通信学报 ›› 2016, Vol. 37 ›› Issue (12): 56-66.doi: 10.11959/j.issn.1000-436x.2016272
出版日期:
2016-12-25
发布日期:
2017-05-15
基金资助:
Yan-wei SUN1,Yun-chuan GUO1(),Ling-cui ZHANG1,Bin-xing FANG2
Online:
2016-12-25
Published:
2017-05-15
Supported by:
摘要:
为了有效应对潜在网络威胁,通过合理利用资源达到最大化提升当前环境安全态势的目的,研究了有限资源的最优分配方案。网络态势的整体性特点使针对某一指标的改善可能会间接影响其他指标,并且投入力度不同,影响程度也有所差异。针对上述特性,将问题抽象成多选项二次联合背包模型,通过二次背包特性表示态势评估指标项之间的相互影响,通过多选项背包特性来表示单个指标项的多种投入可能。最后对其做半定规划松弛,采用分支定界法对问题进行求解。实验证明了算法的准确性和高效性。
孙岩炜,郭云川,张玲翠,方滨兴. 基于多选项二次联合背包的态势感知资源分配算法[J]. 通信学报, 2016, 37(12): 56-66.
Yan-wei SUN,Yun-chuan GUO,Ling-cui ZHANG,Bin-xing FANG. Resource allocation algorithm for situation awareness based on multiple-choice quadratic knapsack[J]. Journal on Communications, 2016, 37(12): 56-66.
[1] | ENDSLEY M R . Toward a theory of situation awareness in dynamic systems[J]. Human Factors: The Journal of the Human Factors and Ergonomics Society, 1995,37(1):32-64. |
[2] | DIETTERICH T G , BAO X , KEISER V , et al. Machine learning methods for high level cyber situation awareness[M]// Cyber Situ-ational Awareness. Springer US, 2010:227-247. |
[3] | LIU P , JIA X , ZHANG S , et al. Cross-layer damage assessment for cyber situational awareness[J]. Advances in Information Security, 2010,46:155-176. |
[4] | PREDEN J , MOTUS L , MERISTE M , et al. Situation awareness for networked systems[C]// 2011 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Deci-sion Support (CogSIMA). IEEE. 2011:123-130. |
[5] | BRANNON N G , SEIFFERTT J E , DRAELOS T J , et al. Coordinated machine learning and decision support for situation awareness[J]. Neural Networks, 2009,22(3):316-325. |
[6] | TAMASSIA R , PALAZZI B , PAPAMANTHOU C . Graph drawing for security visualization[C]// International Symposium on Graph Drawing. Springer Berlin Heidelberg, 2008:2-13. |
[7] | TADDA G P , SALERNO J S . Overview of cyber situation aware-ness[M]. Cyber Situational Awareness. Springer US, 2010:15-35. |
[8] | WEBB J , AHMAD A , MAYNARD S B , et al. A situation awareness model for information security risk management[J]. Computers & Se-curity, 2014,44:1-15. |
[9] | Federal Office for Information Security: 13 EL: Cross-reference tables of the IT-grundschutz catalogues: 13th version (2013)[EB/OL]. . |
[10] | GREITZER F L , FRINCKE D A . Combining traditional cyber security audit data with psychosocial data: towards predictive modeling for in-sider threat mitigation[M]// Insider Threats in Cyber Security. Springer US, 2010:85-113. |
[11] | SCHILLING A , WERNERS B . Optimizing information systems secu-rity design based on existing security knowledge[C]// International Conference on Advanced Information Systems Engineering. Springer International Publishing, 2015:447-458. |
[12] | DU J , COOK W D , LIANG L , et al. Fixed cost and resource allocation based on DEA cross-efficiency[J]. European Journal of Operational Research, 2014,235(1):206-214. |
[13] | AISOPOS F , TSERPES K , VARVARIGOU T . Resource management in software as a service using the knapsack problem model[J]. Interna-tional Journal of Production Economics, 2013,141(2):465-477. |
[14] | XIAO Z , SONG W , CHEN Q . Dynamic resource allocation using virtual machines for cloud computing environment[J]. IEEE Transac-tions on Parallel and Distributed Systems, 2013,24(6):1107-1117. |
[15] | HAJIAGHAJANI F , RASTI M . Downlink resource reuse for de-vice-to-device communication underlying cellular networks using a generalized knapsack framework[C]// 2016 13th IEEE Annual Con-sumer Communications & Networking Conference (CCNC). IEEE, 2016:171-176. |
[16] | FERDOSIAN N , OTHMAN M , ALI B M , et al. Greedy–knapsack algorithm for optimal downlink resource allocation in LTE networks[J]. Wireless Networks, 2015:1-14. |
[17] | SHEU J P , KAO C C , YANG S R , et al. A resource allocation scheme for scalable video multicast in WiMAX relay networks[J]. IEEE Transactions on Mobile Computing, 2013,12(1):90-104. |
[18] | FIELDER A , PANAOUSIS E , MALACARIA P , et al. Decision sup-port approaches for cyber security investment[J]. Decision Support Systems, 2016,86:13-23. |
[19] | KHOUZANI M H R , MALACARIA P , HANKIN C , et al. Efficient numerical frameworks for multi-objective cyber security plan-ning[C]// European Symposium on Research in Computer Security. Springer International Publishing, 2016:179-197. |
[20] | OJAMAA A , TYUGU E , KIVIMAA J . Pareto-optimal situation analy-sis for selection of security measures[C]// MILCOM 2008-2008 IEEE Military Communications Conference. IEEE, 2008:1-7. |
[21] | WANG F , XU C , SONG L , et al. Energy-efficient resource allocation for device-to-device underlay communication[J]. IEEE Transactions on Wireless Communications14.4. 2015:2082-2092. |
[22] | HASAN M , HOSSAIN E . Distributed resource allocation in D2D-enabled multi-tier cellular networks: an auction approach[C]// 2015 IEEE International Conference on Communications (ICC). IEEE, 2015. |
[23] | ZHANG H , JIANG H , LI B , et al. A framework for truthful online auctions in cloud computing with heterogeneous user demands[J]. IEEE Transactions on Computers, 2016,65(3):805-818. |
[24] | GUPTA M , REES J , CHATURVEDI A , et al. Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach[J]. Decision Support Systems, 2006,41(3):592-603. |
[25] | VIDUTO V , MAPLE C , HUANG W , et al. A novel risk assessment and optimization model for a multi-objective network security coun-termeasure selection problem[J]. Decision Support Systems, 2012,53(3):599-610. |
[26] | REES L P , DEANE J K , RAKES T R , et al. Decision support for cyber security risk planning[J]. Decision Support Systems, 2011,51(3):493-505. |
[27] | SAWIK T . Selection of optimal countermeasure portfolio in IT secu-rity planning[J]. Decision Support Systems, 2013,55(1):156-164. |
[28] | MUKHOPADHYAY A , CHATTERJEE S , SAHA D , et al. Cyber-risk decision models: to insure IT or not?[J]. Decision Support Systems, 2013,56:11-26. |
[29] | GORDON L A , LOEB M P . The economics of information security investment[M]// Economics of Information Security. Springer US, 2004:105-125. |
[30] | LéTOCART L , PLATEAU M C , PLATEAU G . An efficient hybrid heuristic method for the 0-1 exact k-item quadratic knapsack prob-lem[J]. Pesquisa Operacional, 2014,34(1):49-72. |
[31] | SHENG H , SUN J , SUN X . A Rigorous method for solving 0-1 poly-nomial knapsack problem[J]. Journal of Shanghai University (Natural Science Edition), 2006,4:012. |
[32] | BRETTHAUER K M , SHETTY B . Quadratic resource allocation with generalized upper bounds[J]. Operations Research Letters, 1997,20(2):51-57. |
[33] | HAHN P , GRANT T . Lower bounds for the quadratic assignment problem based upon a dual formulation[J]. Operations Research, 1998,46(6):912-922. |
[34] | HAHN P M , KIM B J , GUIGNARD M , et al. An algorithm for the generalized quadratic assignment problem[J]. Computational Optimi-zation and Applications, 2008,40(3):351-372. |
[35] | BILLIONNET A , ELLOUMI S , PLATEAU M C . Improving the per-formance of standard solvers for quadratic 0-1 programs by a tight convex reformulation: the QCR method[J]. Discrete Applied Mathe-matics, 2009,157(6):1185-1197. |
[36] | CAPRARA A , PISINGER D , TOTH P . Exact solution of the quadratic knapsack problem[J]. Informs Journal on Computing, 1999,11(2):125-137. |
[37] | ANDERSON R H , FELDMAN P M , GERWEHR S , et al. Securing the US defense information infrastructure: a proposed approach[R]. Rand Corp Santa Monica CA, 1999. |
[38] | KELLERER H , PFERSCHY U , PISINGER D . Introduction to NP-completeness of knapsack problems[M]. Springer Berlin Heidel-berg, 2004. |
[39] | BRETTHAUER K M , SHETTY B . The nonlinear knapsack prob-lem–algorithms and applications[J]. European Journal of Operational Research, 2002,138(3):459-472. |
[1] | 王再见, 谷慧敏. 基于联合优化的网络切片资源分配策略[J]. 通信学报, 2023, 44(5): 234-245. |
[2] | 余雪勇, 邱礼翔, 宋家宁, 朱洪波. 无人机辅助边缘计算中安全通信与能效优化策略[J]. 通信学报, 2023, 44(3): 45-54. |
[3] | 李国军, 侯旭, 叶昌荣, 罗一平. 短波通信接入网广域协作资源分配算法[J]. 通信学报, 2023, 44(2): 112-121. |
[4] | 龙隆, 刘子辰, 陆在旺, 张玉成, 李蕾. 移动边缘网络下服务缓存与资源分配联合优化策略[J]. 通信学报, 2023, 44(1): 64-74. |
[5] | 朱晓荣, 陈康. 基于细粒度切片的6G网络弹性切换算法研究[J]. 通信学报, 2022, 43(9): 148-156. |
[6] | 范绍帅, 吴剑波, 田辉. 面向能量受限工业物联网设备的联邦学习资源管理[J]. 通信学报, 2022, 43(8): 65-77. |
[7] | 王莉, 魏青, 徐连明, 沈渊, 张平, 费爱国. 面向通信-导航-感知一体化的应急无人机网络低能耗部署研究[J]. 通信学报, 2022, 43(7): 1-20. |
[8] | 秦鹏, 和昊婷, 赵雄文, 伏阳, 张钰, 王淼, 王硕, 武雪. 基于停放车辆路边单元环境感知的车联网资源高效分配[J]. 通信学报, 2022, 43(7): 113-125. |
[9] | 张达敏, 王义, 邹诚诚, 赵沛雯, 张琳娜. 认知异构蜂窝网络中改进蜉蝣算法的资源分配策略[J]. 通信学报, 2022, 43(6): 156-167. |
[10] | 亓伟敬, 宋清洋, 郭磊. 面向软件定义多模态车联网的双时间尺度RAN切片资源分配[J]. 通信学报, 2022, 43(4): 60-70. |
[11] | 朱政宇, 侯庚旺, 黄崇文, 孙钢灿, 郝万明, 梁静. 基于并行CNN的RIS辅助D2D保密通信系统资源分配算法[J]. 通信学报, 2022, 43(3): 172-179. |
[12] | 孙巍, 宋清洋, 郭磊. 智能反射表面辅助的无线携能通信网络资源分配算法[J]. 通信学报, 2022, 43(2): 34-43. |
[13] | 孙俨, 熊翱, 蒋承伶, 王威, 于东晓, 郭少勇. 基于区块链的计算与无线通信资源联合管理双向拍卖模型[J]. 通信学报, 2022, 43(11): 14-25. |
[14] | 陈赓, 齐书虎, 沈斐, 曾庆田. 面向B5G多业务场景基于D3QN的双时间尺度网络切片算法[J]. 通信学报, 2022, 43(11): 213-224. |
[15] | 苏新, 孟蕾蕾, 周一青, CELIMUGE Wu. 基于深度强化学习的海洋移动边缘计算卸载方法[J]. 通信学报, 2022, 43(10): 133-145. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|