Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/508171.508177acmconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
Article

Heterogeneous networking: a new survivability paradigm

Published: 10 September 2001 Publication History
  • Get Citation Alerts
  • Abstract

    We believe that a network, to be survivable, must be heterogeneous. Just like a species that draws on a small gene pool can succumb to a single environmental threat, so a homogeneous network is vulnerable to a malicious attack that exploits a single weakness common to all of its components. In contrast, in a network in which each critical functionality is provided by a diverse set of protocols and implementations, attacks that focus on a weakness of one such protocol or implementation will not be able to bring down the entire network, even though all elements are not be bulletproof and even if some of components are compromised.Following this survivability through heterogeneity philosophy, we propose a new survivability paradigm, called heterogeneous networking, for improving a network's defense capabilities. Rather than following the current trend of converging towards single solutions to provide the desired functionality at every element of the network architecture, this methodology calls for systematically increasing the network's heterogeneity without sacrificing its interoperability.

    References

    [1]
    A. Avizienis. The n-version aproach to fault-tolerant software. IEEE Transactions on Software Engineering, SE-11(12):1491-1501, December 1985.
    [2]
    A. Avizienis and L. Chen. On the implementation of n-version programming for software fault-tolerance during program execution. In Proceedings of International Computer Software and Applications Conference, pages 149-155, 1977.
    [3]
    C. Cowan and C. Pu. Immunix: Survivability through specialization. In Proceedings of SEI Information Survivability Workshop, San Diego, California, USA, February 1997.
    [4]
    D. Eckhardt and L. Lee. A theoretical basis for the analysis of multiversion software subject to coincident errors. IEEE Transactions on Software Engineering, SE-11(12):1511-1517, 1985.
    [5]
    R. Ellison, D. Fisher, R. Linger, H. Lipson, T. Longstaff, and N. Mead. Survivability: Protecting your critical systems. IEEE Internet Computing, 3(6):55-63, November/December 1999.
    [6]
    S. Forrest, A. Somayaji, and D. Ackley. Building diverse computer systems. In Proceedings of the Sixth Workshop on Hot Topics in Operating Systems (HotOS-VI), pages 67-72, 1997.
    [7]
    M. Joseph and A. Avizienis. A fault tolerance approach to computer viruses. In Proceedings of the 1988 IEEE Symposium on Security and Privacy, pages 52-58, Oakland, California, USA, April 1988.
    [8]
    J. C. Knight and N. G. Leveson. An experimental evaluation of the assumption of independence in multiversion programming. IEEE Transactions on Software Engineering, SE-12(1):96-109, January 1986.
    [9]
    B. Littlewood, P. Popov, and L. Strigini. Modelling software design diversity - a review. ACM Computing Surveys, 33(2):177-208, June 2001.
    [10]
    J. Millen. Local reconfiguration policies. In Proceedings of the 1999 IEEE Symposium on Security and Privacy, pages 48-56, Oakland, California, USA, May 1999.
    [11]
    S. Mitra, N. Saxena, and E. McCluskey. A design diversity metric and reliability analysis for redundant systems. In Proceedings of the 1999 International Test Conference, pages 662-671, Atlantic City, New Jersey, USA, September 1999.
    [12]
    E. Shek, S. Dao, Y. Zhang, D. van Buer, and G. Giuffrida. Intelligent information dissemination services in hybrid satellite-wireless networks. ACM Mobile Networks and Applications (MONET) Journal, 5(4):273-284, December 2000.

    Cited By

    View all
    • (2022)Quantifying Cybersecurity Effectiveness of Dynamic Network DiversityIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2021.310751419:6(3804-3821)Online publication date: 1-Nov-2022
    • (2022)SoK: A Survey on Redundant Execution Technology2021 International Conference on Advanced Computing and Endogenous Security10.1109/IEEECONF52377.2022.10013333(1-14)Online publication date: 21-Apr-2022
    • (2022)Guaranteeing Network Reliability to 0-Day Exploits Using Cost-Effective Heterogeneous Node MigrationIEEE Access10.1109/ACCESS.2022.321567510(111153-111170)Online publication date: 2022
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    NSPW '01: Proceedings of the 2001 workshop on New security paradigms
    September 2001
    157 pages
    ISBN:1581134576
    DOI:10.1145/508171
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 10 September 2001

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. diversity
    2. heterogeneity
    3. network security
    4. survivability

    Qualifiers

    • Article

    Conference

    NSPW01
    Sponsor:
    NSPW01: New Security Paradigms Workshop 2001
    September 10 - 13, 2001
    New Mexico, Cloudcroft

    Acceptance Rates

    Overall Acceptance Rate 62 of 170 submissions, 36%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)7
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 27 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Quantifying Cybersecurity Effectiveness of Dynamic Network DiversityIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2021.310751419:6(3804-3821)Online publication date: 1-Nov-2022
    • (2022)SoK: A Survey on Redundant Execution Technology2021 International Conference on Advanced Computing and Endogenous Security10.1109/IEEECONF52377.2022.10013333(1-14)Online publication date: 21-Apr-2022
    • (2022)Guaranteeing Network Reliability to 0-Day Exploits Using Cost-Effective Heterogeneous Node MigrationIEEE Access10.1109/ACCESS.2022.321567510(111153-111170)Online publication date: 2022
    • (2021)Vulnerability-Aware Resilient Networks: Software Diversity-Based Network AdaptationIEEE Transactions on Network and Service Management10.1109/TNSM.2020.304764918:3(3154-3169)Online publication date: Sep-2021
    • (2021)Study on Costs of Software-based Heterogeneous Redundant Execution2021 7th International Conference on Computer and Communications (ICCC)10.1109/ICCC54389.2021.9674362(1321-1324)Online publication date: 10-Dec-2021
    • (2021)Maximizing Network Reliability to 0-Day Exploits Through a Heterogeneous Node Migration StrategyIEEE Access10.1109/ACCESS.2021.30951499(97747-97759)Online publication date: 2021
    • (2020)A Novel Model of Mimic Defense Based on Minimal L-Order Error ProbabilityIEEE Access10.1109/ACCESS.2020.30248478(180481-180490)Online publication date: 2020
    • (2019)Optimal Multiculture Network Design for Maximizing Resilience in the Face of Multiple Correlated FailuresApplied Sciences10.3390/app91122569:11(2256)Online publication date: 31-May-2019
    • (2019)A Diversity-Based Substation Cyber Defense Strategy Utilizing Coloring GamesIEEE Transactions on Smart Grid10.1109/TSG.2018.288167210:5(5405-5415)Online publication date: Sep-2019
    • (2018)Quantifying the security effectiveness of network diversityProceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security10.1145/3190619.3191680(1-1)Online publication date: 10-Apr-2018
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media