{"title":"A tutorial on evaluation of network survivability under sophisticated attacker","authors":"F. Lin, Pei-Yu Chen","doi":"10.1109/TALE.2012.6360319","DOIUrl":null,"url":null,"abstract":"One of the goals of information security education is to develop students' skills to solve unseen security vulnerability with contemporary methodologies. This paper presents the teaching of a new algorithm on resource allocation of network attack and defense with mathematical programming for evaluating the network survivability. Adopting a scaffolding technique, students take up a role of a defender so as to minimize the cost of networking operation. Here, by transforming with the mathematical technique and applying the algorithm, gradient method and a proposed heuristic, to optimally solve it.","PeriodicalId":407302,"journal":{"name":"Proceedings of IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE) 2012","volume":"85 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE) 2012","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TALE.2012.6360319","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
One of the goals of information security education is to develop students' skills to solve unseen security vulnerability with contemporary methodologies. This paper presents the teaching of a new algorithm on resource allocation of network attack and defense with mathematical programming for evaluating the network survivability. Adopting a scaffolding technique, students take up a role of a defender so as to minimize the cost of networking operation. Here, by transforming with the mathematical technique and applying the algorithm, gradient method and a proposed heuristic, to optimally solve it.