Scheduling Algorithm Based on Heterogeneity and Confidence for Mimic Defense
As a defense technology with endogenous security, mimic defense plays an important role in network security research. The scheduling of executors is one of the severe problems to take into account for mimic defense, and current research lacks comprehensive consideration of the influence of system ar...
Saved in:
| Published in | Journal of web engineering Vol. 19; no. 7-8; p. 971 |
|---|---|
| Main Authors | , , , , |
| Format | Journal Article |
| Language | English |
| Published |
Milan
River Publishers
25.12.2020
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 1540-9589 1544-5976 1544-5976 |
| DOI | 10.13052/jwe1540-9589.19783 |
Cover
| Summary: | As a defense technology with endogenous security, mimic defense plays an important role in network security research. The scheduling of executors is one of the severe problems to take into account for mimic defense, and current research lacks comprehensive consideration of the influence of system architecture and attack behavior on scheduling algorithm. Based on previous research, this paper first introduces concept of heterogeneity and confidence according to vulnerability attributes and attack distribution characteristics to characterize the executors. Moreover, the TOPSIS (Technique for Order Preference by Similarity to an Ideal Solution) algorithm is brought in to optimize the system security and improve operating efficiency. Experimental results showed that,compared with the existing algorithms, Random, MD, RSMS, it improves the security of the system in non-uniform distributed attack scenario and the operating efficiency in each attack scenario. |
|---|---|
| Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ISSN: | 1540-9589 1544-5976 1544-5976 |
| DOI: | 10.13052/jwe1540-9589.19783 |