年間 12 号発行
ISSN 印刷: 0040-2508
ISSN オンライン: 1943-6009
Indexed in
RESEARCH ON DYNAMIC SCHEDULING DECISION ALGORITHM IN MIMIC DEFENSE
要約
In this paper, a dynamic scheduling decision algorithm based on mimic defense is proposed. According to the output of the decision feedback executor, different executors are selected by the scheduler to realize the feedback security defense mechanism. Firstly, the scheduling algorithm is used to dynamically select the executor set in the execution pool to reduce overhead and improve security. And then the output of the execution set is determined by the improved majority decision algorithm based on the reliability factor. Finally, the simulation results show that the dynamic feedback scheduling algorithm can effectively improve the security of the system.
-
Zuo, Q.Y. et al., (2013) Research on Open Flow-based SDN technologies, Software, 24(5), pp. 1078-1097.
-
Maciej, K., Peter, P., Dejan, K., and Marco, (2018) Methodology, Measurement and Analysis of Flow Table Update Characteristics in Hardware Open Flow Switches, Computer Network, 136, pp.22-36.
-
Hyeongseok, Oh., Namgi, K., and Choi, Y-H., (2015) Dynamic Service Chaining Method Considering Performance of Middlebox Over SDN, Inter. Com. Serv., 16(6), pp. 47-55.
-
Lu, Y., Liu, Y.C., Li, X., Cheng, X.K. et al., (2019) Research on Placement Algorithm of Service Function Chaining Oriented to Software Defined Networking, Electr. Inf. Technol., 41(1), pp. 74-82.
-
Philip, P., Shin, S., Yegneswaran, V. et al., (2012) A security enforcement kernel for OpenFlow networks, In Proceedings of the first workshop on Hot topics in software defined networks (HotSDN '12), New York, USA, pp.121-126.
-
Zhou, H. and Liu, H., (2016) Research on SDN controller based on Floodlight, Comput. Eng., 52(24), pp. 137-147.
-
Kaur, R., Singh, A., Singh, S., and Sharma, S., (2016) Security of software defined networks: Taxonomic modeling, key components and open research area, International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), Chennai, Indian, pp. 2832-2839.
-
Sonchack, J., Aviv, A.J., Keller, E. et al., (2015) Enabling OpenFlow Extensions for Switch-Level Security Applications, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS '15), New York, USA, pp.1678-1680.
-
Wu, J.X., (2016) Research on Mimic Defense in Cyberspace, Cyber. Sec., 1(4), pp. 1-10.
-
Guo, W.B. and Li, F., (2017) Research on Web Application Security Vulnerability Scanning Technology, Inf. Com., 12, pp. 123-124.
-
Shi, L.Y., Li, Y., Ma, M.F. et al., (2019) New Progress in Honeypot Technology Research, Electr. Inf. Technol., 41(02), pp. 249-259.
-
Ma, H.L., Yi, P., Jiang, Y.M., and He, L., (2017) Mimic defense architecture of router based on dynamic heterogeneous redundant algorithm, Cyber. Sec., 2(1), pp. 29-42.
-
Tong, Q., Zhang, Y., Zhang, W.H. et al., (2017) Design and implementation of mimic defense Web server, Software, 28(4), pp. 883-897.
-
Urgo, M. and Vancza, J., (2019) A branch-and-bound approach for the single machine maximum lateness stochastic scheduling problem to minimize the value-at-risk, Flex. Serv. Manuf., 31(2), pp. 472-496.
-
Qiu, D.H., Li, H., and Sun, J.L. (2013) Measuring software similarity based on structure and property of class diagram, Sixth International Conference on Advanced Computational Intelligence (ICACI), Hangzhou, China, pp. 75-80.
-
Meng Huiping, Ou Qinghai, Jing Yi, Song Jigao, Qiao Chenbin, Zhang Jie, Research on the Endogenous Security Technology of Polymorphic Smart Network, in Proceedings of the 11th International Conference on Computer Engineering and Networks, 808, 2022. Crossref