A Near-Optimal Redundancy Allocation Policy to Minimize System Vulnerability against Hazardous Events and Malicious Attacks

碩士 === 國立臺灣大學 === 資訊管理學研究所 === 95 === Modern organizations have increasingly relied on information technology to facilitate daily business operations. However, the dependency is built upon an environment where hazardous events happen frequently and malicious attacks emerge in an endless stream. To a...

Full description

Bibliographic Details
Main Authors: Kun-Dao Jiang, 江坤道
Other Authors: 林永松
Format: Others
Language:en_US
Published: 2007
Online Access:http://ndltd.ncl.edu.tw/handle/27717984998726634904
id ndltd-TW-095NTU05396034
record_format oai_dc
spelling ndltd-TW-095NTU053960342015-12-07T04:04:12Z http://ndltd.ncl.edu.tw/handle/27717984998726634904 A Near-Optimal Redundancy Allocation Policy to Minimize System Vulnerability against Hazardous Events and Malicious Attacks 考量危害事件與惡意攻擊下系統脆弱度最小化之近似最佳化冗餘配置策略 Kun-Dao Jiang 江坤道 碩士 國立臺灣大學 資訊管理學研究所 95 Modern organizations have increasingly relied on information technology to facilitate daily business operations. However, the dependency is built upon an environment where hazardous events happen frequently and malicious attacks emerge in an endless stream. To attain the objective of “continuity of services”, we propose an approach based on redundancy allocation to reduce the possibility of threats occurring to an acceptable degree. In the thesis, we formulate a “battle” between the attacker and the network into a two-level programming problem. In the inner problem (ARS model) an attacker allocates the limited attack powers to maximize the vulnerability of network against hazardous events. Contrarily, in the outer problem (RAPMA model) a defender attempts to minimize the damages by deploying redundant components appropriately with the limited budgets. We develop a Lagrangean Relaxation-based algorithm to solve the programming problem efficiently. 林永松 2007 學位論文 ; thesis 80 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立臺灣大學 === 資訊管理學研究所 === 95 === Modern organizations have increasingly relied on information technology to facilitate daily business operations. However, the dependency is built upon an environment where hazardous events happen frequently and malicious attacks emerge in an endless stream. To attain the objective of “continuity of services”, we propose an approach based on redundancy allocation to reduce the possibility of threats occurring to an acceptable degree. In the thesis, we formulate a “battle” between the attacker and the network into a two-level programming problem. In the inner problem (ARS model) an attacker allocates the limited attack powers to maximize the vulnerability of network against hazardous events. Contrarily, in the outer problem (RAPMA model) a defender attempts to minimize the damages by deploying redundant components appropriately with the limited budgets. We develop a Lagrangean Relaxation-based algorithm to solve the programming problem efficiently.
author2 林永松
author_facet 林永松
Kun-Dao Jiang
江坤道
author Kun-Dao Jiang
江坤道
spellingShingle Kun-Dao Jiang
江坤道
A Near-Optimal Redundancy Allocation Policy to Minimize System Vulnerability against Hazardous Events and Malicious Attacks
author_sort Kun-Dao Jiang
title A Near-Optimal Redundancy Allocation Policy to Minimize System Vulnerability against Hazardous Events and Malicious Attacks
title_short A Near-Optimal Redundancy Allocation Policy to Minimize System Vulnerability against Hazardous Events and Malicious Attacks
title_full A Near-Optimal Redundancy Allocation Policy to Minimize System Vulnerability against Hazardous Events and Malicious Attacks
title_fullStr A Near-Optimal Redundancy Allocation Policy to Minimize System Vulnerability against Hazardous Events and Malicious Attacks
title_full_unstemmed A Near-Optimal Redundancy Allocation Policy to Minimize System Vulnerability against Hazardous Events and Malicious Attacks
title_sort near-optimal redundancy allocation policy to minimize system vulnerability against hazardous events and malicious attacks
publishDate 2007
url http://ndltd.ncl.edu.tw/handle/27717984998726634904
work_keys_str_mv AT kundaojiang anearoptimalredundancyallocationpolicytominimizesystemvulnerabilityagainsthazardouseventsandmaliciousattacks
AT jiāngkūndào anearoptimalredundancyallocationpolicytominimizesystemvulnerabilityagainsthazardouseventsandmaliciousattacks
AT kundaojiang kǎoliàngwēihàishìjiànyǔèyìgōngjīxiàxìtǒngcuìruòdùzuìxiǎohuàzhījìnshìzuìjiāhuàrǒngyúpèizhìcèlüè
AT jiāngkūndào kǎoliàngwēihàishìjiànyǔèyìgōngjīxiàxìtǒngcuìruòdùzuìxiǎohuàzhījìnshìzuìjiāhuàrǒngyúpèizhìcèlüè
AT kundaojiang nearoptimalredundancyallocationpolicytominimizesystemvulnerabilityagainsthazardouseventsandmaliciousattacks
AT jiāngkūndào nearoptimalredundancyallocationpolicytominimizesystemvulnerabilityagainsthazardouseventsandmaliciousattacks
_version_ 1718146439761100800