Scheduling Algorithm Based on Heterogeneity and Confidence for Mimic Defense
As a defense technology with endogenous security, mimic defense plays an important role in network security research. The scheduling of executors is one of the severe problems to take into account for mimic defense, and current research lacks comprehensive consideration of the influence of system ar...
Saved in:
| Published in | Journal of web engineering Vol. 19; no. 7-8; p. 971 |
|---|---|
| Main Authors | , , , , |
| Format | Journal Article |
| Language | English |
| Published |
Milan
River Publishers
25.12.2020
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 1540-9589 1544-5976 1544-5976 |
| DOI | 10.13052/jwe1540-9589.19783 |
Cover
| Abstract | As a defense technology with endogenous security, mimic defense plays an important role in network security research. The scheduling of executors is one of the severe problems to take into account for mimic defense, and current research lacks comprehensive consideration of the influence of system architecture and attack behavior on scheduling algorithm. Based on previous research, this paper first introduces concept of heterogeneity and confidence according to vulnerability attributes and attack distribution characteristics to characterize the executors. Moreover, the TOPSIS (Technique for Order Preference by Similarity to an Ideal Solution) algorithm is brought in to optimize the system security and improve operating efficiency. Experimental results showed that,compared with the existing algorithms, Random, MD, RSMS, it improves the security of the system in non-uniform distributed attack scenario and the operating efficiency in each attack scenario. |
|---|---|
| AbstractList | As a defense technology with endogenous security, mimic defense plays an important role in network security research. The scheduling of executors is one of the severe problems to take into account for mimic defense, and current research lacks comprehensive consideration of the influence of system architecture and attack behavior on scheduling algorithm. Based on previous research, this paper first introduces concept of heterogeneity and confidence according to vulnerability attributes and attack distribution characteristics to characterize the executors. Moreover, the TOPSIS (Technique for Order Preference by Similarity to an Ideal Solution) algorithm is brought in to optimize the system security and improve operating efficiency. Experimental results showed that,compared with the existing algorithms, Random, MD, RSMS, it improves the security of the system in non-uniform distributed attack scenario and the operating efficiency in each attack scenario. |
| Author | Zhang, Wenjian Wei, Shuai Song, Ke Zhu, Zhengbin Tian, Le |
| Author_xml | – sequence: 1 givenname: Wenjian surname: Zhang fullname: Zhang, Wenjian – sequence: 2 givenname: Shuai surname: Wei fullname: Wei, Shuai – sequence: 3 givenname: Le surname: Tian fullname: Tian, Le – sequence: 4 givenname: Ke surname: Song fullname: Song, Ke – sequence: 5 givenname: Zhengbin surname: Zhu fullname: Zhu, Zhengbin |
| BookMark | eNqNkMtOwzAQRS0EEm3hC9hYYp3iZ-0sS3kUqYgFsLacZNymSu1iJ6r694SmH8BqRjP3Xs2cMbr0wQNCd5RMKSeSPWwPQKUgWS51PqW50vwCjfqJyGSuZpenftheo3FKW0KEYkyO0Oqz3EDVNbVf43mzDrFuNzv8aBNUOHi8hBZiWIOHuj1i6yu8CN7VFfgSsAsRv9e7usRP4MAnuEFXzjYJbs91gr5fnr8Wy2z18fq2mK-yknPdZpK5XCllobDOESi0gJIDo1zmREhOuNROCQBXzCzjTAOUBaEUtNAWQFI-QWLI7fzeHg-2acw-1jsbj4YScyJizkTM38_mRKS33Q-2fQw_HaTWbEMXfX-p6S1ScsZmqlfxQVXGkFIE96_sX5Rocv4 |
| ContentType | Journal Article |
| Copyright | 2020. This work is published under https://creativecommons.org/licenses/by-nc/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: 2020. This work is published under https://creativecommons.org/licenses/by-nc/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| DBID | AAYXX CITATION 8FE 8FG ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS ADTOC UNPAY |
| DOI | 10.13052/jwe1540-9589.19783 |
| DatabaseName | CrossRef ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Advanced Technologies & Aerospace Database ProQuest Central Essentials ProQuest Central Technology collection ProQuest One Community College ProQuest Central Korea ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Unpaywall for CDI: Periodical Content Unpaywall |
| DatabaseTitle | CrossRef Publicly Available Content Database Advanced Technologies & Aerospace Collection Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest One Academic Eastern Edition ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Technology Collection ProQuest SciTech Collection ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest One Academic UKI Edition ProQuest Central Korea ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) |
| DatabaseTitleList | CrossRef Publicly Available Content Database |
| Database_xml | – sequence: 1 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository – sequence: 2 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1544-5976 |
| ExternalDocumentID | 10.13052/jwe1540-9589.19783 10_13052_jwe1540_9589_19783 |
| GroupedDBID | 5GY AAYXX ABVLG AENEX AFKRA ALMA_UNASSIGNED_HOLDINGS ARAPS BENPR BGLVJ CCPQU CITATION DDS EBS EJD HCIFZ JAVBF K7- P2P PHGZM PHGZT PIMPY PQGLB PUEGO 8FE 8FG ABUWG AZQEC DWQXO GNUQQ JQ2 P62 PKEHL PQEST PQQKQ PQUKI PRINS ADTOC ARCSS UNPAY |
| ID | FETCH-LOGICAL-c338t-52f9777aebaff0eb84ec3e2135904530358f74eefb6a2328eecb011e848aee513 |
| IEDL.DBID | UNPAY |
| ISSN | 1540-9589 1544-5976 |
| IngestDate | Sun Aug 24 08:57:25 EDT 2025 Sun Jul 13 04:28:57 EDT 2025 Wed Oct 01 04:40:34 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | false |
| IsScholarly | true |
| Issue | 7-8 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c338t-52f9777aebaff0eb84ec3e2135904530358f74eefb6a2328eecb011e848aee513 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://journals.riverpublishers.com/index.php/JWE/article/download/4931/4447 |
| PQID | 3055532267 |
| PQPubID | 6781161 |
| ParticipantIDs | unpaywall_primary_10_13052_jwe1540_9589_19783 proquest_journals_3055532267 crossref_primary_10_13052_jwe1540_9589_19783 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2020-12-25 |
| PublicationDateYYYYMMDD | 2020-12-25 |
| PublicationDate_xml | – month: 12 year: 2020 text: 2020-12-25 day: 25 |
| PublicationDecade | 2020 |
| PublicationPlace | Milan |
| PublicationPlace_xml | – name: Milan |
| PublicationTitle | Journal of web engineering |
| PublicationYear | 2020 |
| Publisher | River Publishers |
| Publisher_xml | – name: River Publishers |
| SSID | ssj0047225 |
| Score | 2.2168088 |
| Snippet | As a defense technology with endogenous security, mimic defense plays an important role in network security research. The scheduling of executors is one of the... |
| SourceID | unpaywall proquest crossref |
| SourceType | Open Access Repository Aggregation Database Index Database |
| StartPage | 971 |
| SubjectTerms | Algorithms Defense Executors Feedback Heterogeneity Military technology Network security Scheduling Security |
| SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8MwDLbGdgAOiKcYDJQDRwJrmrbpASGemhCbEA-JW5WmDg-NbsDQxL_H6doBF8S1B0u1Hfuz43wG2MnIqpHWkhsMkcssVFz5aDlKKTLfCqGs60N2e2HnTl7cB_c16FVvYdxYZRUTi0CdDYzrke8XzFTkfWF0OHzlbmuUu12tVmjocrVCdlBQjM1AQzhmrDo0js96V9dVbHbMiEHBoCrbPA5UXPIQkXCx_zzG6fc9z7VEfueqbwA6-5EP9edY9_s_ctH5IiyUIJIdTay-BDXMl2H-B7XgClzekDUyN2b-wI76D_Qno8cXdkw5K2ODnHXcFMyAnAcJhTOdZ8w9_ZssGGWEY1n36eXJsFO0VObiKtydn92edHi5OYEbKjlHVF1awnWRxlRb28ZUSTQ-Cs8PYoJwlLUCZSOJaNNQE6RSiCalg45KKo0YeP4a1PNBjuvAbDs1BDEiLdpaxl6sDAEqHfmONt4QGGzCbqWjZDghyEgmt2SBSEqVJk6lSaHSJrQqPSblaXlPvm3bBD7V7X_EbfwtbhPmhKuPPcFF0IL66O0DtwhEjNLt0jO-AA9Iwt4 priority: 102 providerName: ProQuest |
| Title | Scheduling Algorithm Based on Heterogeneity and Confidence for Mimic Defense |
| URI | https://www.proquest.com/docview/3055532267 https://journals.riverpublishers.com/index.php/JWE/article/download/4931/4447 |
| UnpaywallVersion | publishedVersion |
| Volume | 19 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 1544-5976 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0047225 issn: 1540-9589 databaseCode: BENPR dateStart: 20150101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrZ3Pb9MwFMeftvYAO_B7WmFUPnDETeM4iXPsoKWaaDUBFeMUOcnzKOuSqks1bX89z_lRBieQuFuR7K_l93nO8_cBvMlI1VBryVMMkMssUFx5aDhKKTLPCKGMvYeczYPpQp6e--d7MGvfwjQreD3Y2LKE9a40vDq0KwNB6xrhnH4dO83SOpl1lS905sjIcx0pZbgP3cAnNO9AdzE_G32rPFPlkEd-1RLPGtBwAumgcSGiLS-cHze4GzNw7YXI75HqF34-2OZrfXujV6t7kWjyGPJ2DnUByuVgWyaD9O4Pe8f_Nskn8KhhVjaqBz2FPcyfwcE9J8Pn8PEziZ_ZqvYLNlpdFJtl-f2KnVCIzFiRs6ktuiloryJBP9N5xuxLw7qfKSNsZrPl1TJl79FQVo0vYDEZf3k35U2jBp5ShltSMmsII0ONiTZmiImSmHooXM-PiBgpSPrKhBLRJIEmglOIaULnCiqpNKLveofQyYscj4CZYZIS0YRaDLWM3EilxG869KxLfUrs2YO3rSjxuvbjiOufcr6IGw1jq2FcadiD41a4uF31uDI5o4MsCHvAd2L-zede_uP4V_BQ2PzcFVz4x9ApN1t8TRBTJn3YV5MPfeiejOdnn_rNRv0JYhDyTw |
| linkProvider | Unpaywall |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT-MwEB7xOAAHBCxoy9MHuGFoHCdxDgjxVIG2Wu2CxC04zpgFlbRAUcWf47cxThMeF8SFaw4j5ZvxzDd-fAOwnpFXI60lNxgil1mouPLRcpRSZL4VQlm3D9lqh40LeXoZXI7AS_UWxl2rrHJikaizrnF75NuFMhVFXxjt9u65mxrlTlerERq6HK2Q7RQSY-XDjjN8HlAL97hzckj-3hDi-Oj8oMHLKQPcUHvWp07MEgeKNKba2jqmSqLxUXh-EBPdoQwfKBtJRJuGmuiHQjQpLQpUUmnEwPPJ7iiMS1_G1PyN7x-1__ytaoFTYgwKxVZZ53Gg4lL3iH5GbN8O8O37lue2YD7XxnfCO_GU9_TzQHc6H2rf8QxMl6SV7Q2jbBZGMJ-DqQ9Shr-g-Y-8n7lr7ddsr3NNyPX_37F9qpEZ6-as4W7ddClYkVg_03nG3FPD4UBTRryZtW7ubgw7REttNc7DxY9guABjeTfH38BsPTVEaSIt6lrGXqwMETgd-U6m3hD5rMFmhVHSGwpyJMNTuUAkJaSJgzQpIK3BcoVjUq7Ox-Q9lmrA37D9jrnFr82twUTjvNVMmiftsyWYFK439wQXwTKM9R-ecIUITD9dLaOEwdVPB-YrY5UAcw |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrZ3PT9swFMefWDlsHAb7pXVjyIcd56ZxnMQ5lgGq0IombdXYKXKcZ-hWkqqkQvDX85wfHeMEEncrkv21_D7Pef4-gM85qRprLbnBCLnMI8VVgJajlCIPrBDKunvIyUk0nsrj0_B0AybdW5h2BS8HS1eWsFiXhteHdm0g6FwjvONfh167tF7uXOVLnXsyCXxPShk_g80oJDTvweb05Pvod-2ZKoc8CeuWeM6AhhNIR60LEW154f25wvWYge8uRP6PVP_w8_mqWOjrKz2f34lER9tQdHNoClD-DlZVNjA39-wdn2ySO_CyZVY2aga9gg0sXsPWHSfDN_DtB4mfu6r2Mzaan5XLWXV-wfYpROasLNjYFd2UtFeRoJ_pImfupWHTz5QRNrPJ7GJm2AFayqrxLUyPDn9-HfO2UQM3lOFWlMxawshYY6atHWKmJJoAhR-ECREjBclQ2Vgi2izSRHAK0WR0rqCSSiOGfvAOekVZ4HtgdpgZIppYi6GWiZ8oQ_ym48C51Btizz586URJF40fR9r8lAtF2mqYOg3TWsM-7HbCpd2qp7XJGR1kUdwHvhbzIZ_78MjxH-GFcPm5L7gId6FXLVf4iSCmyvbarXkLOOjvzw |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Scheduling+Algorithm+Based+on+Heterogeneity+and+Confidence+for+Mimic+Defense&rft.jtitle=Journal+of+web+engineering&rft.au=Zhang%2C+Wenjian&rft.au=Wei%2C+Shuai&rft.au=Tian%2C+Le&rft.au=Song%2C+Ke&rft.date=2020-12-25&rft.issn=1540-9589&rft.eissn=1544-5976&rft_id=info:doi/10.13052%2Fjwe1540-9589.19783&rft.externalDBID=n%2Fa&rft.externalDocID=10_13052_jwe1540_9589_19783 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1540-9589&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1540-9589&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1540-9589&client=summon |