Dynamic Scheduling Algorithm in Cyber Mimic Defense Architecture of Volunteer Computing

被引:7
作者
Li, Qianmu [1 ]
Meng, Shunmei [2 ]
Sang, Xiaonan [2 ,3 ]
Zhang, Hanrui [2 ,4 ]
Wang, Shoujin [5 ]
Bashir, Ali Kashif [6 ]
Yu, Keping [7 ]
Tariq, Usman [8 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Cyber Sci & Engn, Nanjing, Peoples R China
[2] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing, Peoples R China
[3] Wuyi Univ, Intelligent Mfg Dept, Jiangmen, Peoples R China
[4] Jiangsu Zhongtian Internet Technol Co Ltd, Nantong 226963, Peoples R China
[5] Mac Univ, Dept Comp, Sydney, NSW, Australia
[6] Manchester Metropolitan Univ, Dept Comp & Math, Manchester, Lancs, England
[7] Waseda Univ, Global Informat & Telecommun Inst, Tokyo, Japan
[8] Prince Sattam Bin Abdulaziz Univ, Coll Comp Sci & Engn, Al Kharj, Saudi Arabia
基金
日本学术振兴会; 中国国家自然科学基金;
关键词
Volunteer computing; Cyber Mimic Defense; Dynamic Scheduling; Time Threshold; Task Threshold; Multi-level Queue; COMPUTATION OFFLOADING METHOD; EDGE; INTERNET;
D O I
10.1145/3408291
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Volunteer computing uses computers volunteered by the general public to do distributed scientific computing. Volunteer computing is being used in high-energy physics, molecular biology, medicine, astrophysics, climate study, and other areas. These projects have attained unprecedented computing power. However, with the development of information technology, the traditional defense system cannot deal with the unknown security problems of volunteer computing. At the same time, Cyber Mimic Defense (CMD) can defend the unknown attack behavior through its three characteristics: dynamic, heterogeneous, and redundant. As an important part of the CMD, the dynamic scheduling algorithm realizes the dynamic change of the service centralized executor, which can enusre the security and reliability of CMD of volunteer computing. Aiming at the problems of passive scheduling and large scheduling granularity existing in the existing scheduling algorithms, this article first proposes a scheduling algorithm based on time threshold and task threshold and realizes the dynamic randomness of mimic defense from two different dimensions; finally, combining time threshold and random threshold, a dynamic scheduling algorithm based on multi-level queue is proposed. The experiment shows that the dynamic scheduling algorithm based on multi-level queue can take both security and reliability into account, has better dynamic heterogeneous redundancy characteristics, and can effectively prevent the transformation rule of heterogeneous executors from being mastered by attackers.
引用
收藏
页数:33
相关论文
共 37 条
  • [1] Al-Turjman F., 2019, COMPUT COMMUN, V2019
  • [2] Optimized Unmanned Aerial Vehicles Deployment for Static and Mobile Targets' Monitoring
    Al-Turjman, Fadi
    Zahmatkesh, Hadi
    Al-Oqily, Ibrhaim
    Daboul, Reda
    [J]. COMPUTER COMMUNICATIONS, 2020, 149 (149) : 27 - 35
  • [3] Intelligence and security in big 5G-oriented IoNT: An overview
    Al-Turjman, Fadi
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 102 : 357 - 368
  • [4] Amplified locality-sensitive hashing-based recommender systems with privacy protection
    Chi, Xiaoxiao
    Yan, Chao
    Wang, Hao
    Rafique, Wajid
    Qi, Lianyong
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (14)
  • [5] A long video caption generation algorithm for big video data retrieval
    Ding, Songtao
    Qu, Shiru
    Xi, Yuling
    Wan, Shaohua
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 : 583 - 595
  • [6] Efficient and Secure Data Sharing for 5G Flying Drones: A Blockchain-Enabled Approach
    Feng, Chaosheng
    Yu, Keping
    Bashir, Ali Kashif
    Al-Otaibi, Yasser D.
    Lu, Yang
    Chen, Shengbo
    Zhang, Di
    [J]. IEEE NETWORK, 2021, 35 (01): : 130 - 137
  • [7] Adaptive Fusion and Category-Level Dictionary Learning Model for Multiview Human Action Recognition
    Gao, Zan
    Xuan, Hai-Zhen
    Zhang, Hua
    Wan, Shaohua
    Choo, Kim-Kwang Raymond
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06) : 9280 - 9293
  • [8] Privacy-Aware Multidimensional Mobile Service Quality Prediction and Recommendation in Distributed Fog Environment
    Gong, Wenwen
    Qi, Lianyong
    Xu, Yanwei
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [9] Low-cohesion differential privacy protection for industrial Internet
    Hou, Jun
    Li, Qianmu
    Cui, Shicheng
    Meng, Shunmei
    Zhang, Sainan
    Ni, Zhen
    Tian, Ye
    [J]. JOURNAL OF SUPERCOMPUTING, 2020, 76 (11) : 8450 - 8472
  • [10] An Efficient Ciphertext-Policy Weighted Attribute-Based Encryption for the Internet of Health Things
    Li, Hang
    Yu, Keping
    Liu, Bin
    Feng, Chaosheng
    Qin, Zhiguang
    Srivastava, Gautam
    [J]. IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2022, 26 (05) : 1949 - 1960