Telecommunications Science ›› 2021, Vol. 37 ›› Issue (3): 57-65.doi: 10.11959/j.issn.1000-0801.2021047

• Topic: Endogenous Safety and Security • Previous Articles     Next Articles

Mimic security scheduling algorithm for industrial control under limited heterogeneous resource constraints

Ruyun ZHANG, Heyuan LI, Shunbin LI   

  1. Zhejiang Lab, Hangzhou 311121, China
  • Revised:2021-03-12 Online:2021-03-20 Published:2021-03-01
  • Supported by:
    The National Key R&D Program of China(2020YFB1804800);Opening Foundation of Zhejiang Lab(2018FD0ZX01)

Abstract:

Cyberspace mimic defense technology is an effective method to deal with backdoor attacks on unknown vulnerabilities in information systems.Its security is closely related to the number and the heterogeneity of the executors and the scheduling strategy.However, in the field of industrial control, the ecological resources of industrial application are relatively closed, and the number of realizable heterogeneous executors is limited.To solve the above problems, a mimic scheduling algorithm for industrial control under the constraints of limited heterogeneous resources was proposed.The experimental results show that the proposed algorithm for triple-redundancy mimic industrial control system was able to select a suitable executor to go online according to environmental characteristics adaptively.Even in a high-intensity attack environment, it can still maintain a high availability probability of 99.24%.

Key words: mimic defense, endogenous safety and security, resource-constrained model

CLC Number: 

No Suggested Reading articles found!