{"title":"复杂攻击下网络生存能力评估教程","authors":"F. Lin, Pei-Yu Chen","doi":"10.1109/TALE.2012.6360319","DOIUrl":null,"url":null,"abstract":"One of the goals of information security education is to develop students' skills to solve unseen security vulnerability with contemporary methodologies. This paper presents the teaching of a new algorithm on resource allocation of network attack and defense with mathematical programming for evaluating the network survivability. Adopting a scaffolding technique, students take up a role of a defender so as to minimize the cost of networking operation. Here, by transforming with the mathematical technique and applying the algorithm, gradient method and a proposed heuristic, to optimally solve it.","PeriodicalId":407302,"journal":{"name":"Proceedings of IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE) 2012","volume":"85 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A tutorial on evaluation of network survivability under sophisticated attacker\",\"authors\":\"F. Lin, Pei-Yu Chen\",\"doi\":\"10.1109/TALE.2012.6360319\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"One of the goals of information security education is to develop students' skills to solve unseen security vulnerability with contemporary methodologies. This paper presents the teaching of a new algorithm on resource allocation of network attack and defense with mathematical programming for evaluating the network survivability. Adopting a scaffolding technique, students take up a role of a defender so as to minimize the cost of networking operation. Here, by transforming with the mathematical technique and applying the algorithm, gradient method and a proposed heuristic, to optimally solve it.\",\"PeriodicalId\":407302,\"journal\":{\"name\":\"Proceedings of IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE) 2012\",\"volume\":\"85 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-11-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE) 2012\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TALE.2012.6360319\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE) 2012","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TALE.2012.6360319","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A tutorial on evaluation of network survivability under sophisticated attacker
One of the goals of information security education is to develop students' skills to solve unseen security vulnerability with contemporary methodologies. This paper presents the teaching of a new algorithm on resource allocation of network attack and defense with mathematical programming for evaluating the network survivability. Adopting a scaffolding technique, students take up a role of a defender so as to minimize the cost of networking operation. Here, by transforming with the mathematical technique and applying the algorithm, gradient method and a proposed heuristic, to optimally solve it.