当前位置: X-MOL 学术ACM Trans. Internet Technol. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Dynamic Scheduling Algorithm in Cyber Mimic Defense Architecture of Volunteer Computing
ACM Transactions on Internet Technology ( IF 5.3 ) Pub Date : 2021-06-09 , DOI: 10.1145/3408291
Qianmu Li 1 , Shunmei Meng 1 , Xiaonan Sang 2 , Hanrui Zhang 3 , Shoujin Wang 4 , Ali Kashif Bashir 5 , Keping Yu 6 , Usman Tariq 7
Affiliation  

Volunteer computing uses computers volunteered by the general public to do distributed scientific computing. Volunteer computing is being used in high-energy physics, molecular biology, medicine, astrophysics, climate study, and other areas. These projects have attained unprecedented computing power. However, with the development of information technology, the traditional defense system cannot deal with the unknown security problems of volunteer computing . At the same time, Cyber Mimic Defense (CMD) can defend the unknown attack behavior through its three characteristics: dynamic, heterogeneous, and redundant. As an important part of the CMD, the dynamic scheduling algorithm realizes the dynamic change of the service centralized executor, which can enusre the security and reliability of CMD of volunteer computing . Aiming at the problems of passive scheduling and large scheduling granularity existing in the existing scheduling algorithms, this article first proposes a scheduling algorithm based on time threshold and task threshold and realizes the dynamic randomness of mimic defense from two different dimensions; finally, combining time threshold and random threshold, a dynamic scheduling algorithm based on multi-level queue is proposed. The experiment shows that the dynamic scheduling algorithm based on multi-level queue can take both security and reliability into account, has better dynamic heterogeneous redundancy characteristics, and can effectively prevent the transformation rule of heterogeneous executors from being mastered by attackers.

中文翻译:

志愿计算赛博模拟防御架构中的动态调度算法

志愿计算使用公众自愿提供的计算机进行分布式科学计算。志愿计算被应用于高能物理、分子生物学、医学、天体物理学、气候研究等领域。这些项目获得了前所未有的计算能力。然而,随着信息技术的发展,传统的防御系统已经无法应对未知的安全问题。志愿计算. 同时,Cyber​​ Mimic Defense(CMD)可以通过其动态、异构和冗余三个特性来防御未知的攻击行为。动态调度算法作为CMD的重要组成部分,实现了服务集中执行器的动态变化,可以保证CMD的安全可靠。志愿计算. 针对现有调度算法存在的被动调度和调度粒度大的问题,本文首先提出一种基于时间阈值和任务阈值的调度算法,从两个不同维度实现拟态防御的动态随机性;最后,结合时间阈值和随机阈值,提出了一种基于多级队列的动态调度算法。实验表明,基于多级队列的动态调度算法能够兼顾安全性和可靠性,具有较好的动态异构冗余特性,可以有效防止异构执行器的变换规则被攻击者掌握。
更新日期:2021-06-09
down
wechat
bug