Journal on Communications ›› 2021, Vol. 42 ›› Issue (5): 179-190.doi: 10.11959/j.issn.1000-436x.2021072

• Comprehensive Reviews • Previous Articles     Next Articles

Research progress of mimic multi-execution scheduling algorithm

Zhengbin ZHU, Qinrang LIU, Dongpei LIU, Chong WANG   

  1. Institute of Information Technology, Information Engineering University, Zhengzhou 450002, China
  • Revised:2021-03-17 Online:2021-05-25 Published:2021-05-01
  • Supported by:
    The National Nuclear Foundation Major Special Fund(2017ZX01030301)

Abstract:

Mimic defense is the new active defense technology based on the dynamic heterogeneous redundant architecture.With inherent uncertainty, heterogeneous, redundant and negative feedback features, it can significantly improve the robustness and security of system.Among them, the scheduling algorithm is the key to mimic defense technology, which advantages and disadvantages directly affect the ability of system to resist attacks based on known or unknown vulnerabilities.Based on this, the principle and goal of mimic scheduling algorithm were firstly introduced.Then the state-of-the-art of mimic scheduling algorithms were analyzed and summarized from three aspects, such as scheduling object, scheduling quantity and scheduling timing.Finally, the future research direction and trend of mimic scheduling algorithms were prospected.

Key words: mimic defense, active defense, mimic scheduling, dynamic heterogeneous redundant

CLC Number: 

No Suggested Reading articles found!