Maximization of Multi-Round Network Survivability under Considerations of Defensive Messaging Strategies and Incomplete Information for Both the Attacker and the Defender
Date Issued
2012
Date
2012
Author(s)
Shih, I-Ju
Abstract
With Internet rapidly expanding, we can connect to Internet at anytime in anywhere. Internet brings many businesses for enterprises, but Internet also lets enterprises face many challenges. In order to serve their customers at all day, enterprises should keep operation continuously. With attack toolkits become easily to obtain, cyber attacks are not hackers’ specialization. So, enterprises face many challenges of cyber security. Therefore, how to efficiently allocate defensive resources to reduce damages which was caused by cyber attackers and how to evaluate system survivability to help enterprises keeping operate became important issues.
In this multi-round attack-defense model, both cyber attacker and network defender without completely understanding the information about each other is considered. In other words, incomplete information in this model is considered and we conduct a mathematical model for this problem. Besides, we use Average DOD to evaluate damage degree of network to help network operators to predict all possible strategies which both cyber attacker and network defender would take. In each round, network defender could allocate resources on each node, reallocate or recycle resources for better use. And network defender could also repair compromised nodes, patch system vulnerabilities or use penetration test to patch system vulnerabilities. Moreover, network defender could release message which might be doing nothing at all, truth, secrecy or deception to confuse cyber attacker to achieve better defense efficiency. In each round, cyber attacker would allocate resources to attack nodes of the network. In the process of problem solving, the "gradient method" and "game theory" would be used to obtain the optimal resource allocation strategies for both cyber attacker and network defender.
Subjects
Average Degree of Disconnectivity
Average DOD
Gradient Method
Game Theory
Incomplete Information
Survivability
Optimization
Resource Allocation
Multi-round
Network Recovery
Penetration Test
Type
thesis
File(s)![Thumbnail Image]()
Loading...
Name
ntu-101-R99725003-1.pdf
Size
23.32 KB
Format
Adobe PDF
Checksum
(MD5):63a879bf844b21f523d83cbeab6aec99
