浏览全部资源
扫码关注微信
国家数字交换系统工程技术研究中心,河南 郑州 450001
[ "刘勤让(1975-),男,博士,国家数字交换系统工程技术研究中心研究员,主要研究方向为宽带信息网络及芯片设计。" ]
[ "林森杰(1993-),男,广东汕头人,国家数字交换系统工程技术研究中心硕士生,主要研究方向为网络主动防御。" ]
[ "顾泽宇(1993-),男,辽宁沈阳人,国家数字交换系统工程技术研究中心硕士生,主要研究方向为网络主动防御。" ]
网络出版日期:2018-07,
纸质出版日期:2018-07-25
移动端阅览
刘勤让, 林森杰, 顾泽宇. 面向拟态安全防御的异构功能等价体调度算法[J]. 通信学报, 2018,39(7):188-198.
Qinrang LIU, Senjie LIN, Zeyu GU. Heterogeneous redundancies scheduling algorithm for mimic security defense[J]. Journal on communications, 2018, 39(7): 188-198.
刘勤让, 林森杰, 顾泽宇. 面向拟态安全防御的异构功能等价体调度算法[J]. 通信学报, 2018,39(7):188-198. DOI: 10.11959/j.issn.1000-436x.2018124.
Qinrang LIU, Senjie LIN, Zeyu GU. Heterogeneous redundancies scheduling algorithm for mimic security defense[J]. Journal on communications, 2018, 39(7): 188-198. DOI: 10.11959/j.issn.1000-436x.2018124.
拟态安全防御的一个关键环节是异构功能等价体的调度,现有的调度策略缺乏对冗余体间相似度的考虑,且调度算法较为单一。基于此,提出了一种兼顾动态性和可靠性的异构功能等价体调度算法——随机种子最小相似度算法,首先随机确定种子冗余体,然后再根据相似度指标选择整体相似度最小的最终调度方案。理论分析和仿真实验表明,该算法的调度周期远高于最长相异性距离算法,而失效率远低于随机调度算法,在动态性和可靠性之间达到了较好的平衡。
The scheduling of heterogeneous redundancies is one of the key lines of mimic security defense
but the existing scheduling strategies are lack of consideration about the similarity among redundancies and the scheduling algorithms are incomprehensive.A new scheduling algorithm called random seed & minimum similarity (RSMS) algorithm was proposed
which combined dynamics and reliability by determining a scheduling scheme with minimum global-similarity after choosing a seed-redundancy randomly.Theoretical analysis and simulation results show that RSMS algorithm possessed a far longer scheduling cycle than maximum dissimilarity algorithm
as well as a far lower failure rate than random scheduling algorithm
which represents an effective balance between dynamics and reliability.
邬江兴 . 网络空间拟态防御研究 [J ] . 信息安全学报 , 2016 , 1 ( 4 ): 1 - 10 .
WU J X . Research on cyber mimic defense [J ] . Journal of Cyber Security , 2016 , 1 ( 4 ): 1 - 10 .
扈红超 , 陈福才 , 王禛鹏 . 拟态防御 DHR 模型若干问题探讨和性能评估 [J ] . 信息安全学报 , 2016 , 1 ( 4 ): 40 - 51 .
HU H C , CHEN F C , WANG Z P . Performance evaluations on DHR for cyberspace mimic defense [J ] . Journal of Cyber Security , 2016 , 1 ( 4 ): 1 - 10 .
仝青 , 张铮 , 邬江兴 . 基于软硬件多样性的主动防御技术 [J ] . 信息安全学报 , 2017 , 2 ( 1 ): 1 - 12 .
TONG Q , ZHANG Z , WU J X . The active defense technology based on the software/hardware diversity [J ] . Journal of Cyber Security , 2017 , 2 ( 1 ): 1 - 12 .
REIS G A , CHANG J , VACHHARAJANI N , et al . SWIFT:software implemented fault tolerance [C ] // International Symposium on Code Generation and Optimization . 2005 : 243 - 254 .
WANG J , BAO W , ZHU X , et al . FESTAL:fault-tolerant elastic scheduling algorithm for real-time tasks in virtualized clouds [J ] . IEEE Transactions on Computers , 2015 , 64 ( 9 ): 2545 - 2558 .
殷进勇 , 顾国昌 . 允许多处理机故障的实时任务容错调度算法 [J ] . 电子与信息学报 , 2010 , 32 ( 2 ): 444 - 448 .
YIN J Y , GU G C . A real-time fault-tolerant scheduling algorithm for multiple processor faults [J ] . Journal of Electronics & Information Technology , 2010 , 32 ( 2 ): 444 - 448 .
彭浩 , 陆阳 , 孙峰 , 等 . 副版本不可抢占的全局容错调度算法 [J ] . 软件学报 , 2016 , 27 ( 12 ): 3158 - 3171 .
PENG H , LU Y , SUN F , et al . Faulttolerant global scheduling with non-preemptive backups [J ] . Journal of Software , 2016 , 27 ( 12 ): 3158 - 3171 .
DAS A , KUMAR A , VEERAVALLI B . Reliability and energy-aware mapping and scheduling of multimedia applications on multiprocessor systems [J ] . IEEE Transactions on Parallel & Distributed Systems , 2016 , 27 ( 3 ): 869 - 884 .
吉萌 , 余少华 , 詹翊春 . 双冗余结构路由器故障恢复模型与方案研究 [J ] . 通信学报 , 2006 , 27 ( 6 ): 21 - 28 .
JI M , YU S H , ZHAN Y C . Research on fault-recovery model and scheme in dual-system redundancy router [J ] . Journal on Communications , 2006 , 27 ( 6 ): 21 - 28 .
CHEN C Y . Task scheduling for maximizing performance and reliability considering fault recovery in heterogeneous distributed systems [J ] . IEEE Transactions on Parallel & Distributed Systems , 2016 , 27 ( 2 ): 521 - 532 .
邬江兴 , 李军飞 , 等 . 一种异构功能等价体调度装置及方法 [P ] . 中国,CN106161417A ,2016-11-23.
WU J X , LI J F , et al . A heterogeneous redundancies scheduling equipment and method [P ] . 中国,CN106161417A ,2016-11-23.
马海龙 , 伊鹏 , 江逸茗 , 等 . 基于动态异构冗余机制的路由器拟态防御体系结构 [J ] . 信息安全学报 , 2017 , 2 ( 1 ): 29 - 42 .
MA H L , YI P , JIANG Y M , et al . Dynamic heterogeneous redundancy based router architecture with mimic defenses [J ] . Journal of Cyber Security , 2017 , 2 ( 1 ): 29 - 42 .
姚文斌 , 杨孝宗 . 相异性软件组件选择算法设计 [J ] . 哈尔滨工业大学学报 , 2003 , 35 ( 3 ): 261 - 264 .
YAO W B , YANG X Z . Design of selective algorithm for diverse software components [J ] . Journal of Harbin Institute of Technology , 2003 , 35 ( 3 ): 261 - 264 .
曾国荪 , 陈闳中 . 探索计算系统异构性的描述 [J ] . 计算机科学 , 2003 , 30 ( 12 ): 16 - 18 .
ZENG G S , CHEN H Z . Inquiring the description of heterogeneity among computational systems [J ] . Computer Science , 2003 , 30 ( 12 ): 16 - 18 .
吴奎 , 周献中 , 王建宇 , 等 . 基于贝叶斯估计的概念语义相似度算法 [J ] . 中文信息学报 , 2010 , 24 ( 2 ): 52 - 57 .
WU K , ZHOU X Z , WANG J Y , et al . A concept semantic similarity algorithm based on bayesian estimation [J ] . Journal of Chinese Information Processing , 2010 , 24 ( 2 ): 52 - 57 .
魏帅 , 于洪 , 顾泽宇 , 等 . 面向工控领域的拟态安全处理机架构 [J ] . 信息安全学报 , 2017 , 2 ( 1 ): 54 - 73 .
WEI S , YU H , GU Z Y , et al . Architecture of mimic security processor for industry control system [J ] . Journal of Cyber Security , 2017 , 2 ( 1 ): 1 - 12 .
0
浏览量
1667
下载量
11
CSCD
关联资源
相关文章
相关作者
相关机构