Vulnerability-Aware Resilient Networks: Software Diversity-based Network Adaptation
نویسندگان
چکیده
By leveraging the principle of software polyculture to ensure security in a network, we propose vulnerability-based diversity metric determine how network topology can be adapted minimize vulnerability while maintaining maximum connectivity. Our proposed estimates node using vulnerabilities packages installed on nearby nodes attack paths reachable node. diversity-based adaptation (SDA) scheme employs each for edge adaptations. These adaptations include removal edges that expose high as well potential addition between certain with low associated them. To validate SDA scheme, conduct extensive experiments comparing our approach counterpart baseline schemes real networks. simulation results demonstrate outperforms these existing counterparts. We discuss insights into findings terms effectiveness and efficiency under three topologies vastly different densities.
منابع مشابه
Transcoding-Based Error-Resilient Video Adaptation for 3G Wireless Networks
Transcoding is an effective method to provide video adaptation for heterogeneous internetwork video access and communication environments, which require the tailoring (i.e., repurposing) of coded video properties to channel conditions, terminal capabilities, and user preferences. This paper presents a video transcoding system that is capable of applying a suite of error resilience tools on the ...
متن کاملNetwork-Aware Adaptation of MAC Scheduling for Wireless Sensor Networks
Many recent advances in MAC protocols for wireless sensor networks propose to reduce idle listening. Sending nodes transmit long preambles or repeated advertisements for upcoming packets, thereby allowing their neighbors to have low duty cycles. As these “channel probing MAC protocols” impose a significant drain on the transmitting node, the schedule used for probing should be well matched to t...
متن کاملCANVuS: Context-Aware Network Vulnerability Scanning
Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of network devices and the services they are running. Traditional vulnerability scanning systems meet these requirements by periodically probing target networks to discover hosts and the services they are running. This po...
متن کاملCost-aware Topology Customization of Mesh-based Networks-on-Chip
Nowadays, the growing demand for supporting multiple applications causes to use multiple IPs onto the chip. In fact, finding truly scalable communication architecture will be a critical concern. To this end, the Networks-on-Chip (NoC) paradigm has emerged as a promising solution to on-chip communication challenges within the silicon-based electronics. Many of today’s NoC architectures are based...
متن کاملModel-Centric, Context-Aware Software Adaptation
Software must be constantly adapted to changing requirements. The time scale, abstraction level and granularity of adaptations may vary from short-term, fine-grained adaptation to long-term, coarsegrained evolution. Fine-grained, dynamic and context-dependent adaptations can be particularly difficult to realize in long-lived, large-scale software systems. We argue that, in order to effectively ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Network and Service Management
سال: 2021
ISSN: ['2373-7379', '1932-4537']
DOI: https://doi.org/10.1109/tnsm.2020.3047649