Dynamic Scheduling Algorithm in Cyber Mimic Defense Architecture of Volunteer Computing

نویسندگان

چکیده

Volunteer computing uses computers volunteered by the general public to do distributed scientific computing. is being used in high-energy physics, molecular biology, medicine, astrophysics, climate study, and other areas. These projects have attained unprecedented power. However, with development of information technology, traditional defense system cannot deal unknown security problems volunteer . At same time, Cyber Mimic Defense (CMD) can defend attack behavior through its three characteristics: dynamic, heterogeneous, redundant. As an important part CMD, dynamic scheduling algorithm realizes change service centralized executor, which enusre reliability CMD Aiming at passive large granularity existing algorithms, this article first proposes a based on time threshold task randomness mimic from two different dimensions; finally, combining random threshold, multi-level queue proposed. The experiment shows that take both into account, has better heterogeneous redundancy characteristics, effectively prevent transformation rule executors mastered attackers.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimization Task Scheduling Algorithm in Cloud Computing

Since software systems play an important role in applications more than ever, the security has become one of the most important indicators of softwares.Cloud computing refers to services that run in a distributed network and are accessible through common internet protocols. Presenting a proper scheduling method can lead to efficiency of resources by decreasing response time and costs. This rese...

متن کامل

Soft Computing Techniques in Cyber Defense

Artificial intelligence is a technology to make the machines human compatible. Various techniques likeheuristic search (Generate and test, Hill climbing, BFS, DFS, Problem reduction, constraint satisfaction, means-ends analysis etc.), game playing, understanding, planning, NLP, Learning, commonsense, predictions and actions, and expert systems are there to make the system intelligent. This pape...

متن کامل

optimization task scheduling algorithm in cloud computing

since software systems play an important role in applications more than ever, the security has become one of the most important indicators of softwares.cloud computing refers to services that run in a distributed network and are accessible through common internet protocols. presenting a proper scheduling method can lead to efficiency of resources by decreasing response time and costs. this rese...

متن کامل

Architecture of a cyber defense competition

This paper describes the effort involve in executing a Cyber Defense Exercise while focusing on the White Cell and Red Forces activities during the 2003 Inter-Academy Cyber Defense Exercise (CDX). These exercise components were led by the National Security Agency and were comprised of security professionals from Carnegie Mellon University’s CERT, the United States Air Force, and the United Stat...

متن کامل

TASA: A New Task Scheduling Algorithm in Cloud Computing

Cloud computing refers to services that run in a distributed network and are accessible through common internet protocols. It merges a lot of physical resources and offers them to users as services according to service level agreement. Therefore, resource management alongside with task scheduling has direct influence on cloud networks’ performance and efficiency. Presenting a proper scheduling ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Transactions on Internet Technology

سال: 2021

ISSN: ['1533-5399', '1557-6051']

DOI: https://doi.org/10.1145/3408291