2019
DOI: 10.1587/transinf.2018edp7414
|View full text |Cite
|
Sign up to set email alerts
|

A Diversity Metric Based Study on the Correlation between Diversity and Security

Abstract: Software diversity can be utilized in cyberspace security to defend against the zero-day attacks. Existing researches have proved the effectiveness of diversity in bringing security benefits, but few of them touch the problem that whether there is a positive correlation between the security and the diversity. In addition, there is little guidance on how to construct an effective diversified system. For that, this paper develops two diversity metrics based on system attribute matrix, proposes a diversity measur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…To mitigate shared vulnerabilities under the microservice architecture, we have established a diversified microservices deployment model to maximize the resilience of the system. Combined with the problem of load balancing, a microservice deployment algorithm based on load balancing and diversity is proposed, which reduces the service's dependence on the underlying mirror by abundant diversity and avoids the overreliance of microservices on a single node through decentralized deployment, while taking into account load balancing [31].…”
Section: Discussionmentioning
confidence: 99%
“…To mitigate shared vulnerabilities under the microservice architecture, we have established a diversified microservices deployment model to maximize the resilience of the system. Combined with the problem of load balancing, a microservice deployment algorithm based on load balancing and diversity is proposed, which reduces the service's dependence on the underlying mirror by abundant diversity and avoids the overreliance of microservices on a single node through decentralized deployment, while taking into account load balancing [31].…”
Section: Discussionmentioning
confidence: 99%
“…Measuring the variants' diversity. The authors ofLiu et al (2018),Gu et al (2017), andTong et al (2019) divided variants into components such as processor, operating system, application software, protocol stack, etc., and measured the differences of components separately. From a security perspective, the works ofZhang et al (2020), andLi et al (2018) used symbiosis vulnerabilities to compare the similarity between the two variants.…”
mentioning
confidence: 99%