Abstract
Volunteer computing uses computers volunteered by the general public to do distributed scientific computing. Volunteer computing is being used in high-energy physics, molecular biology, medicine, astrophysics, climate study, and other areas. These projects have attained unprecedented computing power. However, with the development of information technology, the traditional defense system cannot deal with the unknown security problems of volunteer computing. At the same time, Cyber Mimic Defense (CMD) can defend the unknown attack behavior through its three characteristics: dynamic, heterogeneous, and redundant. As an important part of the CMD, the dynamic scheduling algorithm realizes the dynamic change of the service centralized executor, which can enusre the security and reliability of CMD of volunteer computing. Aiming at the problems of passive scheduling and large scheduling granularity existing in the existing scheduling algorithms, this article first proposes a scheduling algorithm based on time threshold and task threshold and realizes the dynamic randomness of mimic defense from two different dimensions; finally, combining time threshold and random threshold, a dynamic scheduling algorithm based on multi-level queue is proposed. The experiment shows that the dynamic scheduling algorithm based on multi-level queue can take both security and reliability into account, has better dynamic heterogeneous redundancy characteristics, and can effectively prevent the transformation rule of heterogeneous executors from being mastered by attackers.
- J. Wu. 2014. Meaning and vision of mimic computing and mimic security defense. Telecommun. Sci. 30, 7 (2014), 2–7.Google Scholar
- L. Qi, X. Zhang, W. Dou, et al. 2017. A distributed locality-sensitive hashing-based approach for cloud service recommendation from multi-source data. IEEE J. Select. Areas Commun. 35, 11 (2017), 2616–2624.Google Scholar
Cross Ref
- S. Wang, L. Hu, Y. Wang, et al. 2021. Graph learning based recommender systems: A review. In Proceedings of the 30th International Joint Conference on Artificial Intelligence. 1–9.Google Scholar
- F. Al-Turjman. 2020. Intelligence and security in big 5G-oriented IoNT: An overview. Fut. Gener. Comput. Syst. 102, (2020), 357–368.Google Scholar
- Q. Li, S. Meng, S. Wang, et al. 2019. CAD: Command-level anomaly detection for vehicle-road collaborative charging network. IEEE Access 7, (2019), 34910–34924.Google Scholar
- W. Gong, L. Qi, and Y. Xu. 2018. Privacy-aware multidimensional mobile service quality prediction and recommendation in distributed fog environment. Wireless Commun. Mobile Comput. (2018), Article ID 3075849, 8.Google Scholar
- X. Chi, C. Yan, H. Wang, et al. 2020. Amplified LSH-based recommender systems with privacy protection. Concurr. Comput.: Pract. Exper. (2020). DOI:10.1002/CPE.5681Google Scholar
- Q. Li, S. Meng, S. Zhang, et al. 2019. Complex attack linkage decision-making in edge computing networks. IEEE Access 7 (2019), 12058–12072.Google Scholar
Cross Ref
- F. Al-Turjman, H. Zahmatkesh, I. Al-Oqily, et al. 2020. Optimized unmanned aerial vehicles deployment for static and mobile targets’ monitoring. Comput. Commun. 149 (2020), 27–35.Google Scholar
Digital Library
- X. Xu, C. He, Z. Xu, et al. 2019. Joint optimization of offloading utility and privacy for edge computing enabled IoT. IEEE IoT J. (2019). DOI:10.1109/JIOT.2019.2944007Google Scholar
- C. Feng, K. Yu, A. K. Bashir, et al. 2021. Efficient and secure data sharing for 5G flying drones: a blockchain-enabled approach. IEEE Network 35, 1 (2021), 130–137.Google Scholar
Digital Library
- X. Xu, Q. Liu, Y. Luo, et al. 2019. A computation offloading method over big data for IoT-enabled cloud-edge computing. Fut. Gener. Comput. Syst. 95 (2019), 522–533.Google Scholar
Digital Library
- Q. Li, Y. Wang, Z. Pu, et al. 2019. Time series association state analysis method for attacks on the smart internet of electric vehicle charging network. Transport. Res. Rec. 2673, 4 (2019), 217–228.Google Scholar
Cross Ref
- X. Xu, Y. Li, T. Huang, et al. 2019. An energy-aware computation offloading method for smart edge computing in wireless metropolitan area networks. J. Netw. Comput. Appl. 133 (2019), 75–85.Google Scholar
Digital Library
- S. Wan, Y. Zhao, T. Wang, et al. 2019. Multi-dimensional data indexing and range query processing via Voronoi diagram for internet of things. Fut. Gener. Comput. Syst. 91 (2019), 382–391.Google Scholar
Cross Ref
- H. Li, K. Yu, B. Liu, et al. 2021. An Efficient ciphertext-policy weighted attribute-based encryption for the internet of health things. IEEE Journal of Biomedical and Health Informatics. DOI:10.1109/JBHI.2021.3075995Google Scholar
- X. Xu, Y. Xue, L. Qi, et al. 2019. An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles. Fut. Gener. Comput. Syst. 96 (2019), 89–100.Google Scholar
Cross Ref
- Z. Gao, H. Z. Xuan, H. Zhang, et al. 2019. Adaptive fusion and category-level dictionary learning model for multiview human action recognition. IEEE IoT J. 6, 6 (2019), 9280–9293.Google Scholar
- L. Qi, W. Dou, W. Wang, et al. 2018. Dynamic mobile crowdsourcing selection for electricity load forecasting. IEEE Access 6 (2018), 46926–46937.Google Scholar
Cross Ref
- S. Wan, Z. Gu, and Q. Ni. 2020. Cognitive computing and wireless communications on the edge for healthcare service robots. Comput. Commun. 149 (2020), 99–106.Google Scholar
Digital Library
- S. Ding, S. Qu, Y. Xi, and S. Wan. 2019. A long video caption generation algorithm for big video data retrieval. Fut. Gener. Comput. Syst. 93 (2019), 583–595.Google Scholar
Digital Library
- S. Wan and S. Goudos. 2020. Faster R-CNN for multi-class fruit detection using a robotic vision system. Comput. Netw. 168 (2020), 107036.Google Scholar
Digital Library
- F. Al-Turjman, M. H. Nawaz, and U. D. Ulusar. 2019. Intelligence in the internet of medical things era: A systematic review of current and future trends. Comput. Commun. 2019.Google Scholar
- C. Xue, C. Lin, and J. Hu. 2019. Scalability analysis of request scheduling in cloud computing. Tsingh. Sci. Technol. 24, 3 (2019), 249–261.Google Scholar
Cross Ref
- L. Tan, H. Xiao, K. Yu, et al. 2021. A Blockchain-empowered Crowdsourcing System for 5G-enabled Smart Cities. Computer Standards & Interfaces 76 (2021), 103517.Google Scholar
Digital Library
- L. Liu, X. Chen, Z. Lu, et al. 2019. Mobile-edge computing framework with data compression for wireless network in energy internet. Tsingh. Sci. Technol. 24, 3 (2019), 271–280.Google Scholar
Cross Ref
- L. Qi, W. Dou, Y. Zhou, et al. 2015. A context-aware service evaluation approach over big data for cloud applications. IEEE Trans. Cloud Comput. (2015).Google Scholar
- J. Wu. 2016. Research on cyber mimic defense. J. Cyber Secur. 1, 4 (2016), 1–10.Google Scholar
- S. Ramasubramanian. 1985. A characterisation of the normal distribution. Ann. Inst. Stat. Math. 47, 3 (1985), 410–414.Google Scholar
- G. Marsaglia and W. W. Tsang. 2000. The ziggurat method for generating random variables. J. Stat. Softw. 5, 8 (2000), 1–7.Google Scholar
Cross Ref
- A. Younis, Y. K. Malaiya, and I. Ray. 2016. Evaluating CVSS base score using vulnerability rewards programs. In Proceedings of the IFIP International Information Security and Privacy Protection. Springer International Publishing, 62–75. DOI:https://doi.org/10.1007/978-3-319-33630-5_5Google Scholar
- S. Wang and L. Cao. 2020. Inferring implicit rules by learning explicit and hidden item dependency. IEEE Trans. Syst. Man Cybernet.: Syst. 50, 3 (2020), 935–946.Google Scholar
Cross Ref
- K. Wu, X. Z. Zhou, J. Y. Wang, et al. 2010. A concept semantic similarity algorithm based on bayesian estimation. J. Chin. Inf. Process. 24, 2 (2010), 52–57.Google Scholar
- S. Zhang, F. Xiao, J. Xu, and J. Li. 2015. Determination of aviation spare parts failure rate based on similarity system theory and bayesian theory. Electr. Opt. Contr. 22, 4 (2015), 83–87Google Scholar
- J. Hou, Q. Li, S. Cui, et al. 2020. Low-cohesion differential privacy protection for industrial internet. J. Supercomput. (2020), 1–23.Google Scholar
- Q. Li, J. Hou, S. Meng, et al. 2020. GLIDE: A game theory and data-driven mimicking linkage intrusion detection for edge computing networks. Complexity (2020), Article ID 7136160, 18 pages. https://doi.org/10.1155/2020/7136160Google Scholar
- S. Wang, L. Hu, Y. Wang, et al. 2019. Modeling multi-purpose sessions for next-item recommendations via mixture-channel purpose routing networks. In Proceedings of the 28th International Joint Conference on Artificial Intelligence. 3771–3777 Google Scholar
Digital Library
Index Terms
Dynamic Scheduling Algorithm in Cyber Mimic Defense Architecture of Volunteer Computing
Recommendations
Mimic defense: a designed‐in cybersecurity defense framework
In recent years, both academia and industry in cyber security have tried to develop innovative defense technologies, expecting that to change the rules of the game between attackers and defenders. The authors start by analysing the root causes of security ...
Collusion-Resistant Sabotage-Tolerance Mechanisms for Volunteer Computing Systems
ICEBE '09: Proceedings of the 2009 IEEE International Conference on e-Business EngineeringThis paper presents a proposal of a collusion-resistant sabotage-tolerance mechanism against malicious sabotage attempts in volunteer computing (VC) systems. While VC systems reach the most powerful computing platforms, they are vulnerable to mischief ...
A GEP-based reactive scheduling policies constructing approach for dynamic flexible job shop scheduling problem with job release dates
Flexible job shop scheduling problem (FJSSP) is generalization of job shop scheduling problem (JSSP), in which an operation may be processed on more than one machine each of which has the same function. Most previous researches on FJSSP assumed that all ...






Comments