2015
DOI: 10.1109/tdsc.2014.2373392
|View full text |Cite
|
Sign up to set email alerts
|

Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes

Abstract: Abstract-Networks with homogeneous routing nodes are constantly at risk as any vulnerability found against a node could be used to compromise all nodes. Introducing diversity among nodes can be used to address this problem. With few variants, the choice of assignment of variants to nodes is critical to the overall network resiliency.We present the Diversity Assignment Problem (DAP), the assignment of variants to nodes in a network, and we show how to compute the optimal solution in medium-size networks. We als… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

2
13
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(15 citation statements)
references
References 26 publications
2
13
0
Order By: Relevance
“…Figure 2 shows the HARM of the virtualized system. The AT shown in Figure 2 for V M 1 (as shown in Table 1 [14], [15], [16] Application [17], [18] Diversity Topology [19], [20] Application [21], [22], [23], [24], [25], [26] Redundancy Topology [27], [28] Application [29], [30], [31], [32] …”
Section: Generating a Harmmentioning
confidence: 99%
See 4 more Smart Citations
“…Figure 2 shows the HARM of the virtualized system. The AT shown in Figure 2 for V M 1 (as shown in Table 1 [14], [15], [16] Application [17], [18] Diversity Topology [19], [20] Application [21], [22], [23], [24], [25], [26] Redundancy Topology [27], [28] Application [29], [30], [31], [32] …”
Section: Generating a Harmmentioning
confidence: 99%
“…We focus our network hardening based on securing important nodes in the attack paths, such as shown in [20] (but not routing nodes here), rather than end points of an attack (i.e., initial attack points and the target nodes) because of the following reasons: (i) in a virtualized system (e.g., cloud), visible components or nodes to the attacker (i.e., initial attack points) may change frequently (e.g., service updates), (ii) assets in the networked system change, and there may exist multiple assets (i.e., multiple target nodes), and (iii) target nodes are estimated with asset values but it is still difficult to specify them in an event of an attack.…”
Section: Securing Attack Pathsmentioning
confidence: 99%
See 3 more Smart Citations