340 likes | 446 Views
Research Direction Introduction. Advisor : Frank, Y.S. Lin Presented by Yu Pu Wu. Agenda. Problem Description Mathematical Formulation. Agenda. Problem Description Mathematical Formulation. Problem Description. Collaborative Attack Special Defense Resources
E N D
Research Direction Introduction Advisor : Frank, Y.S. Lin Presented by Yu Pu Wu
Agenda • ProblemDescription • MathematicalFormulation
Agenda • ProblemDescription • MathematicalFormulation
Problem Description • CollaborativeAttack • SpecialDefenseResources • “FakeTraffic”,“FalseTarget”or“DualFunction”Honeypots • Virtualization • DynamicTopologyReconfiguration • Tominimizemaximizedattackers’successprobabilitybyadjustingthedefenseparametersofplanninganddefendingphase.
SpecialDefenseResources • Honeypots • FakeTrafficfunction • FalseTargetfunction • Dualfunction • Virtualization • DynamicTopologyReconfiguration
AttackStrategies&RiskAcceptance • AttackStrategies • Compromise • Pretendtoattack • Testreaction • Takeopportunity • RiskAcceptance • RiskAvoidance • RiskTolerance
Stage&SelectionCriteria • Stage • Earlystage • Latestage • SelectionCriteria • Defenseresource • Traffic
Time Issue • Attackers • Compromise time • Recovery time • Defenders • Reconfiguration impact QoStime • Reconfiguration QoS recovery time
ProsandConsofCollaborativeAttack • Advantage • Decreasebudgetcostofeachattackers • Lesscompromisetime • Lessrecoverytime • Disadvantage • Probabilityofdetected
Agenda • ProblemDescription • MathematicalFormulation
MathematicalFormulation • Objective • Tominimizemaximizedattackers’successprobability • Given • TotalDefenseBudget • EachCostofConstructingaDefenseMechanism • VirtualizationCost • ServicePriority • Tobedetermined • AttackandDefenseConfigurations • BudgetSpentonConstructingNodeorLink • GeneralandSpecialDefenseResource
ObjectiveFunction (IP1)
MathematicalConstraints • 1 • 2 • DirectLinkCapacityConstraints : • qij≥0 • Honeypot Types Constraints : • xi + yi≥ 1 (IP1.1) (IP1.2) (IP1.3) (IP1.4)
MathematicalConstraints • Budget Constraints : • Bnodelink≥ 0 • Bgeneral≥ 0 • Bspecial≥ 0 • Constructing Topology Constraints : • ni≥ 0 • w × e ≥ 0 • g (qij) ≥ 0 (IP1.5) (IP1.6) (IP1.7) (IP1.8) (IP1.9) (IP1.10)
MathematicalConstraints • Budget Constraints : • Bnodelink≥ 0 • Bspecial ≥ 0 • 123 • 123 • 123 (IP1.11) (IP1.12) (IP1.13) (IP1.14) (IP1.15)
MathematicalConstraints • BudgetConstraints: • 1 • 1 (IP1.16) (IP1.17)
MathematicalConstraints • Specialdefenseresourcecostconstraints: • 1 • 1 • 1 • 1 • 1 • 1 • 1 (IP1.18) (IP1.19) (IP1.20) (IP1.21) (IP1.22) (IP1.23) (IP1.24)
VerbalConstraints • QoSconstraints: (IP1.25)
VerbalConstraints • QoSconstraints: (IP1.25)
VerbalConstraints • Reconfigurationconstraints: (IP1.34)
VerbalConstraints • Trafficadjustmentconstraints: (IP1.41)
VerbalConstraints • Localdefenseconstraints: