Dynamic Scheduling Algorithm in Cyber Mimic Defense Architecture of Volunteer Computing

被引:7
|
作者
Li, Qianmu [1 ]
Meng, Shunmei [2 ]
Sang, Xiaonan [2 ,3 ]
Zhang, Hanrui [2 ,4 ]
Wang, Shoujin [5 ]
Bashir, Ali Kashif [6 ]
Yu, Keping [7 ]
Tariq, Usman [8 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Cyber Sci & Engn, Nanjing, Peoples R China
[2] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing, Peoples R China
[3] Wuyi Univ, Intelligent Mfg Dept, Jiangmen, Peoples R China
[4] Jiangsu Zhongtian Internet Technol Co Ltd, Nantong 226963, Peoples R China
[5] Mac Univ, Dept Comp, Sydney, NSW, Australia
[6] Manchester Metropolitan Univ, Dept Comp & Math, Manchester, Lancs, England
[7] Waseda Univ, Global Informat & Telecommun Inst, Tokyo, Japan
[8] Prince Sattam Bin Abdulaziz Univ, Coll Comp Sci & Engn, Al Kharj, Saudi Arabia
基金
日本学术振兴会; 中国国家自然科学基金;
关键词
Volunteer computing; Cyber Mimic Defense; Dynamic Scheduling; Time Threshold; Task Threshold; Multi-level Queue; COMPUTATION OFFLOADING METHOD; EDGE; INTERNET;
D O I
10.1145/3408291
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Volunteer computing uses computers volunteered by the general public to do distributed scientific computing. Volunteer computing is being used in high-energy physics, molecular biology, medicine, astrophysics, climate study, and other areas. These projects have attained unprecedented computing power. However, with the development of information technology, the traditional defense system cannot deal with the unknown security problems of volunteer computing. At the same time, Cyber Mimic Defense (CMD) can defend the unknown attack behavior through its three characteristics: dynamic, heterogeneous, and redundant. As an important part of the CMD, the dynamic scheduling algorithm realizes the dynamic change of the service centralized executor, which can enusre the security and reliability of CMD of volunteer computing. Aiming at the problems of passive scheduling and large scheduling granularity existing in the existing scheduling algorithms, this article first proposes a scheduling algorithm based on time threshold and task threshold and realizes the dynamic randomness of mimic defense from two different dimensions; finally, combining time threshold and random threshold, a dynamic scheduling algorithm based on multi-level queue is proposed. The experiment shows that the dynamic scheduling algorithm based on multi-level queue can take both security and reliability into account, has better dynamic heterogeneous redundancy characteristics, and can effectively prevent the transformation rule of heterogeneous executors from being mastered by attackers.
引用
收藏
页数:33
相关论文
共 50 条
  • [1] Research on dynamic scheduling decision algorithm in mimic defense
    Ji Z.
    Gao M.
    Ying L.
    Ji, Z. (jiasu4660966@163.com), 1600, Begell House Inc. (79): : 1563 - 1578
  • [2] Dynamic Task Scheduling Algorithm with Deadline Constraint in Heterogeneous Volunteer Computing Platforms
    Xu, Ling
    Qiao, Jianzhong
    Lin, Shukuan
    Zhang, Wanting
    FUTURE INTERNET, 2019, 11 (06)
  • [3] Heterogeneous redundancies scheduling algorithm for mimic security defense
    Liu Q.
    Lin S.
    Gu Z.
    2018, Editorial Board of Journal on Communications (39): : 188 - 198
  • [4] Heterogeneous Executors Scheduling Algorithm for Mimic Defense Systems
    Wu, Zhaoqi
    Wei, Jin
    2019 IEEE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING TECHNOLOGY (CCET), 2019, : 279 - 284
  • [5] Scheduling Algorithm Based on Heterogeneity and Confidence for Mimic Defense
    Zhang, Wenjian
    Wei, Shuai
    Tian, Le
    Song, Ke
    Zhu, Zhengbin
    JOURNAL OF WEB ENGINEERING, 2020, 19 (7-8): : 971 - 997
  • [6] An Efficient Algorithm for Scheduling Jobs in Volunteer Computing platforms
    Essafi, Adel
    Trystram, Denis
    Zaidi, Zied
    PROCEEDINGS OF 2014 IEEE INTERNATIONAL PARALLEL & DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS (IPDPSW), 2014, : 68 - 76
  • [7] A Zoning Algorithm for Dynamic Cyber Zone Defense
    McBride, Marci
    Mitchell, Robert
    2017 IEEE 7TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE IEEE CCWC-2017, 2017,
  • [8] Scheduling algorithm for dynamic reconfigurable computing
    Qi, Ji
    Li, Xi
    Yu, Haichen
    Hu, Nan
    Gong, Yuchang
    Wang, Ligang
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2007, 44 (08): : 1439 - 1447
  • [9] Globally Scheduling Volunteer Computing
    Anderson, David P.
    FUTURE INTERNET, 2021, 13 (09):
  • [10] An Optimal Seed Scheduling Strategy Algorithm Applied to Cyberspace Mimic Defense
    Chen, Zhuoxing
    Lu, Yiqin
    Qin, Jiancheng
    Cheng, Zhe
    IEEE ACCESS, 2021, 9 (09): : 129032 - 129050