2014
DOI: 10.1007/978-3-662-43936-4_8
|View full text |Cite
|
Sign up to set email alerts
|

Toward Software Diversity in Heterogeneous Networked Systems

Abstract: Abstract. When there are either design or implementation flaws, a homogeneous architecture is likely to be disrupted entirely by a single attack (e.g., a worm) that exploits its vulnerability. Following the survivability through heterogeneity philosophy, we present a novel approach to improving survivability of networked systems by adopting the technique of software diversity. Specifically, we design an efficient algorithm to select and deploy a set of off-the-shelf software to hosts in a networked system, suc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 24 publications
0
8
0
Order By: Relevance
“…Another two different applications of network diversity for increasing network survivability and reliability were introduced in the contexts of cyber-security [34][35][36][37] and virus contention [38][39][40][41]. In [34,35] attack graphs and attack paths are defined as the ways an attacker can get access to a network asset.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Another two different applications of network diversity for increasing network survivability and reliability were introduced in the contexts of cyber-security [34][35][36][37] and virus contention [38][39][40][41]. In [34,35] attack graphs and attack paths are defined as the ways an attacker can get access to a network asset.…”
Section: Related Workmentioning
confidence: 99%
“…In [39], three random-distributed techniques were developed to sub-optimally solve the NP-hard perfect coloring problem in non-exponential time. Huang et al proposed the graph multicoloring problem to minimize the number of shared software executed on neighboring nodes [40]. Should malware compromises software in one node, this would stay contained in the subgraph containing the node and the neighbors with the common vulnerability.…”
Section: Related Workmentioning
confidence: 99%
“…Common vulnerabilities in neighbor nodes allow an attacker to employ the same tool to gain control of both nodes, easing how the attacker acquires targets in the network by propagation. To avoid the exploitation of 0-day shared vulnerabilities in such fashion, works like [14], [31]- [33] propose to diversify the network resources implemented in neighbor nodes. The models and problem statements presented in the works above improved our vision on network diversity methods.…”
Section: Related Workmentioning
confidence: 99%
“…However, works like [24], [25], and the vulnerability disclosure databases [9]- [13] reveal that apparently unrelated implementations could share common risks due to code reutilization, third-party software applications, etc. In the literature, other authors have considered shared vulnerabilities, such as [14], [31]- [33], [37], [41]- [43]. Some authors take into account shared vulnerabilities assessing the number of common vulnerabilities disclosed between the available technologies.…”
Section: Related Workmentioning
confidence: 99%
“…By solving this problem, it achieves better isolation between adjacent variants while using only a limited number of diversified applications. Finally, the software assignment problem, i.e., how to optimally assign diverse software to different hosts in a network in order to improve the network's resilience to security threats like worms, is addressed in [45] by considering practical constraints, and a similar issue is formulated and solved as a multi-objective optimization problem in [46].…”
Section: N-version Programming and N-variant Systemsmentioning
confidence: 99%