1
Research Direction Introduction
Adviser: Frank, Yeong-Sung Lin
Present by Sean Chou
2
Maximization of Network Survivability with Secret Sharing and Defense
Resource Allocation Against Intelligent Attacks and Nature
Disasters
考量智慧攻擊與天然災害下透過機密共享與防禦資源分配以最大化網路存活度之研究
3
Agenda Introduction Problem Description Attack-defense Scenario Mathematical Formulation
4
Agenda Introduction Problem Description Attack-defense Scenario Mathematical Formulation
5
Introduction With the development of the Internet and
information technologies, more and more transactions happened on the Internet.
There are also many enterprises do their business as well as provide services for their consumers on the Internet.
Therefore, continuity service provided and reliably data storage are very important to companies and costumers.
6
Introduction Their most serious fears relate to cyber-security.
The statistic result of most significant risk in companies is showed in Figure 1.1.
7
Introduction Since 1997, IBM X-Force has been tracking public
disclosures of vulnerabilities in software products. According to IBM X-Force®2012 Mid-year Trend and Risk Report [2], Figure 1.3 shows that it just over 4,400 new security vulnerabilities in the first half of 2012.
8
Introduction According to the International Disaster Database (EM-
DAT), between 1980-1989 and 1999-2009, the number of disaster events reported globally increased from 1,690 to 3,886. Here is the statistical data of reported disasters from 1980 to 2009 in Figure 1.7.
9
Introduction There are many serious disasters happened and
cause a great deal of destroyed. For example, the 921 earthquake on September 21, 1999 in Taiwan or the serious disaster was the earthquake on March 11, 2011 in Japan, which was followed by a large tsunami.
10
Introduction There are many impacts on the network
when natural disasters happened. For instance, the system components would
destroyed by earthquake like hard disk damaged because of strong vibration.
Also, earthquake may cause electrical fire so that interrupt services.
What’s more, tsunami may cause coastal areas to floods and destruction of power support system or service system.
11
Introduction Therefore, we want to find how to use
protections to protect network which affect by internal failures and external impact in order to ensure system survivability and information confidentiality.
12
Agenda Introduction Problem Description Attack-defense Scenario Mathematical Formulation
13
Problem Description Internal failures External impact System survivability Information confidentiality
Problem Description Internal failures A network may have some internal
failures which can be from component degradation or wear out.
Therefore, we will consider component failures in the network.
In our study, we use “Poisson Arrival Process” to describe component failures.
14
14
Problem Description External impact
Naturel disaster Malicious attack
15
15
16
Naturel disaster Naturel disaster
Earthquake Compute the probability of different
magnitude earthquake happened Impact range Damage ratio
Tsunami Tsunami happen probability and location The height of tsunami Impact range
17
Earthquake Compute the probability of
different magnitude earthquake happened
The occurrence process of earthquake is generally assumed to follow Poisson distribution.
18
Earthquake Gutenberg–Richter law
Where: is the number of events having a
magnitude ≧ M a and b are constants different from
locations. Gutenberg, R., and C.F. Richter, (1944). “Frequency of earthquakes in California”,
Bulletin of the Seismological Society of America, 34, 185-188.
10log m a bM
m
19
Earthquake According to estimated parameters of Gutenberg-Richter
equation, we can calculate the mean annual rate of specific magnitude earthquake by following equation :
Where:
Yin Myo Min Htwe, Shen WenBin, “Gutenberg-Richter Recurrence Law to Seismicity Analysis of Southern Segment of the Sagaing Fault and Its Associate Components”, World Academy of Science, Engineering and Technology 26 2009
0 max 0
max 01
m m m m
m m
e em v
e
0
0 max,mv e m m m
2.303 , 2.303a b
20
Earthquake Impact range & Damage ratio We use peak ground acceleration to decide the
impact range and damage ratio According to the research, we can compute the
peak ground acceleration Y by following equation:
Where Y is peak ground acceleration M is earthquake magnitude R is the distance between node and earthquake center
2.30271.5873 0.61650.0253 0.3155M MY e R e
21
Earthquake According to Central Weather
Bureau, we transfer use peak ground acceleration to earthquake intensity.
22
Tsunami According to the geographical research, over
magnitude 6.5 earthquake which happened under the sea may cause tsunami.
The height of tsunami can compute by following equation :
We can use the height of tsunami into our research to compute the tsunami impact range.
log logwH M a D
23
Malicious attack Malicious attack
Commander’s purposes : Compromise the target network by
destroying core nodes to make the service operation lower than the QoS threshold.
Intrude the system components to steal important information.
24
Malicious attack In the real world, cyber-attack on the Internet
always launch by a hacker or a group of hackers. Accordingly, in our scenario, the network is
attacked by attackers which are led by many commanders. Each commander would lead only one attack group.
Furthermore, attackers will launch a single attack or collaborative attack and use of his limited resources to achieve the maximization attacks.
25
Malicious attack In 1996, S. Skaperdas proposed an
economic theory called “Contest Success Function”
We use contest success function to compute the winning probabilities of two competing parties.
m
m m
TvT t
S. Skaperdas, “Contest success functions”, Economic Theory, vol. 7, pp. 283-290, 1996.
System survivability System survivability Because of enterprises facing a lot of risks, they need a
metric to measure the system state. Survivability is a metric that measures the performance
of a system or a network when it suffers intended attacks, natural disaster or component failure.
Here is a clear definition of survivability in : “We define survivability as a capability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents. We use the term system in the broadest possible sense, including networks and large-scale systems of systems.”
26
26
R.J. Ellison, D.A. Fisher, R.C. Linger, H.F. Lipson, T. Longstaff, and N.R. Mead, “Survivable Network Systems: An Emerging Discipline,” Technical Report CMU/SEI-97-TR-013, November 1997 (Revised: May 1999).
System survivability Defender wants to maintain the network service
operation in finite resource. Because the limitation of budget, defender will
find the high risk nodes by detecting system and using reactive protection strategies in order to decrease impact on the network by attackers.
Reactive protection strategy example: Virtual Machine Defense Strategy The third party’s defense center signature Dynamic Topology Reconfiguration
27
27
Problem Description Information confidentiality We want to use the method called “Secret
sharing” to improve the security of data. Secret sharing is a method for distributing a
secret to a group of participants, each of which allocates a share of the secret.
28
28
29
Agenda Introduction Problem Description Attack-defense Scenario Mathematical Formulation
Attack-defense Scenario For the commander, the goal of the commander
is to compromise several core nodes, which causes the defender’s service disruption or steal important information.
30
30
Attack-defense Scenario
31
31
32
32
33
34
35
36
37
38
39
40
41
42
Agenda Introduction Problem Description Attack-defense Scenario Mathematical Formulation
43
Mathematical Formulation Given Parameters Decision Variables Verbal Notation Objective Function Constraint Verbal Constraints
44
Given Parameters
45
Given Parameters
46
Given Parameters
47
Given Parameters
48
Given Parameters
49
Decision Variables
50
Decision Variables
51
Decision Variables
52
Verbal Notation
53
Verbal Notation
54
Objective Function
55
Constraint
56
Constraint
57
Verbal Constraints
58
Thanks for your listening.