:::

詳目顯示

回上一頁
題名:以最佳化技術為基礎之網路防禦方式最大化平均系統存活度
作者:王猷順
作者(外文):Yu-Shun Wang
校院名稱:國立臺灣大學
系所名稱:資訊管理學研究所
指導教授:林永松
學位類別:博士
出版日期:2016
主題關鍵詞:最佳化網路攻防不完整資訊資源分配數學規劃蒙地卡羅模擬法OptimizationNetwork Attack and DefenseIncomplete InformationResource AllocationMathematical ProgrammingMonte Carlo Simulation
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:141
本論文探討最大化網路平均存活度之問題,衡量存活度時,網路承擔的風險 (risk) 可作為一個合法的指標,其中攻方受限於一組描述其攻擊行為之參數 (profile) ,而防方受限於有限之總資源與策略,相較於過往研究,本文在攻防情境部份做出以下二點延伸,首先,不再需假設攻方對目標網路之結構與防禦資源配置具有完整資訊,再者,允許攻擊者對單一目標發動可產生綜效 (synergy) 之合作攻擊 (collaborative attack),衡量綜效之方式除採用經濟學之柯布-道格拉斯函數 (Cobb-Douglas function) 外,本文亦提出另一種考量參與者間交互關係之綜效模型。上述情境已塑模 (model) 為二個一般化之數學規劃問題,包括攻擊者問題 (commander problem) 以及防禦者問題 (defender problem) ,同時提出一套融合數學規劃以及模擬技巧之新穎的二階段解題方法。
具體而言,該法包括「目標函數評估階段 (objective function evaluation phase) 」以及「防禦策略優化階段 (defense policy enhancement phase) 」,於目標函數評估階段中,透過模擬 (simulation) 之技巧評估目前防禦策略之效度,而防禦策略優化階段則致力於調整目前之防禦策略使目標函數得以最佳化,本文提出以下三種優化方式: (一)、方向導函數定義法 (definition of directional derivatives) :該法透過數值方法 (numerical procedure) 依照方向導函數 (directional derivatives) 之定義求得每一決策變數之次梯度,進而優化防禦策略,該法在花費至多7.5小時之時間下可優化目標函數至少21%、 (二)、區域資訊估測法 (local information estimation) :此法充分利用目標函數評估階段所花費之運算資源,於模擬過程中收集重要資訊,將其視為次梯度之估測值,降低所需之執行時間,該法在花費至多1.8小時之時間下可優化目標函數至少13%、以及 (三)、混合優化法 (hybrid enhancement) :結合次梯度定義法以及區域資訊估測法之特性所開發出之優化法,以期兼具效率和效果,該法在花費至多2.0小時之時間下可優化目標函數至少28%。透過實驗結果,可清楚呈現上述解題方法與演算法之適用性和有效性。
In this dissertation, we consider the problem of maximizing network average survivability in a protected network subject to attacker profile/behavior constraints and defender resource/strategy constraints. When evaluating survivability, the risk of the network can be a legitimate metric. Compared with previous research, the following two enhancements are made. First, we no longer assume that complete information regarding the network topology and defense resource allocation is fully available for attackers. Second, collaborative attack, which produces synergy, is considered in this study. Besides measuring the synergy by Cobb-Douglas Function from economics, another model which takes member’s interrelationship to formulate synergy is proposed. The scenario is modeled as two generic mathematical programming problems (the commander problem and the defender problem), and a novel two-phase solution approach, which well combines mathematical programming and simulation techniques, is proposed.
More specifically, in the “Objective Function Evaluation Phase”, efficient and effective simulations are conducted to evaluate the effectiveness of the current defense policy; whereas, in the “Defense Policy Enhancement Phase”, three enhancement methods are proposed and compared, including: (1) definition of directional derivatives, which calculates directional derivatives of each decision variable through numerical procedure, it achieves at least 21% improvement and consumes at most 7.5 hours, (2) local information estimation, which applies easy-to-collect information gathered from the “Objective Function Evaluation Phase” to estimate directional derivatives of each decision variable, it achieves at least 13% improvement and consumes at most 1.8 hours, and (3) hybrid enhancement, which is developed to integrate advantages of above two methods, it achieves at least 28% improvement and consumes at most 2.0 hours. From computational experiments, applicability and effectiveness of the proposed framework and algorithms are clearly demonstrated.
1.Alison Cartlidge, A.H., Colin Rudd, Ivor Macfarlane, John Windebank, Stuart Rance An Introductory Overview of ITIL® V3. 2007. 56.
2.Levitin, G. and K. Hausken, Redundancy vs. protection vs. false targets for systems under attack. Reliability, IEEE Transactions on, 2009. 58(1): p. 58-68.
3.Li, Z., H. Liao, and D.W. Coit, A two-stage approach for multi-objective decision making with applications to system reliability optimization. Reliability Engineering & System Safety, 2009. 94(10): p. 1585-1592.
4.Crawford, D., Fiber optic cable dig-ups: Causes and cures. Proc. Network Reliability: A Report to the Nation–Compendium of Technical Papers, National Engineering Consortium, 1993.
5.Marianne Swanson, B.G. Generally Accepted Principles and Practices for Securing Information Technology Systems. 1996. 1-57.
6.Gary Stoneburner, A.G., and Alexis Feringa Risk Management Guide for Information Technology Systems. Recommendations of the National Institute of Standards and Technology, 2002. 1-41.
7.ISO, Information technology-Security techniques-Information security management systems-Requirements, 2005, International Organization for Standardization. p. 1-34.
8.IEC, Dependability management - Part 3: Application guide - Section 9: Risk analysis of technological systems, 1995, International Engineering Consortium. p. 1-67.
9.ISO, Risk management — Vocabulary, 2009.
10.ISO, Information technology - Security techniques - Code of practice for information security management 2005. p. 115.
11.Risk management. 2012 [cited 2012; Available from: http://en.wikipedia.org/wiki/Risk_management.
12.Ken Laudon, J.L., Management Information Systems. 2008: Pearson. 1-672.
13.Lipson, H.F. and D.A. Fisher. Survivability—a new technical and business perspective on security. in Proceedings of the 1999 workshop on New security paradigms. 1999. ACM.
14.Çetinkaya, E.K., et al., Modelling communication network challenges for future internet resilience, survivability, and disruption tolerance: A simulation-based approach. Telecommunication Systems, 2011: p. 1-16.
15.Sterbenz, J.P.G., et al., Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines. Computer Networks, 2010. 54(8): p. 1245-1265.
16.Ellison, R.J. and C. Woody, Survivability Analysis Framework, 2010, DTIC Document.
17.Ellison, R.J., et al., Survivable network systems: An emerging discipline, 1997, DTIC Document.
18.Roy, S., et al. A survey of game theory as applied to network security. in System Sciences (HICSS), 2010 43rd Hawaii International Conference on. 2010. IEEE.
19.Barth, A., et al., A learning-based approach to reactive security. Financial Cryptography and Data Security, 2010: p. 192-206.
20.Storm, D. Gmail hacked by cyber-spies. Google issues security warning for state-sponsored attacks, 2012.
21.InformationSecurityMediaGroup, Report: Obama Ordered Stuxnet Assault, in First Time U.S. Repeatedly Used Code to Cripple Infrastructure2012.
22.Schaffer, H.E., X as a service, cloud computing, and the need for good judgment. IT professional, 2009. 11(5): p. 4-5.
23.Zscaler. Web Security Suites. 2011; Available from: http://www.zscaler.com/productsataglance.html.
24.TrendMicro. Trend Micro Deep Security. 2011; Available from: http://tw.trendmicro.com/tw/products/enterprise/deep-security/index.html.
25.Ryu, C., et al., Security protection design for deception and real system regimes: A model and analysis. European Journal of Operational Research, 2010. 201(2): p. 545-556.
26.Webster, J. and R.T. Watson, Analyzing the past to prepare for the future: Writing a literature review. MIS Quarterly, 2002. 26(2): p. 10.
27.Edward Korczak, G.L., Survivability of systems under multiple factor impact. Reliability Engineering & System Safety, 2007. 92(2): p. 269-274.
28.Jose E. Ramirez-Marquez, C.M.R., Bethel A. Gebre, David W. Coit, Michael Tortorella, New insights on multi-state component criticality and importance. Reliability Engineering & System Safety, 2007. 92(12): p. 1608-1619.
29.Nagaraja, S. and R. Anderson, Dynamic topologies for robust scale-free networks. Bio-Inspired Computing and Communication, 2008: p. 411-426.
30.Tian, Z., M.J. Zuo, and H. Huang, Reliability-redundancy allocation for multi-state series-parallel systems. Reliability, IEEE Transactions on, 2008. 57(2): p. 303-310.
31.Cook, J.L. and J.E. Ramirez-Marquez, Reliability analysis of cluster-based ad-hoc networks. Reliability Engineering & System Safety, 2008. 93(10): p. 1512-1522.
32.Hausken, K., Strategic defense and attack for reliability systems. Reliability Engineering & System Safety, 2008. 93(11): p. 1740-1750.
33.Idika, N.C., B.H. Marshall, and B.K. Bhargava. Maximizing network security given a limited budget. in The Fifth Richard Tapia Celebration of Diversity in Computing Conference: Intellect, Initiatives, Insight, and Innovations. 2009. ACM.
34.Carroll, T.E. and D. Grosu, A game theoretic investigation of deception in network security. Security and Communication Networks, 2010. 4(10): p. 1162-1172.
35.Levitin, G. and K. Hausken, Meeting a demand vs. enhancing protections in homogeneous parallel systems. Reliability Engineering & System Safety, 2009. 94(11): p. 1711-1717.
36.Jenelius, E., J. Westin, and Å.J. Holmgren, Critical infrastructure protection under imperfect attacker perception. International Journal of Critical Infrastructure Protection, 2010. 3(1): p. 16-26.
37.Levitin, G. and K. Hausken, Separation in homogeneous systems with independent identical elements. European Journal of Operational Research, 2010. 203(3): p. 625-634.
38.Zhuang, J., V.M. Bier, and O. Alagoz, Modeling secrecy and deception in a multiple-period attacker–defender signaling game. European Journal of Operational Research, 2010. 203(2): p. 409-418.
39.Levitin, G. and L. Xing, Reliability and performance of multi-state systems with propagated failures having selective effect. Reliability Engineering & System Safety, 2010. 95(6): p. 655-661.
40.Peng, R., et al., Defending simple series and parallel systems with imperfect false targets. Reliability Engineering & System Safety, 2010. 95(6): p. 679-688.
41.Domingo-Ferrer, J. and Ú. González-Nicolás, Decapitation of networks with and without weights and direction: The economics of iterated attack and defense. Computer Networks, 2011. 55(1): p. 119-130.
42.Altunay, M., et al., Optimal response to attacks on the open science grid. Computer Networks, 2011. 55(1): p. 61-73.
43.Li, R., X. Wang, and X. Jiang. Network survivability against region failure. in Signal Processing, Communications and Computing (ICSPCC), 2011 IEEE International Conference on. 2011. IEEE.
44.Ramirez-Marquez, J.E., C.M. Rocco, and G. Levitin, Optimal network protection against diverse interdictor strategies. Reliability Engineering & System Safety, 2011. 96(3): p. 374-382.
45.Levitin, G., I. Gertsbakh, and Y. Shpungin, Evaluating the damage associated with intentional network disintegration. Reliability Engineering & System Safety, 2011. 96(4): p. 433-439.
46.Zio, E. and R. Bazzo, Level Diagrams analysis of Pareto Front for multiobjective system redundancy allocation. Reliability Engineering & System Safety, 2011. 96(5): p. 569-580.
47.Tian, Z. and H. Liao, Condition based maintenance optimization for multi-component systems using proportional hazards model. Reliability Engineering & System Safety, 2011. 96(5): p. 581-589.
48.Hausken, K. and V.M. Bier, Defending against multiple different attackers. European Journal of Operational Research, 2011. 211(2): p. 370-384.
49.Bier, V.M. and N.J. Haphuriwat, Trade-offs Between Target Hardening and Overarching Protection. 2011.
50.Levitin, G. and K. Hausken, Preventive strike vs. false targets and protection in defense strategy. Reliability Engineering & System Safety, 2011. 96(8): p. 912-924.
51.Tekiner-Mogulkoc, H. and D.W. Coit, System Reliability Optimization Considering Uncertainty: Minimization of the Coefficient of Variation for Series-Parallel Systems. Reliability, IEEE Transactions on, 2011. 60(3): p. 667-674.
52.Wang, L., et al. Optimal resource allocation for protecting system availability against random cyber attacks. in Computer Research and Development (ICCRD), 2011 3rd International Conference on. 2011. IEEE.
53.Levitin, G., et al., Multi-state systems with selective propagated failures and imperfect individual and group protections. Reliability Engineering & System Safety, 2011. 96(12): p. 1657-1666.
54.Zare Moayedi, B. and M. Abdollahi Azgomi, A game theoretic framework for evaluation of the impacts of hackers diversity on security measures. Reliability Engineering & System Safety, 2011.
55.Levitin, G., et al., Data survivability vs. security in information systems. Reliability Engineering & System Safety, 2012. 100: p. 19-27.
56.Bassiri, B. and S.S. Heydari. Network survivability in large-scale regional failure scenarios. in Proceedings of the 2nd Canadian Conference on Computer Science and Software Engineering. 2009. ACM.
57.Callaway, D.S., et al., Network robustness and fragility: Percolation on random graphs. Physical Review Letters, 2000. 85(25): p. 5468-5471.
58.Cohen, R., et al., Resilience of the Internet to random breakdowns. Physical review letters, 2000. 85(21): p. 4626-4628.
59.Cowie, J., et al., Impact of the 2003 blackouts on Internet communications. Preliminary Report, Renesys Corporation (updated March 1, 2004), 2003.
60.Holme, P., et al., Attack vulnerability of complex networks. Physical Review E, 2002. 65(5).
61.Jabbar, A., et al. Performance comparison of weather disruption-tolerant cross-layer routing algorithms. in INFOCOM 2009, IEEE. 2009. IEEE.
62.Laprie, J.C., K. Kanoun, and M. Kaâniche, Modelling interdependencies between the electricity and information infrastructures. Computer Safety, Reliability, and Security, 2007: p. 54-67.
63.Lau, F., et al. Distributed denial of service attacks. in Systems, Man, and Cybernetics, 2000 IEEE International Conference on. 2000. IEEE.
64.Mahajan, R., D. Wetherall, and T. Anderson, Understanding BGP misconfiguration. ACM SIGCOMM Computer Communication Review, 2002. 32(4): p. 3-16.
65.Markopoulou, A., et al., Characterization of failures in an operational IP backbone network. IEEE/ACM Transactions on Networking (TON), 2008. 16(4): p. 749-762.
66.Mase, K., How to deliver your message from/to a disaster area. Communications Magazine, IEEE, 2011. 49(1): p. 52-57.
67.Molisz, W. and J. Rak, End-to-end service survivability under attacks on networks. Journal of Telecommunications and Information Technology, 2006. 3: p. 19-26.
68.Nagaraja, K., et al. Understanding and dealing with operator mistakes in internet services. in Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation. 2004.
69.Neumayer, S. and E. Modiano. Network reliability with geographically correlated failures. in INFOCOM, 2010 Proceedings IEEE. 2010. IEEE.
70.Neumayer, S., et al. Assessing the vulnerability of the fiber infrastructure to disasters. in INFOCOM 2009, IEEE. 2009. IEEE.
71.Oppenheimer, D., A. Ganapathi, and D.A. Patterson, Why do internet services fail and what can be done about it? 2002: Computer Science Division, University of California.
72.O''Reilly, G., et al. Critical infrastructure analysis of telecom for natural disasters. in Telecommunications Network Strategy and Planning Symposium, 2006. NETWORKS 2006. 12th International. 2006. IEEE.
73.Pappas, V., et al. Impact of configuration errors on DNS robustness. in ACM SIGCOMM Computer Communication Review. 2004. ACM.
74.Park, S.T., et al. Static and dynamic analysis of the Internet''s susceptibility to faults and attacks. in INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies. 2003. IEEE.
75.Magoni, D., Tearing down the Internet. Selected Areas in Communications, IEEE Journal on, 2003. 21(6): p. 949-960.
76.Rak, J. and K. Walkowiak. Survivability of anycast and unicast flows under attacks on networks. in Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2010 International Congress on. 2010. IEEE.
77.Rohrer, J.P., A. Jabbar, and J.P.G. Sterbenz. Path diversification: A multipath resilience mechanism. in Design of Reliable Communication Networks, 2009. DRCN 2009. 7th International Workshop on. 2009. IEEE.
78.Sterbenz, J.P.G., et al., Evaluation of network resilience, survivability, and disruption tolerance: analysis, topology generation, simulation, and experimentation. Telecommunication Systems, 2011.
79.Sydney, A., et al., Characterising the robustness of complex networks. International Journal of Internet Technology and Secured Transactions, 2010. 2(3): p. 291-320.
80.Turner, D., et al., California fault lines: understanding the causes and impact of network failures. ACM SIGCOMM Computer Communication Review, 2010. 40(4): p. 315-326.
81.Wu, J., et al. Internet routing resilience to failures: analysis and implications. in Proceedings of the 2007 ACM CoNEXT conference. 2007. ACM.
82.Hu, Y., et al. An optimal reliability allocation method for digital substation systems. in Transmission and Distribution Conference and Exposition (T&D), 2012 IEEE PES. 2012. IEEE.
83.Izaddoost, A. and S.S. Heydari. Analyzing network failures in disaster scenarios using a travelling wave probabilistic model. in Communications (QBSC), 2012 26th Biennial Symposium on. 2012. IEEE.
84.Levitin, G. and K. Hausken, Defense Resource Distribution Between Protection and Redundancy for Constant Resource Stockpiling Pace. Risk Analysis, 2011. 31(10): p. 1632-1645.
85.Liberatore, F., M.P. Scaparra, and M.S. Daskin, Hedging against disruptions with ripple effects in location analysis. Omega, 2012. 40(1): p. 21-30.
86.Ishida, Y. Immunity-based systems revisited: toward systems science for robust and adaptive engineering. in Proceedings of the International Conference on Management of Emergent Digital EcoSystems. 2011. ACM.
87.Eiselt, H.A. and V. Marianov, Mobile phone tower location for survival after natural disasters. European Journal of Operational Research, 2012. 216(3): p. 563-572.
88.Zhang, J.H., J. Li, and Z.P. Liu, Multiple-resource and multiple-depot emergency response problem considering secondary disasters. Expert Systems with Applications, 2012.
89.Peng, R., et al., Optimal replacement and protection strategy for parallel systems. Recent Advances in System Reliability, 2012: p. 135-144.
90.Kjølle, G., I. Utne, and O. Gjerde, Risk analysis of critical infrastructures emphasizing electricity supply and interdependencies. Reliability Engineering & System Safety, 2012.
91.Adachi, T. and B.R. Ellingwood, Serviceability of earthquake-damaged water systems: Effects of electrical power availability and power backup systems on system vulnerability. Reliability engineering & system safety, 2008. 93(1): p. 78-88.
92.Nojiri, D., J. Rowe, and K. Levitt. Cooperative response strategies for large scale attack mitigation. in DARPA Information Survivability Conference and Exposition, 2003. Proceedings. 2003. IEEE.
93.Wang, P., et al. Threat risk analysis for cloud security based on Attack-Defense Trees. in Computing Technology and Information Management (ICCM), 2012 8th International Conference on. 2012. IEEE.
94.Letchford, J. and Y. Vorobeychik. Computing randomized security strategies in networked domains. in Proceedings of the Workshop on Applied Adversarial Reasoning and Risk Modeling (AARM) at AAAI. 2011.
95.Bier, V.M. and K. Hausken, Defending and attacking a network of two arcs subject to traffic congestion. Reliability Engineering & System Safety, 2013. 112: p. 214-224.
96.Liu, Z. and W. Xu, Determining sink location through Zeroing-In attackers in wireless sensor networks. Wireless Networks, 2012. 18(3): p. 335-349.
97.Wang, L., et al., Improving System Reliability Against Rational Attacks Under Given Resources. Systems, Man, and Cybernetics: Systems, IEEE Transactions on, 2014. 44(4): p. 446-456.
98.Wang, J., Mitigation strategies on scale-free networks against cascading failures. Physica A: Statistical Mechanics and its Applications, 2013. 392(9): p. 2257-2264.
99.Xie, L., P.E. Heegaard, and Y. Jiang. Network survivability under disaster propagation: Modeling and analysis. in Wireless Communications and Networking Conference (WCNC), 2013 IEEE. 2013. IEEE.
100.Gisdakis, S. and P. Papadimitratos. On the optimal allocation of adversarial resources. in Proceedings of the first ACM international workshop on Mission-oriented wireless sensor networking. 2012. ACM.
101.Li, X., Y. Zhu, and B. Li. Optimal anti-jamming strategy in sensor networks. in Communications (ICC), 2012 IEEE International Conference on. 2012. IEEE.
102.Wu, Y., B. Wang, and K.R. Liu. Optimal defense against jamming attacks in cognitive radio networks using the Markov decision process approach. in Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE. 2010. IEEE.
103.Wang, L., et al. Optimal voting strategy against rational attackers. in Risk and Security of Internet and Systems (CRiSIS), 2011 6th International Conference on. 2011. IEEE.
104.Wang, J., Robustness of complex networks with the local protection strategy against cascading failures. Safety Science, 2013. 53: p. 219-225.
105.Yallouz, J. and A. Orda. Tunable QoS-aware network survivability. in INFOCOM, 2013 Proceedings IEEE. 2013. IEEE.
106.Fandel, G., A. Giese, and B. Mohn, Measuring Synergy Effects of a Public Social Private Partnership (PSPP) Project. International Journal of Production Economics, 2012.
107.Hirshleifer, J., Conflict and rent-seeking success functions: Ratio vs. difference models of relative success. Public Choice, 1989. 63(2): p. 101-112.
108.Skaperdas, S., Contest success functions. Economic Theory, 1996. 7(2): p. 283-290.
109.Hirshleifer, J., The Paradox of Power. Economics & Politics, 1991. 3(3): p. 177-200.
110.Hausken, K. and G. Levitin, Protection vs. false targets in series systems. Reliability Engineering & System Safety, 2009. 94(5): p. 973-981.
111.Weiss, E.S., R.M. Anderson, and R.D. Lasker, Making the most of collaboration: exploring the relationship between partnership synergy and partnership functioning. Health Education & Behavior, 2002. 29(6): p. 683-698.
112.Cohen, R., L. Katzir, and D. Raz, An efficient approximation for the generalized assignment problem. Information Processing Letters, 2006. 100(4): p. 162-166.
113.Powell, W.B., Approximate Dynamic Programming: Solving the curses of dimensionality. Vol. 703. 2007: Wiley-Interscience.
114.Bertsekas, D.P., et al., Dynamic programming and optimal control. Vol. 1. 1995: Athena Scientific Belmont, MA.

 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關期刊論文
 
無相關著作
 
QR Code
QRCODE