Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Pei Yu Chen is active.

Publication


Featured researches published by Pei Yu Chen.


hybrid artificial intelligence systems | 2011

Evaluation of network survivability considering degree of disconnectivity

Frank Yeong-Sung Lin; Hong Hsu Yen; Pei Yu Chen; Ya Fang Wen

It is impossible for a system or network to keep completely safe with the possibility of many new threats occurring at any moment. To analyze and solve these kinds of problems, this paper presents a mathematical programming problem, which adopts a novel metric called Degree of Disconnectivity (DOD) to evaluate the damage level and survivability of a network. To evaluate and analyze the robustness of a network for network operators, this problem is modeled as a mathematical programming problem. Here, an attacker applies his limited attack power intelligently to the targeted network. The objective of the attacker is to compromise nodes, resulting in disconnections of O-D pairs, to ensure that the proposed degree of disconnectivity metric reachs a given level. A Lagrangean relaxation-based algorithm is adopted to solve the proposed problem.


distributed computing and artificial intelligence | 2012

Resource Allocation Strategies to Maximize Network Survivability Considering of Average DOD

Frank Yeong-Sung Lin; Pei Yu Chen; Quen Ting Chen

In this paper, an innovative metric called Average Degree of Disconnectivity (Average DOD) is proposed. The Average DOD combining the concept of the probability calculated by contest success function with the DOD metric would be used to evaluate the damage degree of network. The larger value of the Average DOD, the more damage degree of the network would be. An attack-defense scenario as a mathematical model would be used to support network operators to predict that all the likelihood strategies both cyber attacker and network defender would take. The attacker could use the attack resources to launch attack on the nodes of network. On the other hand, the network defender allocates existed resources of defender to protect survival nodes of network. In the process of problem solving, the “gradient method” and “game theory” would be adopted to find the optimal resource allocation strategies for both cyber attacker and network defender.


international conference on computational science and its applications | 2011

Maximization of network survivability considering degree of disconnectivity

Frank Yeong-Sung Lin; Hong Hsu Yen; Pei Yu Chen

The issues of survivability of networks, especially to some open year round services have increased rapidly over the last few years. To address this topic, the effective survivability metric is mandatory for managerial responsibility. In this paper, we provide a survivability mechanism called Degree of Disconnectivity (DOD) for the network operator to detect risks. To evaluate and analyze the robustness of a network for network operators, this problem is modeled as a mathematical programming problem. An attacker applies his limited attack power intelligently to the targeted network. The objective of the attacker is to compromise nodes, which means to disable the connections of O-D pairs, to achieve the goal of reaching a given level of the proposed Degree of Disconnectivity metric. A Lagrangean Relaxation-based algorithm is adopted to solve the proposed problem.


9th FTRA InternationalConference on Future Information Technology, FutureTech 2014 | 2014

An Evaluation of Network Survivability under the Effect of Accumulated Experience from Sophisticated Attackers

Pei Yu Chen; Frank Yeong-Sung Lin

This paper is focused on the resource allocation of network attack and defense with mathematical programming and to optimize the problem. It adopts a concept, discount coupon, to describe the attack behavior of taking advantage of accumulated experience from his previous attack actions of minimizing future attack cost. The attacker obtains free experience before he launch an attack or from a compromised node which could further reduce the cost of an attack. The attacker’s objective is to minimize the total attack cost, while the core node is compromised and the network could not survive. Here, by transforming with node splitting into a generalized shortest path problem and applying the algorithm to optimally solve it.


9th FTRA InternationalConference on Future Information Technology, FutureTech 2014 | 2014

Resource Allocation Strategies under Attack-Defense Dual-Role and Malicious Attacks

Pei Yu Chen; Ying Ju Chen; Frank Yeong-Sung Lin

How to efficiently evaluate the network survivability is a critical issue in nowadays. Hence, we develop a multi-round network attack-defense scenario with dual-role players, who can attack and defend, and establish a mathematical model to optimize resource allocation and then predict the network survivability by the Average DOD. In each round, the players could allocate their attack resources on the nodes of their own network and on another player’s network after updating related information about another player’s. Furthermore, they could reallocate existing defense resources and repair compromised nodes. To solve the problem, the gradient method and the game theory would be adopted to find the optimal resource allocation strategies for both players.


Journal of Applied Mathematics | 2013

Recovery and Resource Allocation Strategies to Maximize Mobile Network Survivability by Using Game Theories and Optimization Techniques

Pei Yu Chen; Frank Yeong-Sung Lin

With more and more mobile device users, an increasingly important and critical issue is how to efficiently evaluate mobile network survivability. In this paper, a novel metric called Average Degree of Disconnectivity (Average DOD) is proposed, in which the concept of probability is calculated by the contest success function. The DOD metric is used to evaluate the damage degree of the network, where the larger the value of the Average DOD, the more the damage degree of the network. A multiround network attack-defense scenario as a mathematical model is used to support network operators to predict all the strategies both cyber attacker and network defender would likely take. In addition, the Average DOD would be used to evaluate the damage degree of the network. In each round, the attacker could use the attack resources to launch attacks on the nodes of the target network. Meanwhile, the network defender could reallocate its existing resources to recover compromised nodes and allocate defense resources to protect the survival nodes of the network. In the approach to solving this problem, the “gradient method” and “game theory” are adopted to find the optimal resource allocation strategies for both the cyber attacker and mobile network defender.


international conference industrial engineering other applications applied intelligent systems | 2011

Network defense strategies for maximization of network survivability

Frank Yeong-Sung Lin; Hong Hsu Yen; Pei Yu Chen; Ya Fang Wen

The Internet has brought about several threats of information security to individuals and cooperates. It is difficult to keep a network completely safe because cyber attackers can launch attacks through networks without limitations of time and space. As a result, it is an important and critical issue be able to efficiently evaluate network survivability. In this paper, an innovative metric called the Degree of Disconnectivity (DOD) is proposed, which is used to evaluate the damage level of the network. A network attack-defense scenario is also considered in this problem, in which the attack and defense actions are composed by many rounds with each round containing two stages. In the first stage, defenders deploy limited resources on the nodes resulting in attackers needing to increase attack costs to compromise the nodes. In the second stage, the attacker uses his limited budget to launch attacks, trying to maximize the damage of the network. The Lagrangean Relaxation Method is applied to obtain optimal solutions for the problem.


international conference industrial engineering other applications applied intelligent systems | 2010

Near optimal secret sharing for information leakage maximization

Frank Yeong-Sung Lin; Kuo Chung Chu; Pei Yu Chen; Guan Wei Chen

In this paper, we propose a mathematical programming model to describe an offense-defense scenario. In the offense problem, the objective of attackers is to compromise nodes in order to steal information. Therefore, the attackers try to recover secrets through compromising certain nodes and to maximize the information leakage as much as possible. During the attack actions, the attacker must allocate a limited budget to collect a large enough number of shares and decrypted keys through compromising certain nodes. Therefore, we advocate Lagrangean Relaxation algorithms and the proposed heuristics to find a near optimal solution. Through solutions from the perspective of the attacker, we then induce some efficient defense mechanisms for the network operators.


Materials Characterization | 2016

Crystallographic analysis of lenticular martensite in Fe–1.0C–17Cr stainless steel by electron backscatter diffraction

Yih-Leong Chang; Pei Yu Chen; Yu-Huan Tsai; Jyh-Yuan Yang


Archive | 2011

DEVICE, METHOD AND SYSTEM FOR VIRTUAL BUSINESS OPERATION BASED ON POSITIONING TECHNOLOGY

Yeong Sung Lin; Jen-Wel Chen; Pei Yu Chen; Yu Shun Wang; Yao-Yuan Chang; Shih-Chang Lin; Yi-Wei Li; Pin Hung Chen; Yung-Pin Tsai

Collaboration


Dive into the Pei Yu Chen's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Quen Ting Chen

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar

Ya Fang Wen

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar

Yu Shun Wang

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar

Guan Wei Chen

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar

Huan Ting Chen

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar

Jen-Wel Chen

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar

Jyh-Yuan Yang

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar

Kuo Chung Chu

National Taiwan University

View shared research outputs
Researchain Logo
Decentralizing Knowledge