浏览全部资源
扫码关注微信
1. 郑州大学网络空间安全学院,河南 郑州 450001
2. 国家数字交换系统工程技术研究中心,河南 郑州 450001
[ "贾洪勇(1975- ),男,河南西平人,博士,郑州大学讲师,主要研究方向为云计算安全和拟态防御" ]
[ "潘云飞(1998- ),男,河南郑州人,郑州大学硕士生,主要研究方向为网络空间安全和拟态防御" ]
[ "刘文贺(1999- ),男,河南周口人,郑州大学硕士生,主要研究方向为网络空间安全和拟态防御" ]
[ "曾俊杰(1977- ),男,江西南康人,郑州大学讲师,主要研究方向为网络与信息安全" ]
[ "张建辉(1977- ),男,河南平顶山人,博士,国家数字交换系统工程技术研究中心副研究员,主要研究方向为网络与信息安全、网络体系架构、人工智能" ]
网络出版日期:2022-03,
纸质出版日期:2022-03-25
移动端阅览
贾洪勇, 潘云飞, 刘文贺, 等. 基于高阶异构度的执行体动态调度算法[J]. 通信学报, 2022,43(3):233-245.
Hongyong JIA, Yunfei PAN, Wenhe LIU, et al. Executive dynamic scheduling algorithm based on high-order heterogeneity[J]. Journal on communications, 2022, 43(3): 233-245.
贾洪勇, 潘云飞, 刘文贺, 等. 基于高阶异构度的执行体动态调度算法[J]. 通信学报, 2022,43(3):233-245. DOI: 10.11959/j.issn.1000-436x.2022055.
Hongyong JIA, Yunfei PAN, Wenhe LIU, et al. Executive dynamic scheduling algorithm based on high-order heterogeneity[J]. Journal on communications, 2022, 43(3): 233-245. DOI: 10.11959/j.issn.1000-436x.2022055.
针对当前动态异构冗余系统中异构体调度缺乏动态性和仅考虑二阶异构性,导致系统易被攻击者找到共模漏洞从而攻破系统的问题,提出了一种同时考虑执行体高阶异构度和历史信息的异构执行体动态调度算法——基于高阶异构度的负反馈调度算法。该算法首先计算等待池中执行体的高阶异构度矩阵,然后在每次调度执行体时同时考虑历史威胁和异构体间的高阶异构度来确定调度执行体集。实验表明,结合高阶异构度和历史信息的策略使算法获得了动态性和安全性的平衡,且防御能力较先前算法更优秀。
At present
most isomer scheduling models in DHR systems only considered second-order isomerism and lack dynamics.In order to solve these problems
a dynamic scheduling algorithm was proposed
which combined heterogeneity and dynamics by determining a scheduling scheme with maximum scheduling value.The value was obtained by combining high-order heterogeneity and historical information.The experimental results show that the proposed algorithm has better defense capabilities than other scheduling algorithms
and its strategy can achieve a balance of dynamics and security.
ZHENG J J , NAMIN A S . A survey on the moving target defense strategies:an architectural perspective [J ] . Journal of Computer Science and Technology , 2019 , 34 ( 1 ): 207 - 233 .
石乐义 , 郭宏彬 , 温晓 , 等 . 端信息跳扩混合的主动网络防御技术研究 [J ] . 通信学报 , 2019 , 40 ( 5 ): 125 - 135 .
SHI L Y , GUO H B , WEN X , et al . Research on end hopping and spreading for active cyber defense [J ] . Journal on Communications , 2019 , 40 ( 5 ): 125 - 135 .
何永忠 , 陈美玲 . 基于协议的拟态研究综述 [J ] . 北京交通大学学报 , 2016 , 40 ( 5 ): 1 - 8 .
HE Y Z , CHEN M L . Protocol mimicry technique and its development [J ] . Journal of Beijing Jiaotong University , 2016 , 40 ( 5 ): 1 - 8 .
VANO-GARCIA F , MARCO-GISBERT H , . KASLR-MT:kernel address space layout randomization for multi-tenant cloud systems [J ] . Journal of Parallel and Distributed Computing , 2020 , 137 : 77 - 90 .
马多贺 , 李琼 , 林东岱 . 基于POF的网络窃听攻击移动目标防御方法 [J ] . 通信学报 , 2018 , 39 ( 2 ): 73 - 87 .
MA D H , LI Q , LIN D D . Moving target defense against network eavesdropping attack using POF [J ] . Journal on Communications , 2018 , 39 ( 2 ): 73 - 87 .
KRYLOV V , KRAVTSOV K . Principles of network security protocols based on dynamic address space randomization [J ] . Journal of Communication and Computer , 2016 , 13 ( 2 ): 77 - 89 .
FENSKE E , BROWN D , MARTIN J , et al . Three years later:a study of MAC address randomization in mobile devices and when it succeeds [J ] . Proceedings on Privacy Enhancing Technologies , 2021 , 2021 ( 3 ): 164 - 181 .
马博林 , 张铮 , 陈源 , 等 . 基于指令集随机化的抗代码注入攻击方法 [J ] . 信息安全学报 , 2020 , 5 ( 4 ): 30 - 43 .
MA B L , ZHANG Z , CHEN Y , et al . The defense method for code-injection attacks based on instruction set randomization [J ] . Journal of Cyber Security , 2020 , 5 ( 4 ): 30 - 43 .
郝志宇 , 翟健宏 , 云晓春 , 等 . 动态路由模拟策略研究 [J ] . 通信学报 , 2007 , 28 ( 12 ): 19 - 24 .
HAO Z Y , ZHAI J H , YUN X C , et al . Research on dynamic routing mechanism in network simulation [J ] . Journal on Communications , 2007 , 28 ( 12 ): 19 - 24 .
邬江兴 . 网络空间拟态安全防御 [J ] . 保密科学技术 , 2014 ( 10 ): 4 - 9 , 1 .
WU J X . Mimic security defense in cyberspace [J ] . Secrecy Science and Technology , 2014 ( 10 ): 4 - 9 , 1 .
姜远海 . 基于分离映射的网络层主动变迁技术研究 [D ] . 北京:北京交通大学 , 2016 .
JIANG Y H . Research on active change technology of network layer based on separation mapping [D ] . Beijing:Beijing Jiaotong University , 2016 .
宋克 , 刘勤让 , 魏帅 , 等 . 基于拟态防御的以太网交换机内生安全体系结构 [J ] . 通信学报 , 2020 , 41 ( 5 ): 18 - 26 .
SONG K , LIU Q R , WEI S , et al . Endogenous security architecture of Ethernet switch based on mimic defense [J ] . Journal on Communications , 2020 , 41 ( 5 ): 18 - 26 .
吴铤 , 胡程楠 , 陈庆南 , 等 . 基于执行体划分的防御增强型动态异构冗余架构 [J ] . 通信学报 , 2021 , 42 ( 3 ): 122 - 134 .
WU T , HU C N , CHEN Q N , et al . Defense-enhanced dynamic heterogeneous redundancy architecture based on executor partition [J ] . Journal on Communications , 2021 , 42 ( 3 ): 122 - 134 .
朱正彬 , 刘勤让 , 刘冬培 , 等 . 拟态多执行体调度算法研究进展 [J ] . 通信学报 , 2021 , 42 ( 5 ): 179 - 190 .
ZHU Z B , LIU Q R , LIU D P , et al . Research progress of mimic multi-execution scheduling algorithm [J ] . Journal on Communications , 2021 , 42 ( 5 ): 179 - 190 .
杨林 , 王永杰 , 张俊 . FAWA:一种异构执行体的负反馈动态调度算法 [J ] . 计算机科学 , 2021 , 48 ( 8 ): 284 - 290 .
YANG L , WANG Y J , ZHANG J . FAWA:a negative feedback dynamic scheduling algorithm for heterogeneous executor [J ] . Computer Science , 2021 , 48 ( 8 ): 284 - 290 .
武兆琪 , 张帆 , 郭威 , 等 . 一种基于执行体异构度的拟态裁决优化方法 [J ] . 计算机工程 , 2020 , 46 ( 5 ): 12 - 18 .
WU Z Q , ZHANG F , GUO W , et al . A mimic arbitration optimization method based on heterogeneous degree of executors [J ] . Computer Engineering , 2020 , 46 ( 5 ): 12 - 18 .
沈丛麒 , 陈双喜 , 吴春明 , 等 . 基于信誉度与相异度的自适应拟态控制器研究 [J ] . 通信学报 , 2018 , 39 ( S2 ): 173 - 180 .
SHEN C Q , CHEN S X , WU C M , et al . Adaptive mimic defensive controller framework based on reputation and dissimilarity [J ] . Journal on Communications , 2018 , 39 ( S2 ): 173 - 180 .
刘勤让 , 林森杰 , 顾泽宇 . 面向拟态安全防御的异构功能等价体调度算法 [J ] . 通信学报 , 2018 , 39 ( 7 ): 188 - 198 .
LIU Q R , LIN S J , GU Z Y . Heterogeneous redundancies scheduling algorithm for mimic security defense [J ] . Journal on Communications , 2018 , 39 ( 7 ): 188 - 198 .
魏帅 , 张辉华 , 苏野 , 等 . 面向拟态防御系统的高阶异构度大数判决算法 [J ] . 计算机工程 , 2021 , 47 ( 5 ): 30 - 35 .
WEI S , ZHANG H H , SU Y , et al . Majority voting algorithm based on high-order heterogeneity for mimic defense system [J ] . Computer Engineering , 2021 , 47 ( 5 ): 30 - 35 .
杨欣欣 , 黄少滨 . 高阶异构数据层次联合聚类算法 [J ] . 计算机研究与发展 , 2015 , 52 ( 1 ): 200 - 210 .
YANG X X , HUANG S B . A hierarchical co-clustering algorithm for high-order heterogeneous data [J ] . Journal of Computer Research and Development , 2015 , 52 ( 1 ): 200 - 210 .
李超 . 高阶多数据集建模新方法与应用研究 [D ] . 哈尔滨:哈尔滨工程大学 , 2017 .
LI C . Study on novel modeling methods and applications for multiple higher order datasets [D ] . Harbin:Harbin Engineering University , 2017 .
黄少滨 , 杨欣欣 , 申林山 , 等 . 高阶异构数据模糊联合聚类算法 [J ] . 通信学报 , 2014 , 35 ( 6 ): 15 - 24 .
HUANG S B , YANG X X , SHEN L S , et al . Fuzzy co-clustering algorithm for high-order heterogeneous data [J ] . Journal on Communications , 2014 , 35 ( 6 ): 15 - 24 .
丁绍虎 , 齐宁 , 郭义伟 . 基于 M-FlipIt 博弈模型的拟态防御策略评估 [J ] . 通信学报 , 2020 , 41 ( 7 ): 186 - 194 .
DING S H , QI N , GUO Y W . Evaluation of mimic defense strategy based on M-FlipIt game model [J ] . Journal on Communications , 2020 , 41 ( 7 ): 186 - 194 .
蔡雨彤 , 常晓林 , 石禹 , 等 . 动态平台技术防御攻击的瞬态效能量化分析 [J ] . 信息安全学报 , 2019 , 4 ( 4 ): 59 - 67 .
CAI Y T , CHANG X L , SHI Y , et al . Analyzing transient effectiveness of dynamic platform technique in resisting attacks [J ] . Journal of Cyber Security , 2019 , 4 ( 4 ): 59 - 67 .
张兴明 , 顾泽宇 , 魏帅 , 等 . 拟态防御马尔可夫博弈模型及防御策略选择 [J ] . 通信学报 , 2018 , 39 ( 10 ): 143 - 154 .
ZHANG X M , GU Z Y , WEI S , et al . Markov game modeling of mimic defense and defense strategy determination [J ] . Journal on Communications , 2018 , 39 ( 10 ): 143 - 154 .
吴正江 , 姚琪 , 冯四风 , 等 . 基于数据库二进制日志的竞赛式仲裁优化方案 [J ] . 计算机工程 , 2021 , 47 ( 5 ): 24 - 29 .
WU Z J , YAO Q , FENG S F , et al . Optimization scheme of competitive arbitration based on binary database log [J ] . Computer Engineering , 2021 , 47 ( 5 ): 24 - 29 .
高振斌 , 贾广瑞 , 张文建 , 等 . 基于异常值的拟态裁决优化方法 [J ] . 计算机应用研究 , 2021 , 38 ( 7 ): 2066 - 2071 .
GAO Z B , JIA G R , ZHANG W J , et al . Mimic ruling optimization method based on executive outliers [J ] . Application Research of Computers , 2021 , 38 ( 7 ): 2066 - 2071 .
CHOI J , GOH K I . Dynamics of consensus formation on multiplex networks:the majority-vote model [C ] // APS March Meeting.Washington,D.C . :American Physical Society , 2018 : 1 - 15 .
0
浏览量
315
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构