Publication: Software diversity for improved network security: optimal distribution of software-based shared vulnerabilities
dc.contributor.author | Temizkan, Orçun | |
dc.contributor.author | Park, S. | |
dc.contributor.author | Saydam, C. | |
dc.contributor.department | Management Information Systems | |
dc.contributor.ozuauthor | TEMİZKAN, Orçun | |
dc.date.accessioned | 2018-03-19T08:15:01Z | |
dc.date.available | 2018-03-19T08:15:01Z | |
dc.date.issued | 2017-12 | |
dc.description | Due to copyright restrictions, the access to the full text of this article is only available via subscription. | |
dc.description.abstract | Firms, and other agencies, tend to adopt widely used software to gain economic benefits of scale, which can lead to a software monoculture. This can, in turn, involve the risk of correlated computer systems failure as all systems on the network are exposed to the same software-based vulnerabilities. Software diversity has been introduced as a strategy for disrupting such a monoculture and ultimately decreasing the risk of correlated failure. Nevertheless, common vulnerabilities can be shared by different software products. We thus expand software diversity research here and consider shared vulnerabilities between different software alternatives. We develop a combinatorial optimization model of software diversity on a network in an effort to identify the optimal software distribution that best improves network security. We also develop a simulation model of virus propagation based on the susceptible-infected-susceptible model. This model allows calculation of the epidemic threshold, a measure of network resilience to virus propagation. We then test the effectiveness of the proposed software diversity strategies against the spreading of viruses through a series of experiments. | en_US |
dc.description.sponsorship | Belk College Summer Research Grant | |
dc.identifier.doi | 10.1287/isre.2017.0722 | en_US |
dc.identifier.endpage | 849 | en_US |
dc.identifier.issn | 1047-7047 | en_US |
dc.identifier.issue | 4 | en_US |
dc.identifier.scopus | 2-s2.0-85038097761 | |
dc.identifier.startpage | 828 | en_US |
dc.identifier.uri | http://hdl.handle.net/10679/5789 | |
dc.identifier.uri | https://doi.org/10.1287/isre.2017.0722 | |
dc.identifier.volume | 28 | en_US |
dc.identifier.wos | 000418227500012 | |
dc.language.iso | eng | en_US |
dc.peerreviewed | yes | en_US |
dc.publicationstatus | Published | en_US |
dc.publisher | Informs | en_US |
dc.relation.ispartof | Information Systems Research | |
dc.rights | info:eu-repo/semantics/restrictedAccess | |
dc.subject.keywords | Software diversity | en_US |
dc.subject.keywords | Shared vulnerabilities | en_US |
dc.subject.keywords | Epidemic spreading | en_US |
dc.subject.keywords | Epidemic threshold | en_US |
dc.subject.keywords | Network security | en_US |
dc.subject.keywords | Combinatorial optimization | en_US |
dc.subject.keywords | Simulation | en_US |
dc.title | Software diversity for improved network security: optimal distribution of software-based shared vulnerabilities | en_US |
dc.type | Article | en_US |
dspace.entity.type | Publication | |
relation.isOrgUnitOfPublication | 30d3a6ef-41ef-48c4-b81e-596cfacb314a | |
relation.isOrgUnitOfPublication.latestForDiscovery | 30d3a6ef-41ef-48c4-b81e-596cfacb314a |
Files
License bundle
1 - 1 of 1
- Name:
- license.txt
- Size:
- 1.45 KB
- Format:
- Item-specific license agreed upon to submission
- Description: