浏览全部资源
扫码关注微信
信息工程大学,河南 郑州 450002
[ "普黎明(1976- ),男,云南嵩明人,信息工程大学副研究员,主要研究方向为网络安全、网络体系结构" ]
[ "刘树新(1987- ),男,山东潍坊人,博士,信息工程大学助理研究员,主要研究方向为复杂网络、网络信息挖掘" ]
[ "丁瑞浩(1988- ),男,河南郑州人,信息工程大学助理研究员,主要研究方向为网络安全" ]
[ "王凯(1980- ),男,河南许昌人,博士,信息工程大学副研究员,主要研究方向为电信网安全" ]
网络出版日期:2020-03,
纸质出版日期:2020-03-25
移动端阅览
普黎明, 刘树新, 丁瑞浩, 等. 面向拟态云服务的异构执行体调度算法[J]. 通信学报, 2020,41(3):17-24.
Liming PU, Shuxin LIU, Ruihao DING, et al. Heterogeneous executor scheduling algorithm for mimic cloud service[J]. Journal on communications, 2020, 41(3): 17-24.
普黎明, 刘树新, 丁瑞浩, 等. 面向拟态云服务的异构执行体调度算法[J]. 通信学报, 2020,41(3):17-24. DOI: 10.11959/j.issn.1000-436x.2020052.
Liming PU, Shuxin LIU, Ruihao DING, et al. Heterogeneous executor scheduling algorithm for mimic cloud service[J]. Journal on communications, 2020, 41(3): 17-24. DOI: 10.11959/j.issn.1000-436x.2020052.
针对当前异构调度模型仅从空间或者时间特性进行建模设计,缺少对时空特性的综合考虑且存在动态性和异构性不够均衡的问题。为使拟态云服务系统的动态、异构和冗余特性能够平衡互补,提出一种基于优先级和时间片的执行池调度算法,该算法基于执行池相似性指标进行优先级预排序,结合时间片等策略进行方案调度。实验结果表明,所提算法有较好的动态性,结合时间片策略能够获得动态性和异构性的综合平衡,且算法耗时较低。
At present
most heterogeneous scheduling models were only designed from the perspective of space or time
without comprehensive consideration the characteristics of time and space
and there was a problem of insufficient balance between dynamics and heterogeneity.In order to balance the dynamic
heterogeneous and redundant characteristics of the mimic cloud service system
an executor pool scheduling algorithm based on priority and time slice was proposed
which performed priority pre-sorting based on the executor pool similarity indicator
and scheduled the program in combination with strategies such as time slice.The experimental results show that the algorithm has good dynamics
and its time slice strategy can achieve a balance of dynamics and heterogeneity
and the algorithm takes less time.
张玉清 , 王晓菲 , 刘雪峰 , 等 . 云计算环境安全综述 [J ] . 软件学报 , 2016 , 27 ( 6 ): 1328 - 1348 .
ZHANG Y Q , WANG X F , LIU X F , et al . Survey on cloud computing security [J ] . Journal of Software , 2016 , 27 ( 6 ): 1328 - 1348 .
邬江兴 . 网络空间拟态防御原理 [M ] . 北京 : 科学出版社 , 2018 .
WU J X . Cyberspace mimic defense [M ] . Beijing : Science PressPress , 2018 .
邬江兴 . 网络空间拟态防御研究 [J ] . 信息安全学报 , 2016 , 1 ( 4 ): 1 - 10 .
WU J X . Research on cyber mimic defense [J ] . Journal of Cyber Security , 2016 , 1 ( 4 ): 1 - 10 .
扈红超 , 陈福才 , 王禛鹏 . 拟态防御 DHR 模型若干问题探讨和性能评估 [J ] . 信息安全学报 , 2016 , 1 ( 4 ): 40 - 51 .
HU H C , CHEN F C , WANG Z P . Performance evaluations on DHR for cyberspace mimic defense [J ] . Journal of Cyber Security , 2016 , 1 ( 4 ): 40 - 51 .
陈越 , 王龙江 , 严新成 , 等 . 基于再生码的拟态数据存储方案 [J ] . 通信学报 , 2018 , 39 ( 4 ): 21 - 34 .
CHEN Y , WANG L J , YAN X C , et al . Mimic storage scheme based on regenerated code [J ] . Journal on Communications , 2018 , 39 ( 4 ): 21 - 34 .
仝青 , 张铮 , 张为华 , 等 . 拟态防御 Web 服务器设计与实现 [J ] . 软件学报 , 2017 , 28 ( 4 ): 883 - 897 .
TONG Q , ZHANG Z , ZHANG W H , et al . Design and implementation of mimic defense Web server [J ] . Journal of Software , 2017 , 28 ( 4 ): 883 - 897 .
马海龙 , 伊鹏 , 江逸茗 , 等 . 基于动态异构冗余机制的路由器拟态防御体系结构 [J ] . 信息安全学报 , 2017 , 2 ( 1 ): 29 - 42 .
MA H L , YI P , JIANG Y M , et al . Dynamic heterogeneous redundancy based router architecture with mimic defenses [J ] . Journal of Cyber Security , 2017 , 2 ( 1 ): 29 - 42 .
李传煌 , 任云方 , 汤中运 , 等 . SDN中服务部署的拟态防御方法 [J ] . 通信学报 , 2018 , 39 ( S2 ): 121 - 130 .
LI C H , REN Y F , TANG Z Y , et al . Mimic defense method for service deployment in SDN [J ] . Journal on Communications , 2018 , 39 ( S2 ): 121 - 130 .
王禛鹏 , 扈红超 , 程国振 . 一种基于拟态安全防御的 DNS 框架设计 [J ] . 电子学报 , 2017 , 45 ( 11 ): 139 - 148 .
WANG Z P , HU H C , CHENG G Z . A DNS architecture based on mimic security defense [J ] . Acta Electronica Sinica , 2017 , 45 ( 11 ): 139 - 148 .
殷斌 , 陆熊 , 陶想林 . 非相似三余度飞控计算机设计和可靠性分析 [J ] . 测控技术 , 2015 , 34 ( 5 ): 53 - 56 .
YIN B , LU X , TAO X L . Design of a prototype flight control computer system with triple dissimilar redundancy [J ] . Measurement &Control Technology , 2015 , 34 ( 5 ): 53 - 56 .
臧红伟 , 韩炜 , 高德远 . 非相似余度计算机系统及其可靠性分析 [J ] . 哈尔滨工业大学学报 , 2008 , 40 ( 3 ): 492 - 494 .
ZANG H W , HAN W , GAO D Y . Dissimilar redundancy computer system and reliability analysis [J ] . Journal of Harbin Institute of Technology , 2008 , 40 ( 3 ): 492 - 494 .
王伟 , 杨本朝 , 李光松 , 等 . 异构冗余系统的安全性分析 [J ] . 计算机科学 , 2018 , 45 ( 9 ): 183 - 186 ,194.
WANG W , YANG B C , LI G S , et al . Security analysis of heterogeneous redundant systems [J ] . Computer Science , 2018 , 45 ( 9 ): 183 - 186 ,194.
王伟 , 曾俊杰 , 李光松 , 等 . 动态异构冗余系统的安全性分析 [J ] . 计算机工程 , 2018 , 44 ( 10 ): 42 - 45 ,50.
WANG W , ZENG J J , LI G S , et al . Security analysis of dynamic heterogeneous redundant system [J ] . Computer Engineering , 2018 , 44 ( 10 ): 42 - 45 ,50.
姚文斌 , 杨孝宗 . 相异性软件组件选择算法设计 [J ] . 哈尔滨工业大学学报 , 2003 , 35 ( 3 ): 261 - 264 .
YAO W B , YANG X Z . Design of selective algorithm for diverse software components [J ] . Journal of Harbin Institute of Technology , 2003 , 35 ( 3 ): 261 - 264 .
WANG Y W , WU J X , GUO Y F , et al . Scientific workflow execution system based on mimic defense in the cloud environment [J ] . Frontiers of Information Technology & Electronic Engineering , 2018 , 19 ( 12 ): 1522 - 1537 .
张杰鑫 , 庞建民 , 张铮 , 等 . 面向拟态构造Web服务器的执行体调度算法 [J ] . 计算机工程 , 2019 , 45 ( 8 ): 14 - 21 .
ZHANG J X , PANG J M , ZHANG Z , et al . The executors scheduling algorithm for the Web server with mimic construction [J ] . Computer Engineering , 2019 , 45 ( 8 ): 14 - 21 .
GARCIA M , BESSANI A , GASHI I , et al . Analysis of operating system diversity for intrusion tolerance [J ] . Software:Practice and Experience , 2014 , 44 ( 6 ): 735 - 770 .
刘勤让 , 林森杰 , 顾泽宇 . 面向拟态安全防御的异构功能等价体调度算法 [J ] . 通信学报 , 2018 , 39 ( 7 ): 188 - 198 .
LIU Q R , LIN S J , GU Z Y . Heterogeneous redundancies scheduling algorithm for mimic security defense [J ] . Journal on Communications , 2018 , 39 ( 7 ): 188 - 198 .
魏帅 , 于洪 , 顾泽宇 , 等 . 面向工控领域的拟态安全处理机架构 [J ] . 信息安全学报 , 2017 , 2 ( 1 ): 54 - 73 .
WEI S , YU H , GU Z Y , et al . Architecture of mimic security processor for industry control system [J ] . Journal of Cyber Security , 2017 , 2 ( 1 ): 54 - 73 .
0
浏览量
944
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构