簡易檢索 / 詳目顯示

研究生: 陳泰維
Chen, Tai-Wei
論文名稱: 以賽局理論分析網路攻防
Intrusion and Detection in the Network:A Game Theoretic Approach
指導教授: 李忠憲
Li, Jung-Shian
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 電腦與通信工程研究所
Institute of Computer & Communication Engineering
論文出版年: 2007
畢業學年度: 95
語文別: 中文
論文頁數: 51
中文關鍵詞: 賽局理論網路攻擊入侵偵測系統
外文關鍵詞: game theory, network attack, IDS
相關次數: 點閱:79下載:2
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 在現代網路快速的發展下,不僅頻寬流量急速倍增,相關的安全問題也成為一個重要的議題。在面對不同種類的網路攻擊,有許多的防禦措施。其中,我們將以現今企業組織通用的入侵偵測系統來作研究的目標。

    我們試圖提出一個不同的觀點,來分析網路中攻擊與防禦角色間的互動及決策。並提出了網路管理者如何在有限的資源下佈署入侵偵測系統,能夠有最好的效率及偵測率。並設想了不同的場景,推演出在不同場景下網路管理者所應採取的策略,使整體系統能夠抵抗外來的攻擊。

    而對於分析的工具,我們選擇了經濟學中常用的賽局理論來作為依據,並以數學推演及實例驗證結果的正確性。我們期望在這樣的分析結果下,能夠得到一個系統化的分析過程及佈置方法,並討論其改進的空間。

    In modern days, network grows up rapidly and exhibits a large the bandwidth. The network security problem becomes an important issue. There are many ways to defend different kinds of network attack. We will use intrusion detection systems which many organization common uses as our research target.

    We try to analyze what actions attacker and defender should take in a different point of view. Furthermore, we propose a method to deploy intrusion detection systems in the network with limited resources, and showed this method efficiently and has optimal detection probability. We also set up different scenarios, and deduce what strategy network manager should take to defend threats.

    We choose game theory to analyze our system, and verify its correctness with mathematics and examples. We hope that we can get systematic analysis and deployment strategies, and improve our research.

    第一章 簡介                     1  1.1  論文概要                   1  1.2  論文動機                   2  1.3  論文架構                   3 第二章 相關研究                   4  2.1  賽局理論簡介                 4  2.2  入侵偵測系統簡介               8  2.3  網路攻擊簡介                 10   2.3.1 木馬程式                  10   2.3.2 阻斷服務攻擊                11   2.3.3 駭客工具                  14   2.3.4 電腦病毒與蠕蟲               15  2.4  相關文獻與論文討論              16 第三章 佈署入侵偵測系統與攻擊的賽局模型       17  3.1  系統架構與環境假設              17   3.1.1 環境假設                  17   3.1.2 架構說明                  19  3.2 賽局模型                    21   3.2.1 模型建立                  21   3.2.2 加入風險考量的賽局模型           22 第四章 分析與討論                  24  4.1 數學推演與分析                 24   4.1.1 同一條路徑上入侵偵測系統數量的佈置分析   25   4.1.2 攻防雙方的賽局分析             29   4.1.3 調整取樣率使偵測率最佳化          34   4.1.4 路徑重疊分析討論              35   4.1.5 加入風險考量的賽局分析           38  4.2 實例驗證                    40   4.2.1 同一條路徑上入侵偵測系統數量的佈置     40   4.2.2 多條路徑的攻防               42   4.2.3 增加偵測率的佈置策略            45   4.2.4 路徑重疊的佈置策略             46 第五章 結論                     48 參考資料                       50

    [1]局論,伏洛波夫(N.N. Vorob’ev)原著,徐載華譯,桂冠出版社,1990

    [2]賽局理論與訊息經濟,Eric Rasmusen原著,楊家彥、張建一、吳麗真合譯,五南圖書出版股份有限公司,2004二版

    [3]網路安全實務,網路應用與服務教學推動中心主編,教育部顧問室補助,2006

    [4]Murali Kodialam, T. V. Lakshman, “Detecting Network Intrusions via Sampling:A Game Theoretic Approach”, IEEE INFOCOM 2003.

    [5]Jing WANG, Naoya NITTA, Hiroyuki SEKI, “An Efficient Method for Optimal Probe Deployment of Distributed IDS”, IEICE Transactions on Information and Systems archive Volume E88-D, Issue 8, 2005.

    [6]Afrand Agah, Kalyan Basu, Sajal K. Das, “Preventing DoS attack in Sensor Networks:A Game Theoretic Approach”, IEEE International Conference on Communications, Volume 5, page 3218-3222, 2005.

    [7]Animesh Patcha, Jung-Min Park, “A Game Theoretic Approach to Modeling Intrusion Detection in Mobile Ad Hoc Networks”, Proceedings of 2004 IEEE Workshop on Information Assurance and Security, 2004.

    [8]Cliff Changchun Zou, Weibo Gong, Don Towsley, “Code Red Worm Propagation Modeling and Analysis”, ACM on Computer and Communications Security, 2002.

    [9]Peter Mell, Mark McLarnon, “Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems”, Proceedings of the Second International workshop on Recent Advances in Intrusion Detection, 1999.

    [10]Terence K.T. Law, John C.S. Lui, David K.Y. Yau, “You Can Run, But You Can’t Hide:An Effective Statistical Methodology to Trace Back DDoS Attackers”, IEEE Transactions on Parallel and Distributed Systems, Volume 16, No.9, 2005.

    [11]Chunsheng Li, Qingfeng Song, Chengqi Zhang, “MA-IDS Architecture for Distributed Intrusion Detection using Mobile Agents”, Proceedings of the Second International Conference on Information Technology for Application, 2004.

    [12]C. Onwubiko, A. P. Lenaghan, L. Hebbes, “An Improved Worm Mitigation Model for Evaluating the Spread of Aggressive Network Worms”, EUROCON, 2005.

    [13]Dorothy E. Denning, “An Intrusion-Detection Model”, IEEE Transactions on Software Engineering, 1987.

    [14] http://www.securityfocus.com/infocus/1647

    [15] http://www.microsoft.com/taiwan/athome/security/viruses/virus101.mspx

    [16] http://gost.isi.edu/cidf

    [17] http://insecure.org/nmap/

    [18] http://www.nessus.org/

    [19]Avinash Dixit, Susan Skeath, “Games of Strategy”, W. W. Norton & Company ,second edition, 2004

    下載圖示 校內:2008-07-11公開
    校外:2008-07-11公開
    QR CODE