Modeling software design diversity: a review
ACM Computing Surveys (CSUR)
Computer Networks: The International Journal of Computer and Telecommunications Networking
Building Diverse Computer Systems
HOTOS '97 Proceedings of the 6th Workshop on Hot Topics in Operating Systems (HotOS-VI)
Communications of the ACM - Homeland security
Review and analysis of synthetic diversity for breaking monocultures
Proceedings of the 2004 ACM workshop on Rapid malcode
On achieving software diversity for improved network security using distributed coloring algorithms
Proceedings of the 11th ACM conference on Computer and communications security
Software Diversity as a Defense against Viral Propagation: Models and Simulations
Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation
Improving sensor network immunity under worm attacks: a software diversity approach
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
Hi-index | 0.00 |
In the biological world, species are known to ensure survival by introducing variations among individuals of the species, some of which may have superior survival characteristics in the event of certain environmental changes. While not precisely equivalent, networked computer systems also must 'survive' in a rapidly changing environment. In particular, as with its biological analog there are predators in the network world that must be thwarted.This paper shows that in the macro-, as well as in the micro- senses, system diversity is an important tool for network survivability. A malware attack on the Internet can have serious implications for many nodes but is unlikely to cross operating system or server application boundaries and thus to entirely disrupt the heterogeneous Internet.Individual networks that attach to the Internet can be developed using layers of servers, each with a different hardware and/or software basis, to isolate core servers from networked malefactors. Such a topology requires an attacker to employ a wide range of exploits, different ones tailored to each system at each protective layer of systems. This paper demonstrates how the layering technique protects networked systems.