Network diversity has been widely recognized as an effective defense strategy to mitigate the spread of malware. Optimally diversifying network resources can improve the resilience of a network against malware propagation. This work proposes a scalable method to compute such an optimal deployment, in the context of upgrading a legacy Industrial Control System with modern IT infrastructure. Our approach can tolerate various constraints when searching for optimal diversification, such as outdated products and strict configurationpolicies.We explicitly measure the vulnerability similarity of products based on the CVE/NVD, to estimate the infection rate of malware between products. A Stuxnet-inspired case demonstrates our optimal diversification i...
Cyber crime is a significant threat to modern society that will continue to grow as technology is in...
Originally designed as self-contained and isolated networks, IndustrialControl Systems (ICS) have ev...
Artificial diversity is one method for mitigating the security risks of software monoculture. Introd...
Network diversity has been widely recognized as an effective defense strategy to mitigate the spread...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
This work discusses the role of diversity as a mean towards secure monitoring and control. The intui...
The best efforts of the computer security community have not eliminated software with hidden attacka...
International audienceWhen there are either design or implementation flaws, a homogeneous architectu...
This dissertation provides strong resilience techniques applying to general networks. Examples of im...
Due to high homogeneity of current network devices, a network is compromised if one node in the netw...
The increasing dependence on information networks for business operations has focused managerial att...
The implementation of diversity in testbeds is essential to understanding and improving the security...
Due to high homogeneity of current network devices, a network is compromised if one node in the netw...
Cyber crime is a significant threat to modern society that will continue to grow as technology is in...
Despite the variety of choices regarding hardware and software, to date a large number of computer s...
Cyber crime is a significant threat to modern society that will continue to grow as technology is in...
Originally designed as self-contained and isolated networks, IndustrialControl Systems (ICS) have ev...
Artificial diversity is one method for mitigating the security risks of software monoculture. Introd...
Network diversity has been widely recognized as an effective defense strategy to mitigate the spread...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
This work discusses the role of diversity as a mean towards secure monitoring and control. The intui...
The best efforts of the computer security community have not eliminated software with hidden attacka...
International audienceWhen there are either design or implementation flaws, a homogeneous architectu...
This dissertation provides strong resilience techniques applying to general networks. Examples of im...
Due to high homogeneity of current network devices, a network is compromised if one node in the netw...
The increasing dependence on information networks for business operations has focused managerial att...
The implementation of diversity in testbeds is essential to understanding and improving the security...
Due to high homogeneity of current network devices, a network is compromised if one node in the netw...
Cyber crime is a significant threat to modern society that will continue to grow as technology is in...
Despite the variety of choices regarding hardware and software, to date a large number of computer s...
Cyber crime is a significant threat to modern society that will continue to grow as technology is in...
Originally designed as self-contained and isolated networks, IndustrialControl Systems (ICS) have ev...
Artificial diversity is one method for mitigating the security risks of software monoculture. Introd...