2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2020
DOI: 10.1109/dsn48063.2020.00055
|View full text |Cite
|
Sign up to set email alerts
|

Scalable Approach to Enhancing ICS Resilience by Network Diversity

Abstract: Network diversity has been widely recognized as an effective defense strategy to mitigate the spread of malware. Optimally diversifying network resources can improve the resilience of a network against malware propagation. This work proposes a scalable method to compute such an optimal deployment, in the context of upgrading a legacy Industrial Control System with modern IT infrastructure. Our approach can tolerate various constraints when searching for optimal diversification, such as outdated products and st… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 20 publications
0
7
0
Order By: Relevance
“…The main contributions of the paper are as follows: 1) We investigate the effectiveness of redundancy to mitigate attack impacts, taking the service capacity analysis angle to redundancy and diversity. This differs from previous works on the use of diversity for security such as [2], [3], [4], which focus on identifying which parts of a system to diversify, but without considering overall performance. On the capacity analysis side, where performance modeling is common, our work differs in our focus on malicious attacks.…”
Section: Introductionmentioning
confidence: 80%
See 1 more Smart Citation
“…The main contributions of the paper are as follows: 1) We investigate the effectiveness of redundancy to mitigate attack impacts, taking the service capacity analysis angle to redundancy and diversity. This differs from previous works on the use of diversity for security such as [2], [3], [4], which focus on identifying which parts of a system to diversify, but without considering overall performance. On the capacity analysis side, where performance modeling is common, our work differs in our focus on malicious attacks.…”
Section: Introductionmentioning
confidence: 80%
“…Diversity: Existing studies on the use of diversity to increase robustness to attacks (e.g. [2], [3], [4]) focus on optimizing network service diversity to resist attack propagation. By comparison, we determine the optimal number of (diverse) servers to be used for the services provided by a system in order to limit the impacts from attacks, with diversity arising in the different server types used for a given service.…”
Section: Related Workmentioning
confidence: 99%
“…Common vulnerabilities in neighbor nodes allow an attacker to employ the same tool to gain control of both nodes, easing how the attacker acquires targets in the network by propagation. To avoid the exploitation of 0-day shared vulnerabilities in such fashion, works like [14], [31]- [33] propose to diversify the network resources implemented in neighbor nodes. The models and problem statements presented in the works above improved our vision on network diversity methods.…”
Section: Related Workmentioning
confidence: 99%
“…However, works like [24], [25], and the vulnerability disclosure databases [9]- [13] reveal that apparently unrelated implementations could share common risks due to code reutilization, third-party software applications, etc. In the literature, other authors have considered shared vulnerabilities, such as [14], [31]- [33], [37], [41]- [43]. Some authors take into account shared vulnerabilities assessing the number of common vulnerabilities disclosed between the available technologies.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation