Scheduling algorithm based on heterogeneity and confidence for mimic defense

4Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

As a defense technology with endogenous security, mimic defense plays an important role in network security research. The scheduling of executors is one of the severe problems to take into account for mimic defense, and current research lacks comprehensive consideration of the influence of system architecture and attack behavior on scheduling algorithm. Based on previous research, this paper first introduces concept of heterogeneity and confidence according to vulnerability attributes and attack distribution characteristics to characterize the executors. Moreover, the TOPSIS (Technique for Order Preference by Similarity to an Ideal Solution) algorithm is brought in to optimize the system security and improve operating efficiency. Experimental results showed that,compared with the existing algorithms, Random, MD, RSMS, it improves the security of the system in non-uniform distributed attack scenario and the operating efficiency in each attack scenario.

References Powered by Scopus

A state-of the-art survey of TOPSIS applications

1897Citations
N/AReaders
Get full text

Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense

231Citations
N/AReaders
Get full text

Mimic defense: A designed-in cybersecurity defense framework

92Citations
N/AReaders
Get full text

Cited by Powered by Scopus

BIBLIOMETRIC STUDIES ON MULTI-CRITERIA DECISION ANALYSIS (MCDA) METHODS APPLIED IN MILITARY PROBLEMS

61Citations
N/AReaders
Get full text

An integrated Multi-Criteria Decision Making and Multi-Choice Conic Goal Programming approach for customer evaluation and manager assignment

7Citations
N/AReaders
Get full text

An Optimal Seed Scheduling Strategy Algorithm Applied to Cyberspace Mimic Defense

6Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Zhang, W., Wei, S., Tian, L., Song, K., & Zhu, Z. (2020). Scheduling algorithm based on heterogeneity and confidence for mimic defense. Journal of Web Engineering, 19(7–8), 971–998. https://doi.org/10.13052/jwe1540-9589.19783

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 3

100%

Readers' Discipline

Tooltip

Economics, Econometrics and Finance 2

67%

Engineering 1

33%

Article Metrics

Tooltip
Social Media
Shares, Likes & Comments: 21

Save time finding and organizing research with Mendeley

Sign up for free