An Optimization-based Methodology for Maximization of Network Survivability against Intelligent Attacks
博士 === 國立臺灣大學 === 資訊管理學研究所 === 99 === Since the 9/11 terrorist attacks in the United States, the focus on security has become increasingly global, especially the effective and efficient protection of critical information infrastructures that are crucial to society. From a business perspective and co...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2011
|
Online Access: | http://ndltd.ncl.edu.tw/handle/30094081716751225601 |
id |
ndltd-TW-099NTU05396013 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-099NTU053960132015-10-28T04:11:43Z http://ndltd.ncl.edu.tw/handle/30094081716751225601 An Optimization-based Methodology for Maximization of Network Survivability against Intelligent Attacks 以最佳化技術為基礎之網路存活性優化法 Po-Hao (Joseph) Tsang 臧柏皓 博士 國立臺灣大學 資訊管理學研究所 99 Since the 9/11 terrorist attacks in the United States, the focus on security has become increasingly global, especially the effective and efficient protection of critical information infrastructures that are crucial to society. From a business perspective and context, information security has expanded to embrace risk management and evolved into a new concept called survivability, which focuses on ensuring the availability of information and the continuity of services. To enhance survivability, a defender (network operator) must invest a fixed amount of resources and distribute it among different defensive measures appropriately. The defender’s strategy should consider that an attacker will constantly adjust his strategy to achieve his goals. In this dissertation, we focus on the crucial research domain that enables defenders to gain a global understanding of how to derive adequate resource allocation strategies against intelligent attackers in the context of network survivability. We also analyze three key characteristics of resource allocation (core node(s), attack action dependency, and defensive investment effectiveness) that defenders should consider when designing their defense strategies. Based on these characteristics, we create an integrated framework, which provides a comprehensive macro view of decision-making for defenders to categorize network survivability problems. We express attack-defense problems in terms of mathematical formulations, solution approaches, and the experimental performance of the approaches. To solve these complicated optimization-based problems, we apply the Lagrangean Relaxation (LR) method as our main solution approach. In addition, we propose several optimization-based techniques and heuristics to address different categories of network survivability problems. The contributions of this dissertation are as follows: a systematic process is adopted to conduct a survey of the literature on network survivability; an integrated framework of network survivability problems is proposed to help defenders design defense resource allocation strategies; a generic optimization model is developed to describe the common assumptions, concepts, and structures in the mathematical formulations; and suitable mathematical formulations are presented to model complex real-world network survivability problems clearly. In addition; based on the LR approach with related Lagrangean multipliers, we have developed several heuristics to solve the optimization problems. The related experiments identify the parameters, variables, issues, and characteristics that should be considered when designing a defense strategy, and also provide engineering guidelines or references for defenders. 林永松 2011 學位論文 ; thesis 218 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
博士 === 國立臺灣大學 === 資訊管理學研究所 === 99 === Since the 9/11 terrorist attacks in the United States, the focus on security has become increasingly global, especially the effective and efficient protection of critical information infrastructures that are crucial to society. From a business perspective and context, information security has expanded to embrace risk management and evolved into a new concept called survivability, which focuses on ensuring the availability of information and the continuity of services. To enhance survivability, a defender (network operator) must invest a fixed amount of resources and distribute it among different defensive measures appropriately. The defender’s strategy should consider that an attacker will constantly adjust his strategy to achieve his goals.
In this dissertation, we focus on the crucial research domain that enables defenders to gain a global understanding of how to derive adequate resource allocation strategies against intelligent attackers in the context of network survivability. We also analyze three key characteristics of resource allocation (core node(s), attack action dependency, and defensive investment effectiveness) that defenders should consider when designing their defense strategies. Based on these characteristics, we create an integrated framework, which provides a comprehensive macro view of decision-making for defenders to categorize network survivability problems.
We express attack-defense problems in terms of mathematical formulations, solution approaches, and the experimental performance of the approaches. To solve these complicated optimization-based problems, we apply the Lagrangean Relaxation (LR) method as our main solution approach. In addition, we propose several optimization-based techniques and heuristics to address different categories of network survivability problems.
The contributions of this dissertation are as follows: a systematic process is adopted to conduct a survey of the literature on network survivability; an integrated framework of network survivability problems is proposed to help defenders design defense resource allocation strategies; a generic optimization model is developed to describe the common assumptions, concepts, and structures in the mathematical formulations; and suitable mathematical formulations are presented to model complex real-world network survivability problems clearly. In addition; based on the LR approach with related Lagrangean multipliers, we have developed several heuristics to solve the optimization problems. The related experiments identify the parameters, variables, issues, and characteristics that should be considered when designing a defense strategy, and also provide engineering guidelines or references for defenders.
|
author2 |
林永松 |
author_facet |
林永松 Po-Hao (Joseph) Tsang 臧柏皓 |
author |
Po-Hao (Joseph) Tsang 臧柏皓 |
spellingShingle |
Po-Hao (Joseph) Tsang 臧柏皓 An Optimization-based Methodology for Maximization of Network Survivability against Intelligent Attacks |
author_sort |
Po-Hao (Joseph) Tsang |
title |
An Optimization-based Methodology for Maximization of Network Survivability against Intelligent Attacks |
title_short |
An Optimization-based Methodology for Maximization of Network Survivability against Intelligent Attacks |
title_full |
An Optimization-based Methodology for Maximization of Network Survivability against Intelligent Attacks |
title_fullStr |
An Optimization-based Methodology for Maximization of Network Survivability against Intelligent Attacks |
title_full_unstemmed |
An Optimization-based Methodology for Maximization of Network Survivability against Intelligent Attacks |
title_sort |
optimization-based methodology for maximization of network survivability against intelligent attacks |
publishDate |
2011 |
url |
http://ndltd.ncl.edu.tw/handle/30094081716751225601 |
work_keys_str_mv |
AT pohaojosephtsang anoptimizationbasedmethodologyformaximizationofnetworksurvivabilityagainstintelligentattacks AT zāngbǎihào anoptimizationbasedmethodologyformaximizationofnetworksurvivabilityagainstintelligentattacks AT pohaojosephtsang yǐzuìjiāhuàjìshùwèijīchǔzhīwǎnglùcúnhuóxìngyōuhuàfǎ AT zāngbǎihào yǐzuìjiāhuàjìshùwèijīchǔzhīwǎnglùcúnhuóxìngyōuhuàfǎ AT pohaojosephtsang optimizationbasedmethodologyformaximizationofnetworksurvivabilityagainstintelligentattacks AT zāngbǎihào optimizationbasedmethodologyformaximizationofnetworksurvivabilityagainstintelligentattacks |
_version_ |
1718114150002982912 |