A tutorial on evaluation of network survivability under sophisticated attacker

Frank Yeong Sung Lin, Pei Yu Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

One of the goals of information security education is to develop students' skills to solve unseen security vulnerability with contemporary methodologies. This paper presents the teaching of a new algorithm on resource allocation of network attack and defense with mathematical programming for evaluating the network survivability. Adopting a scaffolding technique, students take up a role of a defender so as to minimize the cost of networking operation. Here, by transforming with the mathematical technique and applying the algorithm, gradient method and a proposed heuristic, to optimally solve it.

Original languageEnglish (US)
Title of host publicationProceedings of IEEE International Conference on Teaching, Assessment, and Learning for Engineering, TALE 2012
PagesH1A19-H1A21
DOIs
StatePublished - 2012
Externally publishedYes
Event1st IEEE International Conference on Teaching, Assessment, and Learning for Engineering, TALE 2012 - Hong Kong, Hong Kong
Duration: Aug 20 2012Aug 23 2012

Publication series

NameProceedings of IEEE International Conference on Teaching, Assessment, and Learning for Engineering, TALE 2012

Other

Other1st IEEE International Conference on Teaching, Assessment, and Learning for Engineering, TALE 2012
Country/TerritoryHong Kong
CityHong Kong
Period8/20/128/23/12

Keywords

  • Internet security
  • defense
  • network attack
  • network optimization
  • network survivability
  • resource allocation
  • vulnerability analysis

ASJC Scopus subject areas

  • Computer Science (miscellaneous)
  • Education

Fingerprint

Dive into the research topics of 'A tutorial on evaluation of network survivability under sophisticated attacker'. Together they form a unique fingerprint.

Cite this