Scheduling Algorithm Based on Heterogeneity and Confidence for Mimic Defense

As a defense technology with endogenous security, mimic defense plays an important role in network security research. The scheduling of executors is one of the severe problems to take into account for mimic defense, and current research lacks comprehensive consideration of the influence of system ar...

Full description

Saved in:
Bibliographic Details
Published inJournal of web engineering Vol. 19; no. 7-8; p. 971
Main Authors Zhang, Wenjian, Wei, Shuai, Tian, Le, Song, Ke, Zhu, Zhengbin
Format Journal Article
LanguageEnglish
Published Milan River Publishers 25.12.2020
Subjects
Online AccessGet full text
ISSN1540-9589
1544-5976
1544-5976
DOI10.13052/jwe1540-9589.19783

Cover

Abstract As a defense technology with endogenous security, mimic defense plays an important role in network security research. The scheduling of executors is one of the severe problems to take into account for mimic defense, and current research lacks comprehensive consideration of the influence of system architecture and attack behavior on scheduling algorithm. Based on previous research, this paper first introduces concept of heterogeneity and confidence according to vulnerability attributes and attack distribution characteristics to characterize the executors. Moreover, the TOPSIS (Technique for Order Preference by Similarity to an Ideal Solution) algorithm is brought in to optimize the system security and improve operating efficiency. Experimental results showed that,compared with the existing algorithms, Random, MD, RSMS, it improves the security of the system in non-uniform distributed attack scenario and the operating efficiency in each attack scenario.
AbstractList As a defense technology with endogenous security, mimic defense plays an important role in network security research. The scheduling of executors is one of the severe problems to take into account for mimic defense, and current research lacks comprehensive consideration of the influence of system architecture and attack behavior on scheduling algorithm. Based on previous research, this paper first introduces concept of heterogeneity and confidence according to vulnerability attributes and attack distribution characteristics to characterize the executors. Moreover, the TOPSIS (Technique for Order Preference by Similarity to an Ideal Solution) algorithm is brought in to optimize the system security and improve operating efficiency. Experimental results showed that,compared with the existing algorithms, Random, MD, RSMS, it improves the security of the system in non-uniform distributed attack scenario and the operating efficiency in each attack scenario.
Author Zhang, Wenjian
Wei, Shuai
Song, Ke
Zhu, Zhengbin
Tian, Le
Author_xml – sequence: 1
  givenname: Wenjian
  surname: Zhang
  fullname: Zhang, Wenjian
– sequence: 2
  givenname: Shuai
  surname: Wei
  fullname: Wei, Shuai
– sequence: 3
  givenname: Le
  surname: Tian
  fullname: Tian, Le
– sequence: 4
  givenname: Ke
  surname: Song
  fullname: Song, Ke
– sequence: 5
  givenname: Zhengbin
  surname: Zhu
  fullname: Zhu, Zhengbin
BookMark eNqNkMtOwzAQRS0EEm3hC9hYYp3iZ-0sS3kUqYgFsLacZNymSu1iJ6r694SmH8BqRjP3Xs2cMbr0wQNCd5RMKSeSPWwPQKUgWS51PqW50vwCjfqJyGSuZpenftheo3FKW0KEYkyO0Oqz3EDVNbVf43mzDrFuNzv8aBNUOHi8hBZiWIOHuj1i6yu8CN7VFfgSsAsRv9e7usRP4MAnuEFXzjYJbs91gr5fnr8Wy2z18fq2mK-yknPdZpK5XCllobDOESi0gJIDo1zmREhOuNROCQBXzCzjTAOUBaEUtNAWQFI-QWLI7fzeHg-2acw-1jsbj4YScyJizkTM38_mRKS33Q-2fQw_HaTWbEMXfX-p6S1ScsZmqlfxQVXGkFIE96_sX5Rocv4
ContentType Journal Article
Copyright 2020. This work is published under https://creativecommons.org/licenses/by-nc/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: 2020. This work is published under https://creativecommons.org/licenses/by-nc/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID AAYXX
CITATION
8FE
8FG
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
P62
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
ADTOC
UNPAY
DOI 10.13052/jwe1540-9589.19783
DatabaseName CrossRef
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Advanced Technologies & Aerospace Database
ProQuest Central Essentials
ProQuest Central
Technology collection
ProQuest One Community College
ProQuest Central Korea
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
Unpaywall for CDI: Periodical Content
Unpaywall
DatabaseTitle CrossRef
Publicly Available Content Database
Advanced Technologies & Aerospace Collection
Computer Science Database
ProQuest Central Student
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
ProQuest One Academic Eastern Edition
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest One Academic UKI Edition
ProQuest Central Korea
ProQuest Central (New)
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList CrossRef
Publicly Available Content Database
Database_xml – sequence: 1
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
– sequence: 2
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1544-5976
ExternalDocumentID 10.13052/jwe1540-9589.19783
10_13052_jwe1540_9589_19783
GroupedDBID 5GY
AAYXX
ABVLG
AENEX
AFKRA
ALMA_UNASSIGNED_HOLDINGS
ARAPS
BENPR
BGLVJ
CCPQU
CITATION
DDS
EBS
EJD
HCIFZ
JAVBF
K7-
P2P
PHGZM
PHGZT
PIMPY
PQGLB
PUEGO
8FE
8FG
ABUWG
AZQEC
DWQXO
GNUQQ
JQ2
P62
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
ADTOC
ARCSS
UNPAY
ID FETCH-LOGICAL-c338t-52f9777aebaff0eb84ec3e2135904530358f74eefb6a2328eecb011e848aee513
IEDL.DBID UNPAY
ISSN 1540-9589
1544-5976
IngestDate Sun Aug 24 08:57:25 EDT 2025
Sun Jul 13 04:28:57 EDT 2025
Wed Oct 01 04:40:34 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed false
IsScholarly true
Issue 7-8
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c338t-52f9777aebaff0eb84ec3e2135904530358f74eefb6a2328eecb011e848aee513
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
OpenAccessLink https://proxy.k.utb.cz/login?url=https://journals.riverpublishers.com/index.php/JWE/article/download/4931/4447
PQID 3055532267
PQPubID 6781161
ParticipantIDs unpaywall_primary_10_13052_jwe1540_9589_19783
proquest_journals_3055532267
crossref_primary_10_13052_jwe1540_9589_19783
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2020-12-25
PublicationDateYYYYMMDD 2020-12-25
PublicationDate_xml – month: 12
  year: 2020
  text: 2020-12-25
  day: 25
PublicationDecade 2020
PublicationPlace Milan
PublicationPlace_xml – name: Milan
PublicationTitle Journal of web engineering
PublicationYear 2020
Publisher River Publishers
Publisher_xml – name: River Publishers
SSID ssj0047225
Score 2.2168088
Snippet As a defense technology with endogenous security, mimic defense plays an important role in network security research. The scheduling of executors is one of the...
SourceID unpaywall
proquest
crossref
SourceType Open Access Repository
Aggregation Database
Index Database
StartPage 971
SubjectTerms Algorithms
Defense
Executors
Feedback
Heterogeneity
Military technology
Network security
Scheduling
Security
SummonAdditionalLinks – databaseName: ProQuest Central
  dbid: BENPR
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8MwDLbGdgAOiKcYDJQDRwJrmrbpASGemhCbEA-JW5WmDg-NbsDQxL_H6doBF8S1B0u1Hfuz43wG2MnIqpHWkhsMkcssVFz5aDlKKTLfCqGs60N2e2HnTl7cB_c16FVvYdxYZRUTi0CdDYzrke8XzFTkfWF0OHzlbmuUu12tVmjocrVCdlBQjM1AQzhmrDo0js96V9dVbHbMiEHBoCrbPA5UXPIQkXCx_zzG6fc9z7VEfueqbwA6-5EP9edY9_s_ctH5IiyUIJIdTay-BDXMl2H-B7XgClzekDUyN2b-wI76D_Qno8cXdkw5K2ODnHXcFMyAnAcJhTOdZ8w9_ZssGGWEY1n36eXJsFO0VObiKtydn92edHi5OYEbKjlHVF1awnWRxlRb28ZUSTQ-Cs8PYoJwlLUCZSOJaNNQE6RSiCalg45KKo0YeP4a1PNBjuvAbDs1BDEiLdpaxl6sDAEqHfmONt4QGGzCbqWjZDghyEgmt2SBSEqVJk6lSaHSJrQqPSblaXlPvm3bBD7V7X_EbfwtbhPmhKuPPcFF0IL66O0DtwhEjNLt0jO-AA9Iwt4
  priority: 102
  providerName: ProQuest
Title Scheduling Algorithm Based on Heterogeneity and Confidence for Mimic Defense
URI https://www.proquest.com/docview/3055532267
https://journals.riverpublishers.com/index.php/JWE/article/download/4931/4447
UnpaywallVersion publishedVersion
Volume 19
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 1544-5976
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0047225
  issn: 1540-9589
  databaseCode: BENPR
  dateStart: 20150101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrZ3Pb9MwFMeftvYAO_B7WmFUPnDETeM4iXPsoKWaaDUBFeMUOcnzKOuSqks1bX89z_lRBieQuFuR7K_l93nO8_cBvMlI1VBryVMMkMssUFx5aDhKKTLPCKGMvYeczYPpQp6e--d7MGvfwjQreD3Y2LKE9a40vDq0KwNB6xrhnH4dO83SOpl1lS905sjIcx0pZbgP3cAnNO9AdzE_G32rPFPlkEd-1RLPGtBwAumgcSGiLS-cHze4GzNw7YXI75HqF34-2OZrfXujV6t7kWjyGPJ2DnUByuVgWyaD9O4Pe8f_Nskn8KhhVjaqBz2FPcyfwcE9J8Pn8PEziZ_ZqvYLNlpdFJtl-f2KnVCIzFiRs6ktuiloryJBP9N5xuxLw7qfKSNsZrPl1TJl79FQVo0vYDEZf3k35U2jBp5ShltSMmsII0ONiTZmiImSmHooXM-PiBgpSPrKhBLRJIEmglOIaULnCiqpNKLveofQyYscj4CZYZIS0YRaDLWM3EilxG869KxLfUrs2YO3rSjxuvbjiOufcr6IGw1jq2FcadiD41a4uF31uDI5o4MsCHvAd2L-zede_uP4V_BQ2PzcFVz4x9ApN1t8TRBTJn3YV5MPfeiejOdnn_rNRv0JYhDyTw
linkProvider Unpaywall
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT-MwEB7xOAAHBCxoy9MHuGFoHCdxDgjxVIG2Wu2CxC04zpgFlbRAUcWf47cxThMeF8SFaw4j5ZvxzDd-fAOwnpFXI60lNxgil1mouPLRcpRSZL4VQlm3D9lqh40LeXoZXI7AS_UWxl2rrHJikaizrnF75NuFMhVFXxjt9u65mxrlTlerERq6HK2Q7RQSY-XDjjN8HlAL97hzckj-3hDi-Oj8oMHLKQPcUHvWp07MEgeKNKba2jqmSqLxUXh-EBPdoQwfKBtJRJuGmuiHQjQpLQpUUmnEwPPJ7iiMS1_G1PyN7x-1__ytaoFTYgwKxVZZ53Gg4lL3iH5GbN8O8O37lue2YD7XxnfCO_GU9_TzQHc6H2rf8QxMl6SV7Q2jbBZGMJ-DqQ9Shr-g-Y-8n7lr7ddsr3NNyPX_37F9qpEZ6-as4W7ddClYkVg_03nG3FPD4UBTRryZtW7ubgw7REttNc7DxY9guABjeTfH38BsPTVEaSIt6lrGXqwMETgd-U6m3hD5rMFmhVHSGwpyJMNTuUAkJaSJgzQpIK3BcoVjUq7Ox-Q9lmrA37D9jrnFr82twUTjvNVMmiftsyWYFK439wQXwTKM9R-ecIUITD9dLaOEwdVPB-YrY5UAcw
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrZ3PT9swFMefWDlsHAb7pXVjyIcd56ZxnMQ5lgGq0IombdXYKXKcZ-hWkqqkQvDX85wfHeMEEncrkv21_D7Pef4-gM85qRprLbnBCLnMI8VVgJajlCIPrBDKunvIyUk0nsrj0_B0AybdW5h2BS8HS1eWsFiXhteHdm0g6FwjvONfh167tF7uXOVLnXsyCXxPShk_g80oJDTvweb05Pvod-2ZKoc8CeuWeM6AhhNIR60LEW154f25wvWYge8uRP6PVP_w8_mqWOjrKz2f34lER9tQdHNoClD-DlZVNjA39-wdn2ySO_CyZVY2aga9gg0sXsPWHSfDN_DtB4mfu6r2Mzaan5XLWXV-wfYpROasLNjYFd2UtFeRoJ_pImfupWHTz5QRNrPJ7GJm2AFayqrxLUyPDn9-HfO2UQM3lOFWlMxawshYY6atHWKmJJoAhR-ECREjBclQ2Vgi2izSRHAK0WR0rqCSSiOGfvAOekVZ4HtgdpgZIppYi6GWiZ8oQ_ym48C51Btizz586URJF40fR9r8lAtF2mqYOg3TWsM-7HbCpd2qp7XJGR1kUdwHvhbzIZ_78MjxH-GFcPm5L7gId6FXLVf4iSCmyvbarXkLOOjvzw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Scheduling+Algorithm+Based+on+Heterogeneity+and+Confidence+for+Mimic+Defense&rft.jtitle=Journal+of+web+engineering&rft.au=Zhang%2C+Wenjian&rft.au=Wei%2C+Shuai&rft.au=Tian%2C+Le&rft.au=Song%2C+Ke&rft.date=2020-12-25&rft.issn=1540-9589&rft.eissn=1544-5976&rft_id=info:doi/10.13052%2Fjwe1540-9589.19783&rft.externalDBID=n%2Fa&rft.externalDocID=10_13052_jwe1540_9589_19783
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1540-9589&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1540-9589&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1540-9589&client=summon