Scheduling Sequence Control Method Based on Sliding Window in Cyberspace Mimic Defense

10Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Cyberspace Mimic Defense (CMD) is a proactive defense theory proposed in recent years to deal with vulnerability and backdoor threats that are common in information systems. Different from moving target defense (MTD), CMD can obtain foundation by verifying multiple results from isolated, heterogeneous, and parallel running spaces, thus initiating a more targeted defensive action, such as scheduling and structure transformation. However, scheduling sequence control is a severe problem in this process, which needs to select a series of scheduling time and take into account security, efficiency, and robustness for variable attack situations. Inspired by the traffic and congestion control mechanism in computer networks, this paper proposed a sliding window-based scheduling sequence control method. By setting driver events to trigger the window 'sliding,' the control parameters update and adapt to the current state accordingly. Then, considering internal resource constraints and external attack situations, a two-factor driver on variable period and exception threshold with their corresponding calculations are specified. Evaluations show that this method can maintain good performance under different scenarios, which proves to be an effective solution for scheduling sequence control in CMD.

References Powered by Scopus

Automated generation and analysis of attack graphs

631Citations
N/AReaders
Get full text

Dynamic security risk management using Bayesian attack graphs

537Citations
N/AReaders
Get full text

Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization

441Citations
N/AReaders
Get full text

Cited by Powered by Scopus

A Survey on 5G and LPWAN-IoT for Improved Smart Cities and Remote Area Applications: From the Aspect of Architecture and Security

67Citations
N/AReaders
Get full text

Dynamic defenses in cyber security: Techniques, methods and challenges

61Citations
N/AReaders
Get full text

Microservice Security Framework for IoT by Mimic Defense Mechanism

9Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Guo, W., Wu, Z., Zhang, F., & Wu, J. (2020). Scheduling Sequence Control Method Based on Sliding Window in Cyberspace Mimic Defense. IEEE Access, 8, 1517–1533. https://doi.org/10.1109/ACCESS.2019.2961644

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 3

60%

Lecturer / Post doc 1

20%

Researcher 1

20%

Readers' Discipline

Tooltip

Computer Science 3

60%

Physics and Astronomy 1

20%

Engineering 1

20%

Save time finding and organizing research with Mendeley

Sign up for free