Maximization of Network Survivability via Defense Resource Allocation under Multi-Stage Attack-Defense Scenarios by Using Optimization Techniques

博士 === 國立臺灣大學 === 資訊管理學研究所 === 104 === Internet has become worldwide, publicly accessible network of interconnected computer networks. Specifically, it becomes the tools that terrorists can use to attack the nations and their economy or enterprises. Thus, it becomes an important and critical issue a...

Full description

Bibliographic Details
Main Authors: Pei-Yu Chen, 陳霈語
Other Authors: 林永松
Format: Others
Language:en_US
Published: 2016
Online Access:http://ndltd.ncl.edu.tw/handle/85758790506503275633
Description
Summary:博士 === 國立臺灣大學 === 資訊管理學研究所 === 104 === Internet has become worldwide, publicly accessible network of interconnected computer networks. Specifically, it becomes the tools that terrorists can use to attack the nations and their economy or enterprises. Thus, it becomes an important and critical issue about how to efficiently evaluate network survivability for any network operator in a nation or an enterprise. We intent to proposed an effective and accurate network survivability metric to provide some engineering guidelines to improve network security. In this research, an innovative metric called Average Degree of Disconnectivity (Average DOD) is proposed. It combining the concept of the probability calculated by contest success function with the DOD metric would be used to evaluate the damage degree of network. The larger value of the Average DOD, the more damage degree of the network would be. A multi-stage network attack-defense scenario as a mathematical model is used to support network operators to predict that all the likelihood strategies both cyber attacker and network defender would take in this research. In addition, the Average DOD would be used to evaluate damage degree of network. In each stage, the attacker could use the attack resources to launch attack on the nodes of the target network. On the other hand, the network defender could reallocate existed resources of defender to recover compromised nodes and allocate defense resources to protect survival nodes of network. In the process of problem solving, the optimization techniques is adopted to find the optimal resource allocation strategies for both cyber attacker and mobile network defender.