Due to high homogeneity of current network devices, a network is compromised if one node in the network is compromised by exploiting its vulnerability (e.g., malicious packets attack). Many existing works adopt heterogeneity philosophy to improve network survivability. For example, “diverse variants” are assigned to nodes in the network. However, these works assume that diverse variants do not have common vulnerabilities, which deem an invalid assumption in real networks. Therefore, existing diverse variants deployment schemes could not achieve optimal performance. This paper considers that some variants have common vulnerabilities, and proposes a novel solution called Vulnerability-aware Heterogeneous Network Devices Assignment (VHNDA). Fi...
As malware attacks become more frequent in mobile networks, deploying an efficient defense system to...
Abstract—A considerable amount of research effort has fo-cused on developing metrics and approaches ...
International audienceDistributed Denial of Service (DDoS) cyberattacks represent a major security r...
Due to high homogeneity of current network devices, a network is compromised if one node in the netw...
The best efforts of the computer security community have not eliminated software with hidden attacka...
Abstract. When there are either design or implementation flaws, a ho-mogeneous architecture is likel...
A recurrent problem currently affecting network reliability is the simultaneous exploitation of 0-da...
Enterprise networks constantly face new security challenges. Obtaining complete network security is ...
We study the problem of optimal resource allocation for packet selection and inspection to detect po...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
Network diversity has been widely recognized as an effective defense strategy to mitigate the spread...
This dissertation provides strong resilience techniques applying to general networks. Examples of im...
Abstract: Network robustness and network reliability are important issues in the design of Internet ...
The dynamicity of today’s networks has created uncertainties for security administrators about the d...
As malware attacks become more frequently in mobile networks, deploying an efficient defense system ...
As malware attacks become more frequent in mobile networks, deploying an efficient defense system to...
Abstract—A considerable amount of research effort has fo-cused on developing metrics and approaches ...
International audienceDistributed Denial of Service (DDoS) cyberattacks represent a major security r...
Due to high homogeneity of current network devices, a network is compromised if one node in the netw...
The best efforts of the computer security community have not eliminated software with hidden attacka...
Abstract. When there are either design or implementation flaws, a ho-mogeneous architecture is likel...
A recurrent problem currently affecting network reliability is the simultaneous exploitation of 0-da...
Enterprise networks constantly face new security challenges. Obtaining complete network security is ...
We study the problem of optimal resource allocation for packet selection and inspection to detect po...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
Network diversity has been widely recognized as an effective defense strategy to mitigate the spread...
This dissertation provides strong resilience techniques applying to general networks. Examples of im...
Abstract: Network robustness and network reliability are important issues in the design of Internet ...
The dynamicity of today’s networks has created uncertainties for security administrators about the d...
As malware attacks become more frequently in mobile networks, deploying an efficient defense system ...
As malware attacks become more frequent in mobile networks, deploying an efficient defense system to...
Abstract—A considerable amount of research effort has fo-cused on developing metrics and approaches ...
International audienceDistributed Denial of Service (DDoS) cyberattacks represent a major security r...