Affiliation:
1. Institute of Information Technology, Information Engineering University, Zhengzhou, China
2. National Digital Switching System Engineering & Technological R&D Center, Zhengzhou, China
3. Institute of Cyberspace Security, Zhengzhou University, Zhengzhou, China
Abstract
With the rapid development of network technology, the traditional defense of “mending the fold after the sheep have been stolen” cannot accurately prevent various potential threats and attacks in cyberspace. At the same time, cyberspace mimic defense (CMD) makes the system uncertain and dynamic in time and space to effectively defend against potential attacks. As the key technology of CMD, the scheduling algorithm still needs to be improved in reliability and active defense. Aiming at current problems, this paper first innovatively proposes a new heterogeneous measure algorithm HVTG combined with a vulnerability topology graph, which measures the heterogeneity of executor set in a fine-grained manner. Then, based on the historical confidence, heterogeneity, and minimum sleep time of the executor, we propose an adaptive multi-executors scheduling algorithm (HHAC) to better defend against various attacks. Finally, combining with Analytic Hierarchy Process and Fuzzy Comprehensive Evaluation, this research proposes a comprehensive evaluation model and fill in the gap of the evaluation model of the scheduling algorithm. Theoretical analysis and simulation results show that the HHAC performs well on the system dynamics, probability of system failure, and reliability, which is conducive to the development of CMD.
Funder
National Nuclear Foundation Major Special Fund
Subject
Computer Networks and Communications,Information Systems
Reference35 articles.
1. Majority voting algorithm and performance analysis based on high level heterogeneity;S. Wei;Computer Engineering,2020
2. Research on cyber mimic defense;J. X. Wu;Journal of Cyber Security,2016
3. MNOS: a mimic network operating system for software defined networks
4. A Framework for Mimic Defense System in Cyberspace
5. Modelization and analysis of dynamic heterogeneous redundant system;W. Wang;Concurrency and Computation: Practice and Experience,2022
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献