Filters








3,893 Hits in 7.0 sec

Increasing network resiliency by optimally assigning diverse variants to routing nodes

Andrew Newell, Daniel Obenshain, Thomas Tantillo, Cristina Nita-Rotaru, Yair Amir
2013 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)  
We present the Diversity Assignment Problem (DAP), the assignment of variants to nodes in a network, and we show how to compute the optimal solution in medium-size networks.  ...  Introducing diversity among nodes can be used to address this problem. With few variants, the choice of assignment of variants to nodes is critical to the overall network resiliency.  ...  ACKNOWLEDGEMENT This work was supported in part by DARPA grant N660001-1-2-4014.  ... 
doi:10.1109/dsn.2013.6575305 dblp:conf/dsn/NewellOTNA13 fatcat:pfhmwa7aufhxzmdzugfioy4yb4

Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes

Andrew Newell, Daniel Obenshain, Thomas Tantillo, Cristina Nita-Rotaru, Yair Amir
2015 IEEE Transactions on Dependable and Secure Computing  
We present the Diversity Assignment Problem (DAP), the assignment of variants to nodes in a network, and we show how to compute the optimal solution in medium-size networks.  ...  Introducing diversity among nodes can be used to address this problem. With few variants, the choice of assignment of variants to nodes is critical to the overall network resiliency.  ...  ACKNOWLEDGEMENT This work was supported in part by DARPA grant N660001-1-2-4014.  ... 
doi:10.1109/tdsc.2014.2373392 fatcat:bmmhkrix6nhp7g3m6qqo2k5fyi

Improving ICS Cyber Resilience through Optimal Diversification of Network Resources [article]

Tingting Li and Cheng Feng and Chris Hankin
2019 arXiv   pre-print
Optimally diversifying network resources can improve the resilience of a network against malware propagation.  ...  We then measure the improved resilience of the diversified network in terms of a well-defined diversity metric and Mean-time-to-compromise (MTTC), to verify the effectiveness of our approach.  ...  [21] found an efficient approach to compute the optimal solution for placing diverse software/OS variants on routing nodes to improve overall network resilience given the assumption that each variant  ... 
arXiv:1811.00142v2 fatcat:zpylldeq4nau5o5nbmcagwdmv4

Developing a Resilient, Robust and Efficient Supply Network in Africa [article]

Bruce A. Cox, Christopher M. Smith, Timothy W. Breitbach, Jade F. Baker, Paul P. Rebeiz
2020 arXiv   pre-print
Next, we develop a mathematical model leveraging this framework to design a resilient supply network that minimizes cost while ensuring the network functions following a disruption.  ...  Supply chains need to balance competing objectives; in addition to efficiency they need to be resilient to adversarial and environmental interference, and robust to uncertainties in long term demand.  ...  The primary goal of this research is to identify an optimal variant of the network which adds resiliency to disruption while maintaining efficiency.  ... 
arXiv:2003.02131v1 fatcat:gpccvysed5b4pa7vxdmdxtb3uq

Developing a resilient, robust and efficient supply network in Africa

Jade F. Preston, Bruce A. Cox, Paul P. Rebeiz, Timothy W. Breitbach
2021 Journal of Defense Analytics and Logistics  
Next, the authors develop a mathematical model leveraging this framework to design a resilient supply network that minimizes cost while ensuring the network functions following a disruption.  ...  PurposeSupply chains need to balance competing objectives; in addition to efficiency, supply chains need to be resilient to adversarial and environmental interference and robust to uncertainties in long-term  ...  The primary goal of this research is to identify an optimal variant of the network that adds resilience to disruption while maintaining efficiency and adding robustness to demand changes.  ... 
doi:10.1108/jdal-09-2021-0006 fatcat:7o3rlb3vb5dibpk4fzoy4jgi2q

Practical Intrusion-Tolerant Networks

Daniel Obenshain, Thomas Tantillo, Amy Babay, John Schultz, Andrew Newell, Md. Edadul Hoque, Yair Amir, Cristina Nita-Rotaru
2016 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS)  
We use an overlay approach to leverage the existing IP infrastructure while providing the required resiliency and timeliness.  ...  As the Internet becomes an important part of the infrastructure our society depends on, it is crucial to construct networks that are able to work even when part of the network is compromised.  ...  The solution uses an overlay approach to overcome malicious attacks and compromises in both the underlying network infrastructure and in the overlay itself.  ... 
doi:10.1109/icdcs.2016.99 dblp:conf/icdcs/ObenshainTBSNHA16 fatcat:6rk4si26hrcg3ctkdjbm5acfo4

A Comparison of Resilient Overlay Multicast Approaches

S. Birrer, F.E. Bustamante
2007 IEEE Journal on Selected Areas in Communications  
Consequently, a number of techniques have recently been proposed to improve overlays' resilience by exploiting path diversity and minimizing node dependencies.  ...  Each of the proposed resilient techniques comes with a different trade-off in terms of delivery ratio, end-to-end latency and additional network traffic.  ...  ACKNOWLEDGMENTS We would like to thank the FreePastry group at Rice University for making their code available, especially to Alan Mislove for answering our many questions concerning FreePastry.  ... 
doi:10.1109/jsac.2007.071208 fatcat:iaayw2mdbfgndhhppopwg6isxq

Scalable Approach to Enhancing ICS Resilience by Network Diversity

Tingting Li, Cheng Feng, Chris Hankin
2020 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)  
Optimally diversifying network resources can improve the resilience of a network against malware propagation.  ...  We then measure the improved resilience of the diversified network in terms of a well-defined diversity metric and Mean-time-to-compromise (MTTC), to verify the effectiveness of our approach.  ...  This research was funded by the EPSRC grant RITICS (EP/L021013/1). We acknowledge the hardware donation of NVIDIA Corporation.  ... 
doi:10.1109/dsn48063.2020.00055 dblp:conf/dsn/Li0H20 fatcat:rwodlmvp2beancfpty4qep2m2a

Resilient Assignment Using Redundant Robots on Transport Networks with Uncertain Travel Time [article]

Amanda Prorok
2019 arXiv   pre-print
Since noisy travel time estimates result in sub-optimal assignments, we propose a method that offers resilience to uncertainty by making use of redundant robots.  ...  We demonstrate the effectiveness of our approach with simulations on transport networks, where uncertain edge costs and uncertain node positions lead to noisy travel time estimates.  ...  ACKNOWLEDGMENT This work is supported by ARL DCIST CRA W911NF-17-2-0181, and by the Centre for Digital Built Britain, under InnovateUK grant number RG96233, for the research project "Co-Evolving Built  ... 
arXiv:1804.04986v2 fatcat:bq22qevqdbbe3k7hd4wzojggpu

A survey of strategies for communication networks to protect against large-scale natural disasters

Teresa Gomes, Janos Tapolcai, Christian Esposito, David Hutchison, Fernando Kuipers, Jacek Rak, Amaro de Sousa, Athanasios Iossifides, Rui Travanca, Joao Andre, Luisa Jorge, Lucia Martins (+6 others)
2016 2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM)  
Index Terms-vulnerability, end-to-end resilience, natural disasters, disaster-based disruptions.  ...  Moreover, the network architecture should be designed so that network connectivity is maintained among nodes outside of the impacted area, while ensuring that services for costumers not in the affected  ...  CA15127 ("Resilient communication services protecting enduser applications from disaster-based failures -RECODIS") supported by COST (European Cooperation in Science and Technology). gy).  ... 
doi:10.1109/rndm.2016.7608263 dblp:conf/rndm/GomesTEHKRSITAJ16 fatcat:mb3e4lyeizbk7a6yyec57sxqpe

Diversity-By-Design for Dependable and Secure Cyber-Physical Systems: A Survey [article]

Qisheng Zhang, Abdullah Zubair Mohammed, Zelin Wan, Jin-Hee Cho, Terrence J. Moore
2020 arXiv   pre-print
The concept of diversity-by-design emerged in the 1980's and, since then, diversity-based system design research has been explored to build more secure and dependable systems.  ...  To be specific, this survey paper provides: (i) The common concept of diversity based on a multidisciplinary study of diversity from nine different fields along with the historical evolution of diversity-by-design  ...  -Network Topology Shuffling: This technique aims to identify an optimal assignment of software variants to maximize the degree of software variants along attack paths.  ... 
arXiv:2007.08688v1 fatcat:q5umyoql4nfbfhbjlbdhavu72q

CyberX:A Biologically-inspired Platform for Cyber Trust Management

Mohamed Azab, Mohamed Eltoweissy
2012 Proceedings of the 8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing  
different-quality-objective code variants.  ...  CyberX employs such diversity to modify the application implicit behavior at runtime utilizing autonomous execution elasticity and adaptability.  ...  on the account of increasing the transition time by the time needed for variant loading and synchronization.  ... 
doi:10.4108/icst.collaboratecom.2012.250512 dblp:conf/colcom/AzabE12 fatcat:jgfxu62k3jdgtcdd5ajyxzmew4

Enhancing Marine Data Transmission with Socially-Aware Resilient Vessel Networks [article]

Ruobing Jiang, Chao Liu
2022 arXiv   pre-print
To efficiently manage opportunistic vessel-to-vessel (V2V) connections for optimal routing, Social Network Analysis (SNA) on historical vessel interactions is applied for vessel familiarity measurement  ...  In this paper, Resilient Vessel Network (RVN) is proposed to fundamentally enhance BMD transmission.  ...  Node level SNA identifying influential nodes improves routing or information dissemination efficiency by assigning higher forwarding priorities to more influential modes.  ... 
arXiv:2204.11654v1 fatcat:t7xphe6u7naxllphfm52x5uq6a

A Novel Integrated Scheme for Detection and Mitigation of Route Diversion Attack in MANET

H C Ramaprasad, S. C. Lingareddy
2021 International Journal of Advanced Computer Science and Applications  
Optimization of MANET Networks through Routing Protocol Analysis", [24] C.  ...  that can identify route diversion attacks and mitigate them which are again vulnerable to various attacks in using a cost-effective optimal solution.  ... 
doi:10.14569/ijacsa.2021.0121143 fatcat:hifeiouzh5bjdec7fe53gtdldq

A Framework for Improving Routing Configurations using Multi-Objective Optimization Mechanisms

Pedro Sousa, Vitor Pereira, Paulo Cortez, Miguel Rio, Miguel Rocha
2017 Journal of Communications Software and Systems  
The robustness of the proposed methods is illustrated by presenting several multiobjective optimization examples able to improve the performance and resilience levels of a network infrastructure.  ...  In this perspective, this work presents a contribution for this research area by proposing specific MOEAs based optimization methods able to improve network routing configurations.  ...  His research interests include network measurement, congestion control, new network architectures, and, more recently, in the interaction between cloud and network services.  ... 
doi:10.24138/jcomss.v12i3.79 fatcat:gft5cq6vrjakzfass2vpampbda
« Previous Showing results 1 — 15 out of 3,893 results