Maximization of Cloud Network Survivability Considering Attack Synergy
Date Issued
2014
Date
2014
Author(s)
Hsiao, Wei-Wen
Abstract
Many organizations rely on networks to provide various types of services for customers and users. Internet has become the basic necessity in our daily life. From the enterprises’ perspectives, since hackers and attackers are getting more and more powerful and skillful, this is a challenging problem. For instance, in nowadays, attackers could launch a collaborative attack, which is a powerful attack approach that enables a group of attackers gathering their attack power toward a single target. Further, the synergy effects of this particular type of attacks could cause more damage than traditional attack approaches. We proposed a synergy effect that described the collaborative attack that similar to real life. In this model, we also demonstrate that more people in the same group will not always bring better attack power.
Not only attack approaches but also the computing infrastructure have been rapidly innovated. Cloud computing is a main trend and has caught much attentions. Our thesis will implement the network base on cloud environment.
We provide two defense strategies—“Local defense mechanism” and “Migration mechanism.” In “Local defense mechanism”, when virtual machine monitor (VMM) detects a node being attacked but yet being compromised, it can increase defense resources for all the virtual machines (VMs) that belong to this VMM. As for, “Migration mechanism”, it enables VMs dynamically move from one server to another. In our thesis, we could find that “Migration mechanism” has a great defense capability than “Local defense mechanism.”
Our goal is to help companies find an effective way to cope with varieties of threats. In addition to traditional defense strategies, such as firewall, IDS, and IPS, we incorporate local defense mechanism and virtual machine migration to enhance system survivability. Moreover, under limited budget, it is important for defenders or companies to seek the optimal way of allocating defense resources against attackers’ invasions. The problem is modeled as a bi-level mathematical formulation. Combining with the concept of Monte Carlo Simulation, a variety of feasible attack-defense scenarios are simulated to find effective defense strategies.
Subjects
協同攻擊
網路存活度
攻擊綜效
虛擬機器搬移
資源分配
最佳化
數學歸納法
蒙地卡羅模擬法
Type
thesis
File(s)![Thumbnail Image]()
Loading...
Name
ntu-103-R01725029-1.pdf
Size
23.32 KB
Format
Adobe PDF
Checksum
(MD5):c69d6160ae8ea0007ac21eac8662b708
