Thesis Model Introduction

Thesis Model Introduction - Henrry, C.Y. Chiang (江政祐)
Thesis Model Introduction
Presented by: Henrry, C.Y. Chiang (江政祐)
20071106
OPLAB, Dep. of Information Management, NTU
1 / 22
Thesis Model Introduction - Henrry, C.Y. Chiang (江政祐)
Today’s Agenda
1. Problem Description - A figural review
2. Problem Formulation
- Given Parameters
- Objective function and Constraints
- Decision Variables
20071106
OPLAB, Dep. of Information Management, NTU
2 / 22
Thesis Model Introduction - Henrry, C.Y. Chiang (江政祐)
Today’s Agenda
1. Problem Description
2. Problem Formulation
- Given Parameters
- Objective function and Constraints
- Decision Variables
20071106
OPLAB, Dep. of Information Management, NTU
3 / 22
Thesis Model Introduction - Henrry, C.Y. Chiang (江政祐)
4 / 22
1. Problem Description
Z
Defender:
S
MAXIMIZE
G
good user traffic
Z
S
G
A
Z
Attacker:
S
G
MINIMIZE
Z
good user traffic
Fig 4.
1. network
2.
3.
initial network
topology
topology
with filters
only good
both
installed
user traffic and attacker traffic
S
server
G
good user
router
Z
zombie
A
attacker
good user traffic
filter
attacker traffic
aggregate (good user and attacker) traffic
20071106
OPLAB, Dep. of Information Management, NTU
Thesis Model Introduction - Henrry, C.Y. Chiang (江政祐)
Today’s Agenda
1. Problem Description
2. Problem Formulation
- Given Parameters
- Objective function and Constraints
- Decision Variables
20071106
OPLAB, Dep. of Information Management, NTU
5 / 22
Thesis Model Introduction - Henrry, C.Y. Chiang (江政祐)
6 / 22
2. Problem Formulation
- Given Parameters
Given
1. The network topology
2. The number of servers considered by the attacker
3. The number of compromised hosts (zombies)
3.1 The capability of each zombie
4. The number of legitimate users sending traffic to the number of
servers considered by the attacker
5. The total budget (cost) of a network administrator (defender)
6. The cost to allocate a filter with the certain capability
7. The capability of each router within an AS
8. The routing policy of an AS
20071106
OPLAB, Dep. of Information Management, NTU
Thesis Model Introduction - Henrry, C.Y. Chiang (江政祐)
4. Problem Formulation
- Given Parameters
20071106
OPLAB, Dep. of Information Management, NTU
7 / 22
Thesis Model Introduction - Henrry, C.Y. Chiang (江政祐)
Today’s Agenda
1. Problem Description
2. Problem Formulation
- Given Parameters
- Objective function and Constraints
- Decision Variables
20071106
OPLAB, Dep. of Information Management, NTU
8 / 22
Thesis Model Introduction - Henrry, C.Y. Chiang (江政祐)
9 / 22
2. Problem Formulation
- Decision Variables
To determine
 Defender:
1. The budget (filters) allocation strategy
 Attacker:
1. The volume of the traffic that each compromised host (zombie)
sends
2. The destination node that each compromised host (zombie)
sends traffic to
3. The entry node that each compromised host (zombie) sends
traffic to through
20071106
OPLAB, Dep. of Information Management, NTU
Thesis Model Introduction - Henrry, C.Y. Chiang (江政祐)
4. Problem Formulation
- Decision Variables
20071106
OPLAB, Dep. of Information Management, NTU
10 / 22
Thesis Model Introduction - Henrry, C.Y. Chiang (江政祐)
Today’s Agenda
1. Problem Description
2. Problem Formulation
- Given Parameters
- Objective function and Constraints
- Decision Variables
20071106
OPLAB, Dep. of Information Management, NTU
11 / 22
Thesis Model Introduction - Henrry, C.Y. Chiang (江政祐)
12 / 22
Objective function and Constraints
Objective
 To maximize the minimized total legitimate traffic
Subject to
1. The number of compromised hosts (zombies)
1.1 The capability of each zombie
2. The percentage of the total attack traffic which must be filtered
after filters have been allocated
3. The total budget (cost) of a network administrator (defender)
4. The volume of zombies’ traffic that a filter with the certain
capability can filter
5. The capability of each router within the AS
20071106
OPLAB, Dep. of Information Management, NTU
Thesis Model Introduction - Henrry, C.Y. Chiang (江政祐)
2. Problem Formulation
- Objective function
20071106
OPLAB, Dep. of Information Management, NTU
13 / 22
Thesis Model Introduction - Henrry, C.Y. Chiang (江政祐)
14 / 22
Constraints (Filtering mechanism)
A figural description - Optimal Allocation
Z
S
G
Z
S
G
Z
S
G
Z
20071106
OPLAB, Dep. of Information Management, NTU
A
Thesis Model Introduction - Henrry, C.Y. Chiang (江政祐)
2. Problem Formulation
- Constraints (Zombie’s behavior)
20071106
OPLAB, Dep. of Information Management, NTU
15 / 22
Thesis Model Introduction - Henrry, C.Y. Chiang (江政祐)
2. Problem Formulation
- Constraints (Filter’s capability)
20071106
OPLAB, Dep. of Information Management, NTU
16 / 22
Thesis Model Introduction - Henrry, C.Y. Chiang (江政祐)
17 / 22
2. Problem Formulation
- Constraints (Filtering mechanism)
20071106
OPLAB, Dep. of Information Management, NTU
Thesis Model Introduction - Henrry, C.Y. Chiang (江政祐)
18 / 22
Constraints (Filtering mechanism)
A figural description - Current Modeling
Z
S
G
Z
S
G
Z
S
G
Z
20071106
OPLAB, Dep. of Information Management, NTU
A
Thesis Model Introduction - Henrry, C.Y. Chiang (江政祐)
19 / 22
Constraints (Filtering mechanism)
A figural description - Target Modeling
Z
S
G
Z
S
G
Z
S
G
Z
20071106
OPLAB, Dep. of Information Management, NTU
A
Thesis Model Introduction - Henrry, C.Y. Chiang (江政祐)
20 / 22
Constraints (Filtering mechanism)
A figural description - Optimal Allocation
Z
S
G
Z
S
G
Z
S
G
Z
20071106
OPLAB, Dep. of Information Management, NTU
A
Thesis Model Introduction - Henrry, C.Y. Chiang (江政祐)
2. Problem Formulation
- Constraints (Miscellanies)
20071106
OPLAB, Dep. of Information Management, NTU
21 / 22
Thesis Model Introduction - Henrry, C.Y. Chiang (江政祐)
22 / 22
The End
- It’s my greatest honor to have your attention.
20071106
OPLAB, Dep. of Information Management, NTU