TY - JOUR
T1 - Dynamic Scheduling Algorithm in Cyber Mimic Defense Architecture of Volunteer Computing
AU - Li, Qianmu
AU - Meng, Shunmei
AU - Sang, Xiaonan
AU - Zhang, Hanrui
AU - Wang, Shoujin
AU - Bashir, Ali Kashif
AU - Yu, Keping
AU - Tariq, Usman
N1 - Funding Information:
This work is supported in part by The 4th project “Research on the Key Technology of Endogenous Security Switches” (2020YFB1804604) of the National Key R&D Program “New Network Equipment Based on Independent Programmable Chips” (2020YFB1804600), the 2020 Industrial Internet Innovation and Development Project from Ministry of Industry and Information Technology of China, Jiangsu province key research and development programs: social development project (BE2017739), 2018 Jiangsu Province Major Technical Research Project “Information Security Simulation System”, the Fundamental Research Fund for the Central Universities (30918012204, 30920041112, 30919011282), National Natural Science Foundation of China (61702264, 61761136003), the Postdoctoral Science Foundation of China (2019M651835), the 2019 Industrial Internet Innovation and Development Project from Ministry of Industry and Information Technology of China, Jiangsu Province Modern Education Technology Research Project (84365); National Vocational Education Teacher Enterprise Practice Base “Integration of Industry and Education” Special Project (Study on Evaluation Standard of Artificial Intelligence Vocational Skilled Level), and the Japan Society for the Promotion of Science (JSPS) Grants-in-Aid for Scientific Research (KAKENHI) under Grant JP18K18044 and JP21K17736.
Publisher Copyright:
© 2021 Association for Computing Machinery.
PY - 2021/8
Y1 - 2021/8
N2 - Volunteer computing uses computers volunteered by the general public to do distributed scientific computing. Volunteer computing is being used in high-energy physics, molecular biology, medicine, astrophysics, climate study, and other areas. These projects have attained unprecedented computing power. However, with the development of information technology, the traditional defense system cannot deal with the unknown security problems of volunteer computing. At the same time, Cyber Mimic Defense (CMD) can defend the unknown attack behavior through its three characteristics: dynamic, heterogeneous, and redundant. As an important part of the CMD, the dynamic scheduling algorithm realizes the dynamic change of the service centralized executor, which can enusre the security and reliability of CMD of volunteer computing. Aiming at the problems of passive scheduling and large scheduling granularity existing in the existing scheduling algorithms, this article first proposes a scheduling algorithm based on time threshold and task threshold and realizes the dynamic randomness of mimic defense from two different dimensions; finally, combining time threshold and random threshold, a dynamic scheduling algorithm based on multi-level queue is proposed. The experiment shows that the dynamic scheduling algorithm based on multi-level queue can take both security and reliability into account, has better dynamic heterogeneous redundancy characteristics, and can effectively prevent the transformation rule of heterogeneous executors from being mastered by attackers.
AB - Volunteer computing uses computers volunteered by the general public to do distributed scientific computing. Volunteer computing is being used in high-energy physics, molecular biology, medicine, astrophysics, climate study, and other areas. These projects have attained unprecedented computing power. However, with the development of information technology, the traditional defense system cannot deal with the unknown security problems of volunteer computing. At the same time, Cyber Mimic Defense (CMD) can defend the unknown attack behavior through its three characteristics: dynamic, heterogeneous, and redundant. As an important part of the CMD, the dynamic scheduling algorithm realizes the dynamic change of the service centralized executor, which can enusre the security and reliability of CMD of volunteer computing. Aiming at the problems of passive scheduling and large scheduling granularity existing in the existing scheduling algorithms, this article first proposes a scheduling algorithm based on time threshold and task threshold and realizes the dynamic randomness of mimic defense from two different dimensions; finally, combining time threshold and random threshold, a dynamic scheduling algorithm based on multi-level queue is proposed. The experiment shows that the dynamic scheduling algorithm based on multi-level queue can take both security and reliability into account, has better dynamic heterogeneous redundancy characteristics, and can effectively prevent the transformation rule of heterogeneous executors from being mastered by attackers.
KW - Cyber Mimic Defense
KW - Dynamic Scheduling
KW - Multi-level Queue
KW - Task Threshold
KW - Time Threshold
KW - Volunteer computing
UR - http://www.scopus.com/inward/record.url?scp=85114277044&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85114277044&partnerID=8YFLogxK
U2 - 10.1145/3408291
DO - 10.1145/3408291
M3 - Article
AN - SCOPUS:85114277044
SN - 1533-5399
VL - 21
JO - ACM Transactions on Internet Technology
JF - ACM Transactions on Internet Technology
IS - 3
M1 - 3408291
ER -