Conditional Probability Voting Algorithm Based on Heterogeneity of Mimic Defense System

被引:3
作者
Wei, Shuai [1 ]
Zhang, Huihua [2 ]
Zhang, Wenjian [1 ]
Yu, Hong [1 ]
机构
[1] PLA Strateg Support Force Informat Engn Univ, Zhengzhou 450000, Peoples R China
[2] Wuxi Xinwu Confidential Technol Serv Ctr, Wuxi 214131, Jiangsu, Peoples R China
关键词
Computer architecture; Security; Indexes; Scalability; Software; Linux; Hardware; Condition probability voting algorithm; heterogeneous redundant variants; mimic defense architecture; system failure probability; scalability; SECURITY;
D O I
10.1109/ACCESS.2020.3031323
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years network attacks have been increasing rapidly, and it is difficult to defend against these attacks, especially attacks at unknown vulnerabilities or backdoors. As a novel method, Mimic defense architecture has been proposed to solve these cyberspace security problems by using heterogeneous redundant variants to perform the same task. How to choose appropriate variants and voting algorithm according to heterogeneities of these variants become the key issue of designing mimic defense architecture. Most of current researches are based on the 2-level similarity of variants, but the results are not accurate enough. This article presents an attack model based on mimic defense architecture, abstracts binary division vector and relevant indexes to describe the heterogeneity of these variants, and innovatively proposes conditional probability voting algorithm, which is different from classic majority voting algorithm. This article also analyzes the system failure probability and scalability of these voting algorithms, experiment results show that conditional probability voting algorithm is the best, both in system failure probability and scalability.
引用
收藏
页码:188760 / 188770
页数:11
相关论文
共 29 条
[1]  
Berger ED, 2006, ACM SIGPLAN NOTICES, V41, P158, DOI 10.1145/1133981.1134000
[2]   On the General Applicability of Instruction-Set Randomization [J].
Boyd, Stephen W. ;
Kc, Gaurav S. ;
Locasto, Michael E. ;
Keromytis, Angelos D. ;
Prevelakis, Vassilis .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2010, 7 (03) :255-270
[3]   Cancer incidence and mortality in China, 2014 [J].
Chen, Wanqing ;
Sun, Kexin ;
Zheng, Rongshou ;
Zeng, Hongmei ;
Zhang, Siwei ;
Xia, Changfa ;
Yang, Zhixun ;
Li, He ;
Zou, Xiaonong ;
He, Jie .
CHINESE JOURNAL OF CANCER RESEARCH, 2018, 30 (01) :1-12
[4]  
Geer D., 2003, TECH REP
[5]   Assessing the Effectiveness of Moving Target Defenses Using Security Models [J].
Hong, Jin B. ;
Kim, Dong Seong .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (02) :163-177
[6]   Mimic defense: a designed-in cybersecurity defense framework [J].
Hu, Hongchao ;
Wu, Jiangxing ;
Wang, Zhenpeng ;
Cheng, Guozhen .
IET INFORMATION SECURITY, 2018, 12 (03) :226-237
[7]   Majority Voting: Material Classification by Tactile Sensing Using Surface Texture [J].
Jamali, Nawid ;
Sammut, Claude .
IEEE TRANSACTIONS ON ROBOTICS, 2011, 27 (03) :508-521
[8]   Defeating Denial-of-Service Attacks in a Self-Managing N-Variant System [J].
Jones, Jessica ;
Hiser, Jason D. ;
Davidson, Jack W. ;
Forrest, Stephanie .
2019 IEEE/ACM 14TH INTERNATIONAL SYMPOSIUM ON SOFTWARE ENGINEERING FOR ADAPTIVE AND SELF-MANAGING SYSTEMS (SEAMS 2019), 2019, :126-138
[9]   Stuxnet: Dissecting a Cyberwarfare Weapon [J].
Langner, Ralph .
IEEE SECURITY & PRIVACY, 2011, 9 (03) :49-51
[10]   Co-Residence Data Theft Attacks on N-Version Programming-Based Cloud Services With Task Cancelation [J].
Levitin, Gregory ;
Xing, Liudong ;
Xiang, Yanping .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 52 (01) :324-333