Show simple item record

dc.contributor.authorTemizkan, Orçun
dc.contributor.authorPark, S.
dc.contributor.authorSaydam, C.
dc.date.accessioned2018-03-19T08:15:01Z
dc.date.available2018-03-19T08:15:01Z
dc.date.issued2017-12
dc.identifier.issn1047-7047en_US
dc.identifier.urihttp://hdl.handle.net/10679/5789
dc.identifier.urihttps://pubsonline.informs.org/doi/10.1287/isre.2017.0722
dc.descriptionDue to copyright restrictions, the access to the full text of this article is only available via subscription.
dc.description.abstractFirms, and other agencies, tend to adopt widely used software to gain economic benefits of scale, which can lead to a software monoculture. This can, in turn, involve the risk of correlated computer systems failure as all systems on the network are exposed to the same software-based vulnerabilities. Software diversity has been introduced as a strategy for disrupting such a monoculture and ultimately decreasing the risk of correlated failure. Nevertheless, common vulnerabilities can be shared by different software products. We thus expand software diversity research here and consider shared vulnerabilities between different software alternatives. We develop a combinatorial optimization model of software diversity on a network in an effort to identify the optimal software distribution that best improves network security. We also develop a simulation model of virus propagation based on the susceptible-infected-susceptible model. This model allows calculation of the epidemic threshold, a measure of network resilience to virus propagation. We then test the effectiveness of the proposed software diversity strategies against the spreading of viruses through a series of experiments.en_US
dc.description.sponsorshipBelk College Summer Research Grant
dc.language.isoengen_US
dc.publisherInformsen_US
dc.relation.ispartofInformation Systems Research
dc.rightsrestrictedAccess
dc.titleSoftware diversity for improved network security: optimal distribution of software-based shared vulnerabilitiesen_US
dc.typeArticleen_US
dc.peerreviewedyesen_US
dc.publicationstatusPublisheden_US
dc.contributor.departmentÖzyeğin University
dc.contributor.authorID(ORCID 0000-0002-6743-3383 & YÖK ID 294756) Temizkan, Orçun
dc.contributor.ozuauthorTemizkan, Orçun
dc.identifier.volume28en_US
dc.identifier.issue4en_US
dc.identifier.startpage828en_US
dc.identifier.endpage849en_US
dc.identifier.wosWOS:000418227500012
dc.identifier.doi10.1287/isre.2017.0722en_US
dc.subject.keywordsSoftware diversityen_US
dc.subject.keywordsShared vulnerabilitiesen_US
dc.subject.keywordsEpidemic spreadingen_US
dc.subject.keywordsEpidemic thresholden_US
dc.subject.keywordsNetwork securityen_US
dc.subject.keywordsCombinatorial optimizationen_US
dc.subject.keywordsSimulationen_US
dc.identifier.scopusSCOPUS:2-s2.0-85038097761
dc.contributor.authorMale1


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record


Share this page