首页> 外文学位 >Models and Algorithms for Critical Infrastructure Protection with an Application to Cybersecurity Planning
【24h】

Models and Algorithms for Critical Infrastructure Protection with an Application to Cybersecurity Planning

机译:关键基础设施保护的模型和算法在网络安全规划中的应用

获取原文
获取原文并翻译 | 示例

摘要

Globalized supply chains bring enormous security risks to the information system, concerns of which have been widely and intensively expressed by both federal agencies and commercial organizations. In this dissertation, we investigate how to prioritize investment in mitigations to enhance the security of Information Technology (IT) infrastructure that balances cost and threat reduction. We propose an optimization framework consisting of mixed-integer programming and bi-level programming models and algorithms for protecting the critical infrastructure with a focus on cybersecurity planning and management.;First, we propose budgeted maximum multiple coverage (BMMC) models that identify a set of cost-effective mitigations to maximally reduce generic vulnerabilities in the IT infrastructure. We address the uncertainty regarding mitigation effectiveness, an inherent issue associated with cybersecurity planning, by proposing a stochastic expected-value BMMC model, denoted as EBMMC. Approximation algorithms with guaranteed approximation ratios are proposed to solve the models. Next, we extend EBMMC to three alternative models that provide solutions robust to worst case scenarios given uncertain mitigation effectiveness, including models that maximize the worst case coverage, minimize the worst case regret, and maximize the average coverage in some of the worst cases.;Furthermore, we address a more complicated and realistic problem when adversarial attackers are present. We investigate how to identify a best combination of cost-effective mitigations that maximally delay supply chain attacks when there exist multiple adversaries and uncertainty regarding mitigation effectiveness. We propose new Stackelberg game models that explicitly formulate the interaction between a defender and multiple attackers, including a deterministic interdiction model for delaying multiple adversarial projects (DIMAP) and a stochastic model variant (SIMAP) that incorporates uncertain delay times. We propose a Lagrangian heuristic that identifies near-optimal solutions efficiently. Finally, we propose a new exact algorithm for solving a particular critical infrastructure protection problem, the r-interdiction median problem with fortification (RIMF), which improves an existing algorithm in the literature and can be generalized to solve a broader range of facility interdiction and protection problems.
机译:全球化的供应链给信息系统带来了巨大的安全风险,联邦机构和商业组织都对此问题进行了广泛而深入的表达。在本文中,我们研究了如何对缓解措施进行优先投资,以增强平衡成本和减少威胁的信息技术(IT)基础架构的安全性。我们提出了一个由混合整数编程,双层编程模型和算法组成的优化框架,用于重点保护网络安全计划和管理的关键基础设施;首先,我们提出了预算的最大多重覆盖(BMMC)模型来识别一组具有成本效益的缓解措施,以最大程度地减少IT基础架构中的通用漏洞。通过提出一种随机期望值BMMC模型(称为EBMMC),我们解决了缓解有效性的不确定性,这是与网络安全规划相关的固有问题。提出了具有保证近似比的近似算法来求解模型。接下来,我们将EBMMC扩展到三个替代模型,这些模型可提供在不确定的缓解效果下能够应对最坏情况的解决方案,其中包括最大化最坏情况覆盖率,最小化最坏情况后悔以及最大化某些最坏情况下平均覆盖率的模型。此外,当存在对抗性攻击者时,我们将解决一个更复杂和现实的问题。我们研究如何确定具有成本效益的缓解措施的最佳组合,从而在存在多个对手以及关于缓解有效性的不确定性时最大程度地延迟供应链攻击。我们提出了新的Stackelberg游戏模型,该模型明确制定了防御者和多个攻击者之间的互动关系,其中包括用于延迟多个对抗项目的确定性拦截模型(DIMAP)和包含不确定延迟时间的随机模型变体(SIMAP)。我们提出了一种拉格朗日启发式算法,可以有效地识别接近最优的解决方案。最后,我们提出了一种新的精确算法来解决特定的关键基础设施保护问题,即设防r拦截中位数问题(RIMF),该算法改进了文献中现有的算法,可以推广解决更大范围的设施拦截和攻击。保护问题。

著录项

  • 作者

    Zheng, Kaiyue.;

  • 作者单位

    The University of Wisconsin - Madison.;

  • 授予单位 The University of Wisconsin - Madison.;
  • 学科 Operations research.
  • 学位 Ph.D.
  • 年度 2017
  • 页码 140 p.
  • 总页数 140
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号