executed during our study. Then, we use multivariate statistical analysis method to analyze the different IW attack/defense actions and find out their principle components. These components make up the actions similar to those factors do. In other words, these components are just another way to describe the actions. We examine the multivariate statistical analysis results and give meanings to these components. With these components, we have a quantified method to value the vitality of the future IW attack/defense actions. Our result can also support the other military applications and risk assessments. In the military applications, our model can calculate the ability scores of different attack/defense actions. The ability scores are important index to help us make decisions. In the risk assessments, we can use the model to analyze the sensitivity of information equipments about their confidentiality, integrity, and availability. After the analysis, we have the components that make up the specific information equipments. These components give us the information about the possibility that the specific information equipment were intruded.
author2 陳宗煦
author_facet 陳宗煦
Yu Wan Yu
余琬瑜
author Yu Wan Yu
余琬瑜
spellingShingle Yu Wan Yu
余琬瑜
The Study of Network Attrack and Defense Modeling
author_sort Yu Wan Yu
title The Study of Network Attrack and Defense Modeling
title_short The Study of Network Attrack and Defense Modeling
title_full The Study of Network Attrack and Defense Modeling
title_fullStr The Study of Network Attrack and Defense Modeling
title_full_unstemmed The Study of Network Attrack and Defense Modeling
title_sort study of network attrack and defense modeling
publishDate 2005
url http://ndltd.ncl.edu.tw/handle/09368920708648327449
work_keys_str_mv AT yuwanyu thestudyofnetworkattrackanddefensemodeling
AT yúwǎnyú thestudyofnetworkattrackanddefensemodeling
AT yuwanyu wǎnglùgōngfángyǎnliànmóshìzhīyánjiū
AT yúwǎnyú wǎnglùgōngfángyǎnliànmóshìzhīyánjiū
AT yuwanyu studyofnetworkattrackanddefensemodeling
AT yúwǎnyú studyofnetworkattrackanddefensemodeling
_version_ 1716870370790735872