Scheduling Algorithm Based on Heterogeneity and Confidence for Mimic Defense

As a defense technology with endogenous security, mimic defense plays an important role in network security research. The scheduling of executors is one of the severe problems to take into account for mimic defense, and current research lacks comprehensive consideration of the influence of system ar...

Full description

Saved in:
Bibliographic Details
Published inJournal of web engineering Vol. 19; no. 7-8; p. 971
Main Authors Zhang, Wenjian, Wei, Shuai, Tian, Le, Song, Ke, Zhu, Zhengbin
Format Journal Article
LanguageEnglish
Published Milan River Publishers 25.12.2020
Subjects
Online AccessGet full text
ISSN1540-9589
1544-5976
1544-5976
DOI10.13052/jwe1540-9589.19783

Cover

More Information
Summary:As a defense technology with endogenous security, mimic defense plays an important role in network security research. The scheduling of executors is one of the severe problems to take into account for mimic defense, and current research lacks comprehensive consideration of the influence of system architecture and attack behavior on scheduling algorithm. Based on previous research, this paper first introduces concept of heterogeneity and confidence according to vulnerability attributes and attack distribution characteristics to characterize the executors. Moreover, the TOPSIS (Technique for Order Preference by Similarity to an Ideal Solution) algorithm is brought in to optimize the system security and improve operating efficiency. Experimental results showed that,compared with the existing algorithms, Random, MD, RSMS, it improves the security of the system in non-uniform distributed attack scenario and the operating efficiency in each attack scenario.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:1540-9589
1544-5976
1544-5976
DOI:10.13052/jwe1540-9589.19783