The Study of Network Attrack and Defense Modeling
碩士 === 國防大學中正理工學院 === 資訊科學研究所 === 93 === Nowadays, the security of a computer network system has become a central part of the information warfare (IW), because the computer network is one of the primary ways for sending military commands and control information during the war. A fatal attack to a co...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2005
|
Online Access: | http://ndltd.ncl.edu.tw/handle/09368920708648327449 |
id |
ndltd-TW-093CCIT0394001 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-093CCIT03940012015-10-13T12:56:40Z http://ndltd.ncl.edu.tw/handle/09368920708648327449 The Study of Network Attrack and Defense Modeling 網路攻防演練模式之研究 Yu Wan Yu 余琬瑜 碩士 國防大學中正理工學院 資訊科學研究所 93 Nowadays, the security of a computer network system has become a central part of the information warfare (IW), because the computer network is one of the primary ways for sending military commands and control information during the war. A fatal attack to a computer network system can cause the whole system a catastrophic destruction. As a result, it is worthy to pay our attentions to the study of the different computer network attack/defense actions to keep the network system secure. Our objective of this study is to classify and quantify the IW attack/defense actions in a computer network system. The proposed model is based on multivariate statistical analysis to analyze the different IW attack/defense actions. After studies, we provide a quantified method to measure the vitality of the different attack/defense actions. In the proposed model, we assume that the quantified value of the vitality of an attack/defense action can be calculated by a linear equation of some important factors. We collect weights of these factors in the linear equation from a survey to senior military information officers. In order to make these weights appropriation, advanced discussion with information exports were executed during our study. Then, we use multivariate statistical analysis method to analyze the different IW attack/defense actions and find out their principle components. These components make up the actions similar to those factors do. In other words, these components are just another way to describe the actions. We examine the multivariate statistical analysis results and give meanings to these components. With these components, we have a quantified method to value the vitality of the future IW attack/defense actions. Our result can also support the other military applications and risk assessments. In the military applications, our model can calculate the ability scores of different attack/defense actions. The ability scores are important index to help us make decisions. In the risk assessments, we can use the model to analyze the sensitivity of information equipments about their confidentiality, integrity, and availability. After the analysis, we have the components that make up the specific information equipments. These components give us the information about the possibility that the specific information equipment were intruded. 陳宗煦 蔡輝榮 2005 學位論文 ; thesis 67 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國防大學中正理工學院 === 資訊科學研究所 === 93 === Nowadays, the security of a computer network system has become a central part of the information warfare (IW), because the computer network is one of the primary ways for sending military commands and control information during the war. A fatal attack to a computer network system can cause the whole system a catastrophic destruction. As a result, it is worthy to pay our attentions to the study of the different computer network attack/defense actions to keep the network system secure.
Our objective of this study is to classify and quantify the IW attack/defense actions in a computer network system. The proposed model is based on multivariate statistical analysis to analyze the different IW attack/defense actions. After studies, we provide a quantified method to measure the vitality of the different attack/defense actions.
In the proposed model, we assume that the quantified value of the vitality of an attack/defense action can be calculated by a linear equation of some important factors. We collect weights of these factors in the linear equation from a survey to senior military information officers. In order to make these weights appropriation, advanced discussion with information exports were executed during our study.
Then, we use multivariate statistical analysis method to analyze the different IW attack/defense actions and find out their principle components. These components make up the actions similar to those factors do. In other words, these components are just another way to describe the actions. We examine the multivariate statistical analysis results and give meanings to these components. With these components, we have a quantified method to value the vitality of the future IW attack/defense actions.
Our result can also support the other military applications and risk assessments. In the military applications, our model can calculate the ability scores of different attack/defense actions. The ability scores are important index to help us make decisions. In the risk assessments, we can use the model to analyze the sensitivity of information equipments about their confidentiality, integrity, and availability. After the analysis, we have the components that make up the specific information equipments. These components give us the information about the possibility that the specific information equipment were intruded.
|
author2 |
陳宗煦 |
author_facet |
陳宗煦 Yu Wan Yu 余琬瑜 |
author |
Yu Wan Yu 余琬瑜 |
spellingShingle |
Yu Wan Yu 余琬瑜 The Study of Network Attrack and Defense Modeling |
author_sort |
Yu Wan Yu |
title |
The Study of Network Attrack and Defense Modeling |
title_short |
The Study of Network Attrack and Defense Modeling |
title_full |
The Study of Network Attrack and Defense Modeling |
title_fullStr |
The Study of Network Attrack and Defense Modeling |
title_full_unstemmed |
The Study of Network Attrack and Defense Modeling |
title_sort |
study of network attrack and defense modeling |
publishDate |
2005 |
url |
http://ndltd.ncl.edu.tw/handle/09368920708648327449 |
work_keys_str_mv |
AT yuwanyu thestudyofnetworkattrackanddefensemodeling AT yúwǎnyú thestudyofnetworkattrackanddefensemodeling AT yuwanyu wǎnglùgōngfángyǎnliànmóshìzhīyánjiū AT yúwǎnyú wǎnglùgōngfángyǎnliànmóshìzhīyánjiū AT yuwanyu studyofnetworkattrackanddefensemodeling AT yúwǎnyú studyofnetworkattrackanddefensemodeling |
_version_ |
1716870370790735872 |