https://scholars.lib.ntu.edu.tw/handle/123456789/457494
DC Field | Value | Language |
---|---|---|
dc.contributor.author | YEONG-SUNG LIN | en_US |
dc.contributor.author | Yen, H.-H | en_US |
dc.contributor.author | Chen, P.-Y | en_US |
dc.contributor.author | Wen, Y.-F. | en_US |
dc.creator | Lin, F.Y.-S;Yen, H.-H;Chen, P.-Y;Wen, Y.-F. | - |
dc.date.accessioned | 2020-02-11T02:34:22Z | - |
dc.date.available | 2020-02-11T02:34:22Z | - |
dc.date.issued | 2011 | - |
dc.identifier.uri | https://scholars.lib.ntu.edu.tw/handle/123456789/457494 | - |
dc.description.abstract | The Internet has brought about several threats of information security to individuals and cooperates. It is difficult to keep a network completely safe because cyber attackers can launch attacks through networks without limitations of time and space. As a result, it is an important and critical issue be able to efficiently evaluate network survivability. In this paper, an innovative metric called the Degree of Disconnectivity (DOD) is proposed, which is used to evaluate the damage level of the network. A network attack-defense scenario is also considered in this problem, in which the attack and defense actions are composed by many rounds with each round containing two stages. In the first stage, defenders deploy limited resources on the nodes resulting in attackers needing to increase attack costs to compromise the nodes. In the second stage, the attacker uses his limited budget to launch attacks, trying to maximize the damage of the network. The Lagrangean Relaxation Method is applied to obtain optimal solutions for the problem. © 2011 Springer-Verlag. | - |
dc.relation.ispartof | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | - |
dc.subject.classification | [SDGs]SDG16 | - |
dc.subject.other | Critical issues; Cyber attackers; Damage level; Disconnectivity; Information System Survivability; Lagrangean Relaxation; Lagrangean relaxation methods; Network Attack and Defense; Network defense; Network survivability; Optimal solutions; Two stage; Industrial engineering; Intelligent systems; Launching; Mathematical programming; Network security; Computer crime | - |
dc.title | Network defense strategies for maximization of network survivability | en_US |
dc.type | conference paper | en |
dc.identifier.doi | 10.1007/978-3-642-21822-4_14 | - |
dc.identifier.scopus | 2-s2.0-79960506595 | - |
dc.identifier.url | https://www.scopus.com/inward/record.uri?eid=2-s2.0-79960506595&doi=10.1007%2f978-3-642-21822-4_14&partnerID=40&md5=dc6e24151b7641dd3473045c424fde0f | - |
dc.relation.pages | 125-134 | - |
dc.relation.journalvolume | 6703 LNAI | - |
dc.relation.journalissue | PART 1 | - |
item.openairecristype | http://purl.org/coar/resource_type/c_5794 | - |
item.fulltext | no fulltext | - |
item.cerifentitytype | Publications | - |
item.openairetype | conference paper | - |
item.grantfulltext | none | - |
crisitem.author.dept | Information Management | - |
crisitem.author.parentorg | College of Management | - |
Appears in Collections: | 資訊管理學系 |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.