skip to main content
10.1145/508171.508177acmconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
Article

Heterogeneous networking: a new survivability paradigm

Published:10 September 2001Publication History

ABSTRACT

We believe that a network, to be survivable, must be heterogeneous. Just like a species that draws on a small gene pool can succumb to a single environmental threat, so a homogeneous network is vulnerable to a malicious attack that exploits a single weakness common to all of its components. In contrast, in a network in which each critical functionality is provided by a diverse set of protocols and implementations, attacks that focus on a weakness of one such protocol or implementation will not be able to bring down the entire network, even though all elements are not be bulletproof and even if some of components are compromised.Following this survivability through heterogeneity philosophy, we propose a new survivability paradigm, called heterogeneous networking, for improving a network's defense capabilities. Rather than following the current trend of converging towards single solutions to provide the desired functionality at every element of the network architecture, this methodology calls for systematically increasing the network's heterogeneity without sacrificing its interoperability.

References

  1. A. Avizienis. The n-version aproach to fault-tolerant software. IEEE Transactions on Software Engineering, SE-11(12):1491-1501, December 1985.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Avizienis and L. Chen. On the implementation of n-version programming for software fault-tolerance during program execution. In Proceedings of International Computer Software and Applications Conference, pages 149-155, 1977.Google ScholarGoogle Scholar
  3. C. Cowan and C. Pu. Immunix: Survivability through specialization. In Proceedings of SEI Information Survivability Workshop, San Diego, California, USA, February 1997.Google ScholarGoogle Scholar
  4. D. Eckhardt and L. Lee. A theoretical basis for the analysis of multiversion software subject to coincident errors. IEEE Transactions on Software Engineering, SE-11(12):1511-1517, 1985.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. R. Ellison, D. Fisher, R. Linger, H. Lipson, T. Longstaff, and N. Mead. Survivability: Protecting your critical systems. IEEE Internet Computing, 3(6):55-63, November/December 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Forrest, A. Somayaji, and D. Ackley. Building diverse computer systems. In Proceedings of the Sixth Workshop on Hot Topics in Operating Systems (HotOS-VI), pages 67-72, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Joseph and A. Avizienis. A fault tolerance approach to computer viruses. In Proceedings of the 1988 IEEE Symposium on Security and Privacy, pages 52-58, Oakland, California, USA, April 1988.Google ScholarGoogle ScholarCross RefCross Ref
  8. J. C. Knight and N. G. Leveson. An experimental evaluation of the assumption of independence in multiversion programming. IEEE Transactions on Software Engineering, SE-12(1):96-109, January 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. B. Littlewood, P. Popov, and L. Strigini. Modelling software design diversity - a review. ACM Computing Surveys, 33(2):177-208, June 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Millen. Local reconfiguration policies. In Proceedings of the 1999 IEEE Symposium on Security and Privacy, pages 48-56, Oakland, California, USA, May 1999.Google ScholarGoogle ScholarCross RefCross Ref
  11. S. Mitra, N. Saxena, and E. McCluskey. A design diversity metric and reliability analysis for redundant systems. In Proceedings of the 1999 International Test Conference, pages 662-671, Atlantic City, New Jersey, USA, September 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. E. Shek, S. Dao, Y. Zhang, D. van Buer, and G. Giuffrida. Intelligent information dissemination services in hybrid satellite-wireless networks. ACM Mobile Networks and Applications (MONET) Journal, 5(4):273-284, December 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Heterogeneous networking: a new survivability paradigm

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            NSPW '01: Proceedings of the 2001 workshop on New security paradigms
            September 2001
            157 pages
            ISBN:1581134576
            DOI:10.1145/508171

            Copyright © 2001 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 10 September 2001

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            Overall Acceptance Rate62of170submissions,36%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader