Due to high homogeneity of current network devices, a network is compromised if one node in the network is compromised by exploiting its vulnerability (e.g., malicious packets attack). Many existing works adopt heterogeneity philosophy to improve network survivability. For example, “diverse variants” are assigned to nodes in the network. However, these works assume that diverse variants do not have common vulnerabilities, which deem an invalid assumption in real networks. Therefore, existing diverse variants deployment schemes could not achieve optimal performance. This paper considers that some variants have common vulnerabilities, and proposes a novel solution called Vulnerability-aware Heterogeneous Network Devices Assignment (VHNDA). Fi...
The continual growth of network traffic rates leads to heavy packet processing overheads, and a typi...
Enterprise networks constantly face new security challenges. Obtaining complete network security is ...
Defending against attack is the key successful factor for sensor network security. There are many ap...
Due to high homogeneity of current network devices, a network is compromised if one node in the netw...
The best efforts of the computer security community have not eliminated software with hidden attacka...
Abstract. When there are either design or implementation flaws, a ho-mogeneous architecture is likel...
Network diversity has been widely recognized as an effective defense strategy to mitigate the spread...
A recurrent problem currently affecting network reliability is the simultaneous exploitation of 0-da...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
Enterprise networks constantly face new security challenges. Obtaining complete network security is ...
This dissertation provides strong resilience techniques applying to general networks. Examples of im...
Abstract: Network robustness and network reliability are important issues in the design of Internet ...
We consider adhoc networks with multiple, mobile colluding intruders. We investigate the placement o...
We identify vulnerabilities in epidemic forwarding. We address broadcast applications over wireless ...
Rapid advances in smart devices tremendously facilitate our day-to-day lives. However, these can be ...
The continual growth of network traffic rates leads to heavy packet processing overheads, and a typi...
Enterprise networks constantly face new security challenges. Obtaining complete network security is ...
Defending against attack is the key successful factor for sensor network security. There are many ap...
Due to high homogeneity of current network devices, a network is compromised if one node in the netw...
The best efforts of the computer security community have not eliminated software with hidden attacka...
Abstract. When there are either design or implementation flaws, a ho-mogeneous architecture is likel...
Network diversity has been widely recognized as an effective defense strategy to mitigate the spread...
A recurrent problem currently affecting network reliability is the simultaneous exploitation of 0-da...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
Enterprise networks constantly face new security challenges. Obtaining complete network security is ...
This dissertation provides strong resilience techniques applying to general networks. Examples of im...
Abstract: Network robustness and network reliability are important issues in the design of Internet ...
We consider adhoc networks with multiple, mobile colluding intruders. We investigate the placement o...
We identify vulnerabilities in epidemic forwarding. We address broadcast applications over wireless ...
Rapid advances in smart devices tremendously facilitate our day-to-day lives. However, these can be ...
The continual growth of network traffic rates leads to heavy packet processing overheads, and a typi...
Enterprise networks constantly face new security challenges. Obtaining complete network security is ...
Defending against attack is the key successful factor for sensor network security. There are many ap...