English  |  正體中文  |  简体中文  |  Items with full text/Total items : 51258/86283 (59%)
Visitors : 8021537      Online Users : 62
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/35120


    Title: 網路特徵與攻擊防禦策略之關係
    Other Titles: Characteristics of a network vs. protection strategies against attacks
    Authors: 林猷翔;Lin, You-shan
    Contributors: 淡江大學資訊工程學系碩士班
    蔡憶佳
    Keywords: 網路特徵;無尺度;小世界;資源分配;叢集度;中介值;network characteristic;scale-free;small-world;resource allocation;clustering coefficient;betweenness
    Date: 2008
    Issue Date: 2010-01-11 06:02:29 (UTC+8)
    Abstract: 現實世界中的各種網路,往往是龐大且複雜的,在資訊安全的議題上,研究者提出了各種模擬現實網路結構的數學模型,來做為資訊安全的實驗平台。本研究設定攻擊與防禦者的策略,攻擊者進行有目的的攻擊行為,而防禦者以有限的資源進行防禦,本研究以提高攻擊者的攻擊成本為目的,在資源防禦的前提下,研究不同網路的網路特徵,對於資源分配的防禦方式有何影響。
    The real networks are always large and complex. The researchers propose the mathematical models to simulate real network structure. In order to research the topic about relation between network characteristics and the issue of the information security, this paper creates a platform to simulate protection strategies against attacks. We set up several attack and protection strategies in three network models. The attacker carries out the purpose of attack. And the protector use limited resources to improve the defenses of network. For increase the cost of attacks, we will analyze characteristics of the network, and show the impact of the protection.
    Appears in Collections:[資訊工程學系暨研究所] 學位論文

    Files in This Item:

    File SizeFormat
    0KbUnknown200View/Open

    All items in 機構典藏 are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback