Due to the constantly evolving nature of cyber threats and attacks, organisations see an ever-growing requirement to develop more sophisticated defence systems to protect their networks and information. In an arms race such as this, employing as many techniques as possible is crucial for companies to stay ahead of would-be attackers. Design diversity is a technique with a significant history behind it, which has become more widely used as the availability of off-the-shelf defence software has become more commonplace. The simple concept behind design diversity is the age-old saying that ”two minds think better than one”. When combining multiple tools for cyber defence, it’s reasonable to expect that when these tools use different techniqu...
All empirical evidence indicates that diversity between redundant software-based components offers s...
We present ongoing work about how the use of diverse tools may help with detecting malicious web scr...
Network diversity has been widely recognized as an effective defense strategy to mitigate the spread...
Most modern computer systems are connected to the Internet. This brings many opportunities for reven...
Defence-in-depth is a term often used in security literature to denote architectures in which multip...
Many commercial anti-virus software already usesome form of machine learning to help wit...
This work discusses the role of diversity as a mean towards secure monitoring and control. The intui...
In this paper we describe the design of a new set of empirical studies we will run to test the gains...
Cyber crime is a significant threat to modern society that will continue to grow as technology is in...
Signature-based similarity metrics are the primary mech-anism to detect malware on current systems. ...
Diversity is an important and valuable concept that has been adopted in many fields to reduce correl...
We present an analysis of the diversity that exists in the rules and blacklisted IP addresses of the...
Abstract—The idea of automatic software diversity is at least two decades old. The deficiencies of c...
Abstract—The idea of automatic software diversity is at least two decades old. The deficiencies of c...
International audienceEarly experiments with software diversity in the mid 1970's investigated N-ver...
All empirical evidence indicates that diversity between redundant software-based components offers s...
We present ongoing work about how the use of diverse tools may help with detecting malicious web scr...
Network diversity has been widely recognized as an effective defense strategy to mitigate the spread...
Most modern computer systems are connected to the Internet. This brings many opportunities for reven...
Defence-in-depth is a term often used in security literature to denote architectures in which multip...
Many commercial anti-virus software already usesome form of machine learning to help wit...
This work discusses the role of diversity as a mean towards secure monitoring and control. The intui...
In this paper we describe the design of a new set of empirical studies we will run to test the gains...
Cyber crime is a significant threat to modern society that will continue to grow as technology is in...
Signature-based similarity metrics are the primary mech-anism to detect malware on current systems. ...
Diversity is an important and valuable concept that has been adopted in many fields to reduce correl...
We present an analysis of the diversity that exists in the rules and blacklisted IP addresses of the...
Abstract—The idea of automatic software diversity is at least two decades old. The deficiencies of c...
Abstract—The idea of automatic software diversity is at least two decades old. The deficiencies of c...
International audienceEarly experiments with software diversity in the mid 1970's investigated N-ver...
All empirical evidence indicates that diversity between redundant software-based components offers s...
We present ongoing work about how the use of diverse tools may help with detecting malicious web scr...
Network diversity has been widely recognized as an effective defense strategy to mitigate the spread...