Telecommunications Science ›› 2020, Vol. 36 ›› Issue (5): 73-82.doi: 10.11959/j.issn.1000-0801.2020146

• Research and Development • Previous Articles     Next Articles

A differential feedback scheduling decision algorithm based on mimic defense

Ming GAO(),Jin LUO,Huiying ZHOU,Hai JIAO,Lili YING   

  1. School of Information and Electronic Engineering,Zhejiang Gongshang University,Hangzhou 310018,China
  • Revised:2020-04-26 Online:2020-05-20 Published:2020-05-18
  • Supported by:
    The National Key Research and Development Program of China(2017YFB0803202);The Natural Science Foundation of China(61871468);Zhejiang Provincial Natural Science Foundation of China(LY18F010006);Zhejiang Provincial Key Laboratory of New Network Standards and Technologies (NNST)(2013E10012)

Abstract:

Facing the security problem of the service path, according to the service function chain deployment mimic defense architecture based on dynamic heterogeneous redundancy (DHR) model in the mimic defense theory, and combined with the actual needs of the service path deployment, a differential feedback scheduling decision algorithm based on mimic defense was proposed. Firstly, according to the heterogeneity of the executive set in the scheduling algorithm and the security defense coefficient, the scheduler suitable for the mimic defense scenario was selected from the executive pool, and then the decider was selected according to the reliability coefficient of the decision algorithm and the majority decision algorithm. The proposed algorithm, common scheduling algorithm and decision algo rithm were simulated and analyzed. Simulation results show that the proposed algorithm can effectively improve the system’s defense capabilities and ensure the security of the service path configuration.

Key words: mimic defense, scheduling algorithm, decision algorithm, network security

CLC Number: 

No Suggested Reading articles found!