skip to main content
research-article

Dynamic Scheduling Algorithm in Cyber Mimic Defense Architecture of Volunteer Computing

Authors Info & Claims
Published:09 June 2021Publication History
Skip Abstract Section

Abstract

Volunteer computing uses computers volunteered by the general public to do distributed scientific computing. Volunteer computing is being used in high-energy physics, molecular biology, medicine, astrophysics, climate study, and other areas. These projects have attained unprecedented computing power. However, with the development of information technology, the traditional defense system cannot deal with the unknown security problems of volunteer computing. At the same time, Cyber Mimic Defense (CMD) can defend the unknown attack behavior through its three characteristics: dynamic, heterogeneous, and redundant. As an important part of the CMD, the dynamic scheduling algorithm realizes the dynamic change of the service centralized executor, which can enusre the security and reliability of CMD of volunteer computing. Aiming at the problems of passive scheduling and large scheduling granularity existing in the existing scheduling algorithms, this article first proposes a scheduling algorithm based on time threshold and task threshold and realizes the dynamic randomness of mimic defense from two different dimensions; finally, combining time threshold and random threshold, a dynamic scheduling algorithm based on multi-level queue is proposed. The experiment shows that the dynamic scheduling algorithm based on multi-level queue can take both security and reliability into account, has better dynamic heterogeneous redundancy characteristics, and can effectively prevent the transformation rule of heterogeneous executors from being mastered by attackers.

References

  1. J. Wu. 2014. Meaning and vision of mimic computing and mimic security defense. Telecommun. Sci. 30, 7 (2014), 2–7.Google ScholarGoogle Scholar
  2. L. Qi, X. Zhang, W. Dou, et al. 2017. A distributed locality-sensitive hashing-based approach for cloud service recommendation from multi-source data. IEEE J. Select. Areas Commun. 35, 11 (2017), 2616–2624.Google ScholarGoogle ScholarCross RefCross Ref
  3. S. Wang, L. Hu, Y. Wang, et al. 2021. Graph learning based recommender systems: A review. In Proceedings of the 30th International Joint Conference on Artificial Intelligence. 1–9.Google ScholarGoogle Scholar
  4. F. Al-Turjman. 2020. Intelligence and security in big 5G-oriented IoNT: An overview. Fut. Gener. Comput. Syst. 102, (2020), 357–368.Google ScholarGoogle Scholar
  5. Q. Li, S. Meng, S. Wang, et al. 2019. CAD: Command-level anomaly detection for vehicle-road collaborative charging network. IEEE Access 7, (2019), 34910–34924.Google ScholarGoogle Scholar
  6. W. Gong, L. Qi, and Y. Xu. 2018. Privacy-aware multidimensional mobile service quality prediction and recommendation in distributed fog environment. Wireless Commun. Mobile Comput. (2018), Article ID 3075849, 8.Google ScholarGoogle Scholar
  7. X. Chi, C. Yan, H. Wang, et al. 2020. Amplified LSH-based recommender systems with privacy protection. Concurr. Comput.: Pract. Exper. (2020). DOI:10.1002/CPE.5681Google ScholarGoogle Scholar
  8. Q. Li, S. Meng, S. Zhang, et al. 2019. Complex attack linkage decision-making in edge computing networks. IEEE Access 7 (2019), 12058–12072.Google ScholarGoogle ScholarCross RefCross Ref
  9. F. Al-Turjman, H. Zahmatkesh, I. Al-Oqily, et al. 2020. Optimized unmanned aerial vehicles deployment for static and mobile targets’ monitoring. Comput. Commun. 149 (2020), 27–35.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. X. Xu, C. He, Z. Xu, et al. 2019. Joint optimization of offloading utility and privacy for edge computing enabled IoT. IEEE IoT J. (2019). DOI:10.1109/JIOT.2019.2944007Google ScholarGoogle Scholar
  11. C. Feng, K. Yu, A. K. Bashir, et al. 2021. Efficient and secure data sharing for 5G flying drones: a blockchain-enabled approach. IEEE Network 35, 1 (2021), 130–137.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. X. Xu, Q. Liu, Y. Luo, et al. 2019. A computation offloading method over big data for IoT-enabled cloud-edge computing. Fut. Gener. Comput. Syst. 95 (2019), 522–533.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Q. Li, Y. Wang, Z. Pu, et al. 2019. Time series association state analysis method for attacks on the smart internet of electric vehicle charging network. Transport. Res. Rec. 2673, 4 (2019), 217–228.Google ScholarGoogle ScholarCross RefCross Ref
  14. X. Xu, Y. Li, T. Huang, et al. 2019. An energy-aware computation offloading method for smart edge computing in wireless metropolitan area networks. J. Netw. Comput. Appl. 133 (2019), 75–85.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. Wan, Y. Zhao, T. Wang, et al. 2019. Multi-dimensional data indexing and range query processing via Voronoi diagram for internet of things. Fut. Gener. Comput. Syst. 91 (2019), 382–391.Google ScholarGoogle ScholarCross RefCross Ref
  16. H. Li, K. Yu, B. Liu, et al. 2021. An Efficient ciphertext-policy weighted attribute-based encryption for the internet of health things. IEEE Journal of Biomedical and Health Informatics. DOI:10.1109/JBHI.2021.3075995Google ScholarGoogle Scholar
  17. X. Xu, Y. Xue, L. Qi, et al. 2019. An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles. Fut. Gener. Comput. Syst. 96 (2019), 89–100.Google ScholarGoogle ScholarCross RefCross Ref
  18. Z. Gao, H. Z. Xuan, H. Zhang, et al. 2019. Adaptive fusion and category-level dictionary learning model for multiview human action recognition. IEEE IoT J. 6, 6 (2019), 9280–9293.Google ScholarGoogle Scholar
  19. L. Qi, W. Dou, W. Wang, et al. 2018. Dynamic mobile crowdsourcing selection for electricity load forecasting. IEEE Access 6 (2018), 46926–46937.Google ScholarGoogle ScholarCross RefCross Ref
  20. S. Wan, Z. Gu, and Q. Ni. 2020. Cognitive computing and wireless communications on the edge for healthcare service robots. Comput. Commun. 149 (2020), 99–106.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. S. Ding, S. Qu, Y. Xi, and S. Wan. 2019. A long video caption generation algorithm for big video data retrieval. Fut. Gener. Comput. Syst. 93 (2019), 583–595.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. S. Wan and S. Goudos. 2020. Faster R-CNN for multi-class fruit detection using a robotic vision system. Comput. Netw. 168 (2020), 107036.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. F. Al-Turjman, M. H. Nawaz, and U. D. Ulusar. 2019. Intelligence in the internet of medical things era: A systematic review of current and future trends. Comput. Commun. 2019.Google ScholarGoogle Scholar
  24. C. Xue, C. Lin, and J. Hu. 2019. Scalability analysis of request scheduling in cloud computing. Tsingh. Sci. Technol. 24, 3 (2019), 249–261.Google ScholarGoogle ScholarCross RefCross Ref
  25. L. Tan, H. Xiao, K. Yu, et al. 2021. A Blockchain-empowered Crowdsourcing System for 5G-enabled Smart Cities. Computer Standards & Interfaces 76 (2021), 103517.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. L. Liu, X. Chen, Z. Lu, et al. 2019. Mobile-edge computing framework with data compression for wireless network in energy internet. Tsingh. Sci. Technol. 24, 3 (2019), 271–280.Google ScholarGoogle ScholarCross RefCross Ref
  27. L. Qi, W. Dou, Y. Zhou, et al. 2015. A context-aware service evaluation approach over big data for cloud applications. IEEE Trans. Cloud Comput. (2015).Google ScholarGoogle Scholar
  28. J. Wu. 2016. Research on cyber mimic defense. J. Cyber Secur. 1, 4 (2016), 1–10.Google ScholarGoogle Scholar
  29. S. Ramasubramanian. 1985. A characterisation of the normal distribution. Ann. Inst. Stat. Math. 47, 3 (1985), 410–414.Google ScholarGoogle Scholar
  30. G. Marsaglia and W. W. Tsang. 2000. The ziggurat method for generating random variables. J. Stat. Softw. 5, 8 (2000), 1–7.Google ScholarGoogle ScholarCross RefCross Ref
  31. A. Younis, Y. K. Malaiya, and I. Ray. 2016. Evaluating CVSS base score using vulnerability rewards programs. In Proceedings of the IFIP International Information Security and Privacy Protection. Springer International Publishing, 62–75. DOI:https://doi.org/10.1007/978-3-319-33630-5_5Google ScholarGoogle Scholar
  32. S. Wang and L. Cao. 2020. Inferring implicit rules by learning explicit and hidden item dependency. IEEE Trans. Syst. Man Cybernet.: Syst. 50, 3 (2020), 935–946.Google ScholarGoogle ScholarCross RefCross Ref
  33. K. Wu, X. Z. Zhou, J. Y. Wang, et al. 2010. A concept semantic similarity algorithm based on bayesian estimation. J. Chin. Inf. Process. 24, 2 (2010), 52–57.Google ScholarGoogle Scholar
  34. S. Zhang, F. Xiao, J. Xu, and J. Li. 2015. Determination of aviation spare parts failure rate based on similarity system theory and bayesian theory. Electr. Opt. Contr. 22, 4 (2015), 83–87Google ScholarGoogle Scholar
  35. J. Hou, Q. Li, S. Cui, et al. 2020. Low-cohesion differential privacy protection for industrial internet. J. Supercomput. (2020), 1–23.Google ScholarGoogle Scholar
  36. Q. Li, J. Hou, S. Meng, et al. 2020. GLIDE: A game theory and data-driven mimicking linkage intrusion detection for edge computing networks. Complexity (2020), Article ID 7136160, 18 pages. https://doi.org/10.1155/2020/7136160Google ScholarGoogle Scholar
  37. S. Wang, L. Hu, Y. Wang, et al. 2019. Modeling multi-purpose sessions for next-item recommendations via mixture-channel purpose routing networks. In Proceedings of the 28th International Joint Conference on Artificial Intelligence. 3771–3777 Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Dynamic Scheduling Algorithm in Cyber Mimic Defense Architecture of Volunteer Computing

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!