Publication:
Software diversity for improved network security: optimal distribution of software-based shared vulnerabilities

dc.contributor.authorTemizkan, Orçun
dc.contributor.authorPark, S.
dc.contributor.authorSaydam, C.
dc.contributor.departmentManagement Information Systems
dc.contributor.ozuauthorTEMİZKAN, Orçun
dc.date.accessioned2018-03-19T08:15:01Z
dc.date.available2018-03-19T08:15:01Z
dc.date.issued2017-12
dc.descriptionDue to copyright restrictions, the access to the full text of this article is only available via subscription.
dc.description.abstractFirms, and other agencies, tend to adopt widely used software to gain economic benefits of scale, which can lead to a software monoculture. This can, in turn, involve the risk of correlated computer systems failure as all systems on the network are exposed to the same software-based vulnerabilities. Software diversity has been introduced as a strategy for disrupting such a monoculture and ultimately decreasing the risk of correlated failure. Nevertheless, common vulnerabilities can be shared by different software products. We thus expand software diversity research here and consider shared vulnerabilities between different software alternatives. We develop a combinatorial optimization model of software diversity on a network in an effort to identify the optimal software distribution that best improves network security. We also develop a simulation model of virus propagation based on the susceptible-infected-susceptible model. This model allows calculation of the epidemic threshold, a measure of network resilience to virus propagation. We then test the effectiveness of the proposed software diversity strategies against the spreading of viruses through a series of experiments.en_US
dc.description.sponsorshipBelk College Summer Research Grant
dc.identifier.doi10.1287/isre.2017.0722en_US
dc.identifier.endpage849en_US
dc.identifier.issn1047-7047en_US
dc.identifier.issue4en_US
dc.identifier.scopus2-s2.0-85038097761
dc.identifier.startpage828en_US
dc.identifier.urihttp://hdl.handle.net/10679/5789
dc.identifier.urihttps://doi.org/10.1287/isre.2017.0722
dc.identifier.volume28en_US
dc.identifier.wos000418227500012
dc.language.isoengen_US
dc.peerreviewedyesen_US
dc.publicationstatusPublisheden_US
dc.publisherInformsen_US
dc.relation.ispartofInformation Systems Research
dc.rightsinfo:eu-repo/semantics/restrictedAccess
dc.subject.keywordsSoftware diversityen_US
dc.subject.keywordsShared vulnerabilitiesen_US
dc.subject.keywordsEpidemic spreadingen_US
dc.subject.keywordsEpidemic thresholden_US
dc.subject.keywordsNetwork securityen_US
dc.subject.keywordsCombinatorial optimizationen_US
dc.subject.keywordsSimulationen_US
dc.titleSoftware diversity for improved network security: optimal distribution of software-based shared vulnerabilitiesen_US
dc.typeArticleen_US
dspace.entity.typePublication
relation.isOrgUnitOfPublication30d3a6ef-41ef-48c4-b81e-596cfacb314a
relation.isOrgUnitOfPublication.latestForDiscovery30d3a6ef-41ef-48c4-b81e-596cfacb314a

Files

License bundle

Now showing 1 - 1 of 1
Placeholder
Name:
license.txt
Size:
1.45 KB
Format:
Item-specific license agreed upon to submission
Description: