{"id":"https://openalex.org/W1670005512","doi":"https://doi.org/10.1109/icacci.2015.7275907","title":"Exploiting curse of diversity for improved network security","display_name":"Exploiting curse of diversity for improved network security","publication_year":2015,"publication_date":"2015-08-01","ids":{"openalex":"https://openalex.org/W1670005512","doi":"https://doi.org/10.1109/icacci.2015.7275907","mag":"1670005512"},"language":"en","primary_location":{"id":"doi:10.1109/icacci.2015.7275907","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2015.7275907","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072903565","display_name":"Ghanshyam S. Bopche","orcid":"https://orcid.org/0000-0003-0691-8931"},"institutions":[{"id":"https://openalex.org/I150312865","display_name":"Institute for Development and Research in Banking Technology","ror":"https://ror.org/00ta0g865","country_code":"IN","type":"government","lineage":["https://openalex.org/I150312865"]},{"id":"https://openalex.org/I36893310","display_name":"University of Hyderabad","ror":"https://ror.org/04a7rxb17","country_code":"IN","type":"education","lineage":["https://openalex.org/I36893310"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Ghanshyam S. Bopche","raw_affiliation_strings":["Center for Information Assurance & Management (ClAM), Institute for Development and Research in Banking Technology (IDRBT), Hyderabad, India","School of Computer and Information Sciences (SCIS), University of Hyderabad, Hyderabad, India"],"affiliations":[{"raw_affiliation_string":"Center for Information Assurance & Management (ClAM), Institute for Development and Research in Banking Technology (IDRBT), Hyderabad, India","institution_ids":["https://openalex.org/I150312865"]},{"raw_affiliation_string":"School of Computer and Information Sciences (SCIS), University of Hyderabad, Hyderabad, India","institution_ids":["https://openalex.org/I36893310"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112070114","display_name":"B. M. Mehtre","orcid":null},"institutions":[{"id":"https://openalex.org/I150312865","display_name":"Institute for Development and Research in Banking Technology","ror":"https://ror.org/00ta0g865","country_code":"IN","type":"government","lineage":["https://openalex.org/I150312865"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Babu M. Mehtre","raw_affiliation_strings":["Center for Information Assurance & Management (ClAM), Institute for Development and Research in Banking Technology (IDRBT), Hyderabad, India"],"affiliations":[{"raw_affiliation_string":"Center for Information Assurance & Management (ClAM), Institute for Development and Research in Banking Technology (IDRBT), Hyderabad, India","institution_ids":["https://openalex.org/I150312865"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5072903565"],"corresponding_institution_ids":["https://openalex.org/I150312865","https://openalex.org/I36893310"],"apc_list":null,"apc_paid":null,"fwci":3.1784,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.92456264,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"8713","issue":null,"first_page":"1975","last_page":"1981"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7895041704177856},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.758840799331665},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7063682675361633},{"id":"https://openalex.org/keywords/heuristics","display_name":"Heuristics","score":0.6474101543426514},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6016808748245239},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5953608751296997},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5423998236656189},{"id":"https://openalex.org/keywords/vulnerability-management","display_name":"Vulnerability management","score":0.5366740822792053},{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.510382354259491},{"id":"https://openalex.org/keywords/enterprise-private-network","display_name":"Enterprise private network","score":0.4901750683784485},{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.4561871290206909},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.43699273467063904},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4312901496887207},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.33593034744262695},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13420462608337402}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7895041704177856},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.758840799331665},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7063682675361633},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.6474101543426514},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6016808748245239},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5953608751296997},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5423998236656189},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.5366740822792053},{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.510382354259491},{"id":"https://openalex.org/C149859251","wikidata":"https://www.wikidata.org/wiki/Q483426","display_name":"Enterprise private network","level":2,"score":0.4901750683784485},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.4561871290206909},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.43699273467063904},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4312901496887207},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.33593034744262695},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13420462608337402},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icacci.2015.7275907","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2015.7275907","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/15","score":0.4399999976158142,"display_name":"Life in Land"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W151026171","https://openalex.org/W270234110","https://openalex.org/W1545927878","https://openalex.org/W1575709006","https://openalex.org/W1972976939","https://openalex.org/W1983758807","https://openalex.org/W1999588868","https://openalex.org/W2022578767","https://openalex.org/W2065870474","https://openalex.org/W2077937403","https://openalex.org/W2083658929","https://openalex.org/W2089396968","https://openalex.org/W2101699859","https://openalex.org/W2111817346","https://openalex.org/W2129586531","https://openalex.org/W2130373165","https://openalex.org/W2137549954","https://openalex.org/W2141289698","https://openalex.org/W2155057818","https://openalex.org/W2171483145","https://openalex.org/W2196703670","https://openalex.org/W2494110282","https://openalex.org/W6609970190","https://openalex.org/W6685305371"],"related_works":["https://openalex.org/W2393340519","https://openalex.org/W2390459954","https://openalex.org/W2361650029","https://openalex.org/W4220885008","https://openalex.org/W2379463196","https://openalex.org/W1927020458","https://openalex.org/W2993489091","https://openalex.org/W2366522092","https://openalex.org/W4360997342","https://openalex.org/W2358649166"],"abstract_inverted_index":{"Higher":[0],"species":[1],"diversity":[2,28],"in":[3,93,141,145,192],"biological":[4],"systems":[5,54,76,92],"increases":[6],"the":[7,10,13,33,42,48,79,87,99,124,138,172,177,224,229],"robustness":[8],"of":[9,15,27,66,81,86,228,257],"system":[11],"against":[12,246],"spread":[14],"disease":[16],"or":[17,148,204],"infection.":[18],"However,":[19],"computers":[20],"are":[21,128,165,171],"remarkably":[22],"less":[23,56],"diverse.":[24],"Such":[25],"lack":[26],"poses":[29],"serious":[30],"risks":[31],"to":[32,51,63,77,107,121,135,162,222,265],"today's":[34],"homogeneous":[35],"computer":[36],"networks.":[37],"An":[38,60],"adversary":[39,100,197],"learns":[40],"with":[41,55,110],"initial":[43],"compromises":[44],"and":[45,58,169,181,186,226,232,260],"then":[46],"applies":[47],"learned":[49],"knowledge":[50],"compromise":[52],"subsequent":[53],"effort":[57,201],"time.":[59],"exploit":[61],"engineered":[62],"take":[64],"advantage":[65],"a":[67,119,194,218],"particular":[68],"vulnerability":[69,89,210],"could":[70,152],"be":[71,153,266],"leveraged":[72],"on":[73,90,176],"many":[74],"other":[75],"multiply":[78],"effect":[80],"an":[82,94,142,199,234],"attack.":[83],"The":[84],"existence":[85],"same":[88],"multiple":[91],"enterprise":[95,108,143,242],"network":[96,144,243,270],"greatly":[97],"benefits":[98],"because":[101],"she":[102],"can":[103],"gain":[104],"incremental":[105],"access":[106],"resources":[109],"relative":[111],"ease.":[112],"In":[113],"this":[114],"paper,":[115],"we":[116],"have":[117,216],"proposed":[118,178,230,233],"metric":[120,231],"identify":[122,136,163],"all":[123,137,166],"attack":[125,139,213,238],"paths":[126,140,239],"that":[127,151,196,252,263],"not":[129],"fairly/truly":[130],"diversified.":[131],"Our":[132],"goal":[133,160],"is":[134,161,255],"which":[146],"one":[147],"more":[149,155,244],"vulnerabilities":[150,168],"exploited":[154],"than":[156],"once.":[157],"Additionally,":[158],"our":[159,253],"what":[164,170],"those":[167],"affected":[173],"software's/services?":[174],"Based":[175],"heuristics,":[179],"identical":[180,259],"vulnerable":[182,261],"services":[183],"were":[184],"identified":[185],"diversified":[187,267],"by":[188],"functionally":[189],"equivalent":[190],"alternatives":[191],"such":[193],"way":[195],"requires":[198],"independent":[200],"(i.e.":[202],"additional":[203],"new":[205],"effort)":[206],"for":[207,236,240,268],"exploiting":[208],"each":[209],"along":[211],"every":[212],"path.":[214],"We":[215],"presented":[217],"small":[219],"case":[220],"study":[221],"demonstrate":[223],"efficacy":[225],"applicability":[227],"algorithm":[235],"diversifying":[237],"making":[241],"robust":[245],"0-day":[247],"attacks.":[248],"Initial":[249],"results":[250],"show":[251],"approach":[254],"capable":[256],"identifying":[258],"software/applications/services":[262],"need":[264],"increased":[269],"security.":[271]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
