Modeling network diversity for evaluating the robustness of networks against zero-day attacks

Lingyu Wang, Mengyuan Zhang, Sushil Jajodia, Anoop Singhal, Massimiliano Albanese

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

The interest in diversity as a security mechanism has recently been revived in various applications, such as Moving Target Defense (MTD), resisting worms in sensor networks, and improving the robustness of network routing. However, most existing efforts on formally modeling diversity have focused on a single system running diverse software replicas or variants. At a higher abstraction level, as a global property of the entire network, diversity and its impact on security have received limited attention. In this paper, we take the first step towards formally modeling network diversity as a security metric for evaluating the robustness of networks against potential zero day attacks. Specifically, we first devise a biodiversity-inspired metric based on the effective number of distinct resources. We then propose two complementary diversity metrics, based on the least and the average attacking efforts, respectively. Finally, we evaluate our algorithm and metrics through simulation. © 2014 Springer International Publishing Switzerland.
Original languageEnglish
Title of host publicationComputer Security, ESORICS 2014 - 19th European Symposium on Research in Computer Security, Proceedings
PublisherSpringer Verlag
Pages494-511
ISBN (Print)9783319112114
DOIs
Publication statusPublished - 2014
Externally publishedYes
Event19th European Symposium on Research in Computer Security, ESORICS 2014 - , Poland
Duration: 7 Sept 201411 Sept 2014

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference19th European Symposium on Research in Computer Security, ESORICS 2014
Country/TerritoryPoland
Period7/09/1411/09/14

Fingerprint

Dive into the research topics of 'Modeling network diversity for evaluating the robustness of networks against zero-day attacks'. Together they form a unique fingerprint.

Cite this