Disentangled Orchestration on Cyber Ranges

被引:0
作者
Fu, Yongquan [1 ]
Han, Weihong [2 ]
Yuan, Dong [3 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Natl Key Lab Parallel & Distributed Comp, Changsha 410073, Peoples R China
[2] Guangzhou Univ, Sch Comp Sci & Cyber Engn, Guangzhou 511370, Guangdong, Peoples R China
[3] Univ Sydney, Fac Engn, Sydney, NSW 2050, Australia
基金
中国国家自然科学基金;
关键词
Task analysis; Containers; Behavioral sciences; Delays; Testing; Chatbots; Malware; Composition; event chaining; experiment; orchestration; cyber range;
D O I
10.1109/TDSC.2023.3303888
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber ranges require networked applications to test cyberspace events effectively. As testing becomes more advanced, it involves multiple real-world applications with flexible execution orders. However, it is increasingly challenging to orchestrate large-scale, chained, and heterogeneous Internet applications. State-of-the-art orchestration techniques face scalability issues due to inefficient representation models and entangled scheduling of events and applications. To address these issues, we present Wukong, a disentangled orchestration system in cyber ranges that disaggregates the scheduling and execution of workflows and their applications in a decentralized coordination approach. First, we overcome the heterogeneity of events with a workflow model that encodes event chains with compositional Directed Acyclic Graphs (DAGs) and unified event triggers. Second, Wukong disaggregates the execution of DAGs and applications with push-pull decentralized coordination over distributed agents. Our evaluation of Wukong on a real-world cyber range demonstrates its expressive, scalable, and efficient abilities for automatically emulating diverse event chains. The storage footprint of compositional modeling is up to 57 times smaller than that of baseline models. Wukong's response delay is 1.52 to 2.74 times shorter than state-of-the-art orchestration engines, and the scheduling delay is up to 2.16 times smaller than the baseline approach.
引用
收藏
页码:2344 / 2360
页数:17
相关论文
共 47 条
  • [1] Nichols JA, 2022, Arxiv, DOI arXiv:2201.08473
  • [2] Albrecht M., 2012, P 1 ACM SIGMOD WORKS, DOI [10.1145/2443416.2443417, DOI 10.1145/2443416.2443417]
  • [3] A Case for Integrating Experimental Containers with Notebooks
    Anderson, Jason
    Keahey, Kate
    [J]. 11TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2019), 2019, : 151 - 158
  • [4] [Anonymous], 2020, Streamfitter
  • [5] [Anonymous], 2023, Apache openwhisk
  • [6] [Anonymous], 2022, Docker stats
  • [7] [Anonymous], 2020, K3S Platform
  • [8] [Anonymous], 2022, wannacry case study
  • [9] [Anonymous], 2020, Shuffle
  • [10] [Anonymous], 2020, Streamflow platform