A Near-Optimal Redundancy Allocation Policy to Minimize System Vulnerability against Hazardous Events and Malicious Attacks
碩士 === 國立臺灣大學 === 資訊管理學研究所 === 95 === Modern organizations have increasingly relied on information technology to facilitate daily business operations. However, the dependency is built upon an environment where hazardous events happen frequently and malicious attacks emerge in an endless stream. To a...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2007
|
Online Access: | http://ndltd.ncl.edu.tw/handle/27717984998726634904 |
id |
ndltd-TW-095NTU05396034 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-095NTU053960342015-12-07T04:04:12Z http://ndltd.ncl.edu.tw/handle/27717984998726634904 A Near-Optimal Redundancy Allocation Policy to Minimize System Vulnerability against Hazardous Events and Malicious Attacks 考量危害事件與惡意攻擊下系統脆弱度最小化之近似最佳化冗餘配置策略 Kun-Dao Jiang 江坤道 碩士 國立臺灣大學 資訊管理學研究所 95 Modern organizations have increasingly relied on information technology to facilitate daily business operations. However, the dependency is built upon an environment where hazardous events happen frequently and malicious attacks emerge in an endless stream. To attain the objective of “continuity of services”, we propose an approach based on redundancy allocation to reduce the possibility of threats occurring to an acceptable degree. In the thesis, we formulate a “battle” between the attacker and the network into a two-level programming problem. In the inner problem (ARS model) an attacker allocates the limited attack powers to maximize the vulnerability of network against hazardous events. Contrarily, in the outer problem (RAPMA model) a defender attempts to minimize the damages by deploying redundant components appropriately with the limited budgets. We develop a Lagrangean Relaxation-based algorithm to solve the programming problem efficiently. 林永松 2007 學位論文 ; thesis 80 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣大學 === 資訊管理學研究所 === 95 === Modern organizations have increasingly relied on information technology to facilitate daily business operations. However, the dependency is built upon an environment where hazardous events happen frequently and malicious attacks emerge in an endless stream. To attain the objective of “continuity of services”, we propose an approach based on redundancy allocation to reduce the possibility of threats occurring to an acceptable degree.
In the thesis, we formulate a “battle” between the attacker and the network into a two-level programming problem. In the inner problem (ARS model) an attacker allocates the limited attack powers to maximize the vulnerability of network against hazardous events. Contrarily, in the outer problem (RAPMA model) a defender attempts to minimize the damages by deploying redundant components appropriately with the limited budgets. We develop a Lagrangean Relaxation-based algorithm to solve the programming problem efficiently.
|
author2 |
林永松 |
author_facet |
林永松 Kun-Dao Jiang 江坤道 |
author |
Kun-Dao Jiang 江坤道 |
spellingShingle |
Kun-Dao Jiang 江坤道 A Near-Optimal Redundancy Allocation Policy to Minimize System Vulnerability against Hazardous Events and Malicious Attacks |
author_sort |
Kun-Dao Jiang |
title |
A Near-Optimal Redundancy Allocation Policy to Minimize System Vulnerability against Hazardous Events and Malicious Attacks |
title_short |
A Near-Optimal Redundancy Allocation Policy to Minimize System Vulnerability against Hazardous Events and Malicious Attacks |
title_full |
A Near-Optimal Redundancy Allocation Policy to Minimize System Vulnerability against Hazardous Events and Malicious Attacks |
title_fullStr |
A Near-Optimal Redundancy Allocation Policy to Minimize System Vulnerability against Hazardous Events and Malicious Attacks |
title_full_unstemmed |
A Near-Optimal Redundancy Allocation Policy to Minimize System Vulnerability against Hazardous Events and Malicious Attacks |
title_sort |
near-optimal redundancy allocation policy to minimize system vulnerability against hazardous events and malicious attacks |
publishDate |
2007 |
url |
http://ndltd.ncl.edu.tw/handle/27717984998726634904 |
work_keys_str_mv |
AT kundaojiang anearoptimalredundancyallocationpolicytominimizesystemvulnerabilityagainsthazardouseventsandmaliciousattacks AT jiāngkūndào anearoptimalredundancyallocationpolicytominimizesystemvulnerabilityagainsthazardouseventsandmaliciousattacks AT kundaojiang kǎoliàngwēihàishìjiànyǔèyìgōngjīxiàxìtǒngcuìruòdùzuìxiǎohuàzhījìnshìzuìjiāhuàrǒngyúpèizhìcèlüè AT jiāngkūndào kǎoliàngwēihàishìjiànyǔèyìgōngjīxiàxìtǒngcuìruòdùzuìxiǎohuàzhījìnshìzuìjiāhuàrǒngyúpèizhìcèlüè AT kundaojiang nearoptimalredundancyallocationpolicytominimizesystemvulnerabilityagainsthazardouseventsandmaliciousattacks AT jiāngkūndào nearoptimalredundancyallocationpolicytominimizesystemvulnerabilityagainsthazardouseventsandmaliciousattacks |
_version_ |
1718146439761100800 |