Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Dynamic Scheduling Algorithm in Cyber Mimic Defense Architecture of Volunteer Computing

Published: 09 June 2021 Publication History

Abstract

Volunteer computing uses computers volunteered by the general public to do distributed scientific computing. Volunteer computing is being used in high-energy physics, molecular biology, medicine, astrophysics, climate study, and other areas. These projects have attained unprecedented computing power. However, with the development of information technology, the traditional defense system cannot deal with the unknown security problems of volunteer computing. At the same time, Cyber Mimic Defense (CMD) can defend the unknown attack behavior through its three characteristics: dynamic, heterogeneous, and redundant. As an important part of the CMD, the dynamic scheduling algorithm realizes the dynamic change of the service centralized executor, which can enusre the security and reliability of CMD of volunteer computing. Aiming at the problems of passive scheduling and large scheduling granularity existing in the existing scheduling algorithms, this article first proposes a scheduling algorithm based on time threshold and task threshold and realizes the dynamic randomness of mimic defense from two different dimensions; finally, combining time threshold and random threshold, a dynamic scheduling algorithm based on multi-level queue is proposed. The experiment shows that the dynamic scheduling algorithm based on multi-level queue can take both security and reliability into account, has better dynamic heterogeneous redundancy characteristics, and can effectively prevent the transformation rule of heterogeneous executors from being mastered by attackers.

References

[1]
J. Wu. 2014. Meaning and vision of mimic computing and mimic security defense. Telecommun. Sci. 30, 7 (2014), 2–7.
[2]
L. Qi, X. Zhang, W. Dou, et al. 2017. A distributed locality-sensitive hashing-based approach for cloud service recommendation from multi-source data. IEEE J. Select. Areas Commun. 35, 11 (2017), 2616–2624.
[3]
S. Wang, L. Hu, Y. Wang, et al. 2021. Graph learning based recommender systems: A review. In Proceedings of the 30th International Joint Conference on Artificial Intelligence. 1–9.
[4]
F. Al-Turjman. 2020. Intelligence and security in big 5G-oriented IoNT: An overview. Fut. Gener. Comput. Syst. 102, (2020), 357–368.
[5]
Q. Li, S. Meng, S. Wang, et al. 2019. CAD: Command-level anomaly detection for vehicle-road collaborative charging network. IEEE Access 7, (2019), 34910–34924.
[6]
W. Gong, L. Qi, and Y. Xu. 2018. Privacy-aware multidimensional mobile service quality prediction and recommendation in distributed fog environment. Wireless Commun. Mobile Comput. (2018), Article ID 3075849, 8.
[7]
X. Chi, C. Yan, H. Wang, et al. 2020. Amplified LSH-based recommender systems with privacy protection. Concurr. Comput.: Pract. Exper. (2020).
[8]
Q. Li, S. Meng, S. Zhang, et al. 2019. Complex attack linkage decision-making in edge computing networks. IEEE Access 7 (2019), 12058–12072.
[9]
F. Al-Turjman, H. Zahmatkesh, I. Al-Oqily, et al. 2020. Optimized unmanned aerial vehicles deployment for static and mobile targets’ monitoring. Comput. Commun. 149 (2020), 27–35.
[10]
X. Xu, C. He, Z. Xu, et al. 2019. Joint optimization of offloading utility and privacy for edge computing enabled IoT. IEEE IoT J. (2019).
[11]
C. Feng, K. Yu, A. K. Bashir, et al. 2021. Efficient and secure data sharing for 5G flying drones: a blockchain-enabled approach. IEEE Network 35, 1 (2021), 130–137.
[12]
X. Xu, Q. Liu, Y. Luo, et al. 2019. A computation offloading method over big data for IoT-enabled cloud-edge computing. Fut. Gener. Comput. Syst. 95 (2019), 522–533.
[13]
Q. Li, Y. Wang, Z. Pu, et al. 2019. Time series association state analysis method for attacks on the smart internet of electric vehicle charging network. Transport. Res. Rec. 2673, 4 (2019), 217–228.
[14]
X. Xu, Y. Li, T. Huang, et al. 2019. An energy-aware computation offloading method for smart edge computing in wireless metropolitan area networks. J. Netw. Comput. Appl. 133 (2019), 75–85.
[15]
S. Wan, Y. Zhao, T. Wang, et al. 2019. Multi-dimensional data indexing and range query processing via Voronoi diagram for internet of things. Fut. Gener. Comput. Syst. 91 (2019), 382–391.
[16]
H. Li, K. Yu, B. Liu, et al. 2021. An Efficient ciphertext-policy weighted attribute-based encryption for the internet of health things. IEEE Journal of Biomedical and Health Informatics.
[17]
X. Xu, Y. Xue, L. Qi, et al. 2019. An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles. Fut. Gener. Comput. Syst. 96 (2019), 89–100.
[18]
Z. Gao, H. Z. Xuan, H. Zhang, et al. 2019. Adaptive fusion and category-level dictionary learning model for multiview human action recognition. IEEE IoT J. 6, 6 (2019), 9280–9293.
[19]
L. Qi, W. Dou, W. Wang, et al. 2018. Dynamic mobile crowdsourcing selection for electricity load forecasting. IEEE Access 6 (2018), 46926–46937.
[20]
S. Wan, Z. Gu, and Q. Ni. 2020. Cognitive computing and wireless communications on the edge for healthcare service robots. Comput. Commun. 149 (2020), 99–106.
[21]
S. Ding, S. Qu, Y. Xi, and S. Wan. 2019. A long video caption generation algorithm for big video data retrieval. Fut. Gener. Comput. Syst. 93 (2019), 583–595.
[22]
S. Wan and S. Goudos. 2020. Faster R-CNN for multi-class fruit detection using a robotic vision system. Comput. Netw. 168 (2020), 107036.
[23]
F. Al-Turjman, M. H. Nawaz, and U. D. Ulusar. 2019. Intelligence in the internet of medical things era: A systematic review of current and future trends. Comput. Commun. 2019.
[24]
C. Xue, C. Lin, and J. Hu. 2019. Scalability analysis of request scheduling in cloud computing. Tsingh. Sci. Technol. 24, 3 (2019), 249–261.
[25]
L. Tan, H. Xiao, K. Yu, et al. 2021. A Blockchain-empowered Crowdsourcing System for 5G-enabled Smart Cities. Computer Standards & Interfaces 76 (2021), 103517.
[26]
L. Liu, X. Chen, Z. Lu, et al. 2019. Mobile-edge computing framework with data compression for wireless network in energy internet. Tsingh. Sci. Technol. 24, 3 (2019), 271–280.
[27]
L. Qi, W. Dou, Y. Zhou, et al. 2015. A context-aware service evaluation approach over big data for cloud applications. IEEE Trans. Cloud Comput. (2015).
[28]
J. Wu. 2016. Research on cyber mimic defense. J. Cyber Secur. 1, 4 (2016), 1–10.
[29]
S. Ramasubramanian. 1985. A characterisation of the normal distribution. Ann. Inst. Stat. Math. 47, 3 (1985), 410–414.
[30]
G. Marsaglia and W. W. Tsang. 2000. The ziggurat method for generating random variables. J. Stat. Softw. 5, 8 (2000), 1–7.
[31]
A. Younis, Y. K. Malaiya, and I. Ray. 2016. Evaluating CVSS base score using vulnerability rewards programs. In Proceedings of the IFIP International Information Security and Privacy Protection. Springer International Publishing, 62–75.
[32]
S. Wang and L. Cao. 2020. Inferring implicit rules by learning explicit and hidden item dependency. IEEE Trans. Syst. Man Cybernet.: Syst. 50, 3 (2020), 935–946.
[33]
K. Wu, X. Z. Zhou, J. Y. Wang, et al. 2010. A concept semantic similarity algorithm based on bayesian estimation. J. Chin. Inf. Process. 24, 2 (2010), 52–57.
[34]
S. Zhang, F. Xiao, J. Xu, and J. Li. 2015. Determination of aviation spare parts failure rate based on similarity system theory and bayesian theory. Electr. Opt. Contr. 22, 4 (2015), 83–87
[35]
J. Hou, Q. Li, S. Cui, et al. 2020. Low-cohesion differential privacy protection for industrial internet. J. Supercomput. (2020), 1–23.
[36]
Q. Li, J. Hou, S. Meng, et al. 2020. GLIDE: A game theory and data-driven mimicking linkage intrusion detection for edge computing networks. Complexity (2020), Article ID 7136160, 18 pages. https://doi.org/10.1155/2020/7136160
[37]
S. Wang, L. Hu, Y. Wang, et al. 2019. Modeling multi-purpose sessions for next-item recommendations via mixture-channel purpose routing networks. In Proceedings of the 28th International Joint Conference on Artificial Intelligence. 3771–3777

Cited By

View all
  • (2024)Performance Evaluation of Clinical Models on Sequential Clinical Text for AI Powered Medical Applications2024 IEEE International Conference on Contemporary Computing and Communications (InC4)10.1109/InC460750.2024.10649316(1-4)Online publication date: 15-Mar-2024
  • (2024)CS-Net: A Stain Style Transfer Network for Histology Images with CS-Gate AttentionArtificial Intelligence and Robotics10.1007/978-981-99-9109-9_3(19-32)Online publication date: 4-Jan-2024
  • (2023)Wearable sensors and features for diagnosis of neurodegenerative diseases: A systematic reviewDIGITAL HEALTH10.1177/205520762311735699(205520762311735)Online publication date: 16-May-2023
  • Show More Cited By

Index Terms

  1. Dynamic Scheduling Algorithm in Cyber Mimic Defense Architecture of Volunteer Computing

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Internet Technology
    ACM Transactions on Internet Technology  Volume 21, Issue 3
    August 2021
    522 pages
    ISSN:1533-5399
    EISSN:1557-6051
    DOI:10.1145/3468071
    • Editor:
    • Ling Liu
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 09 June 2021
    Accepted: 01 June 2020
    Revised: 01 June 2020
    Received: 01 May 2020
    Published in TOIT Volume 21, Issue 3

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Volunteer computing
    2. Cyber Mimic Defense
    3. Dynamic Scheduling
    4. Time Threshold
    5. Task Threshold
    6. Multi-level Queue

    Qualifiers

    • Research-article
    • Refereed

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)24
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 02 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Performance Evaluation of Clinical Models on Sequential Clinical Text for AI Powered Medical Applications2024 IEEE International Conference on Contemporary Computing and Communications (InC4)10.1109/InC460750.2024.10649316(1-4)Online publication date: 15-Mar-2024
    • (2024)CS-Net: A Stain Style Transfer Network for Histology Images with CS-Gate AttentionArtificial Intelligence and Robotics10.1007/978-981-99-9109-9_3(19-32)Online publication date: 4-Jan-2024
    • (2023)Wearable sensors and features for diagnosis of neurodegenerative diseases: A systematic reviewDIGITAL HEALTH10.1177/205520762311735699(205520762311735)Online publication date: 16-May-2023
    • (2023) Nature‐inspired artificial bee colony‐based hyperparameter optimization of CNN for anomaly detection in induction motor Expert Systems10.1111/exsy.1340741:7Online publication date: 26-Jul-2023
    • (2023)Improved Semi-Persistent Scheduling Algorithm Based on Fuzzy Mathematics in Cyberspace Mimic Defense2023 9th International Conference on Computer and Communications (ICCC)10.1109/ICCC59590.2023.10507513(1233-1241)Online publication date: 8-Dec-2023
    • (2023)Human activity recognition using marine predators algorithm with deep learningFuture Generation Computer Systems10.1016/j.future.2023.01.006142:C(340-350)Online publication date: 1-May-2023
    • (2023)PET-CT image Co-segmentation of lung tumor using joint level set modelComputers and Electrical Engineering10.1016/j.compeleceng.2022.108545105:COnline publication date: 1-Jan-2023
    • (2022)An Adaptive Multiexecutors Scheduling Algorithm Based on Heterogeneity for Cyberspace Mimic DefenseSecurity and Communication Networks10.1155/2022/23004072022Online publication date: 1-Jan-2022
    • (2022)Diagnosis of Alzheimer’s disease via an attention-based multi-scale convolutional neural networkKnowledge-Based Systems10.1016/j.knosys.2021.107942238:COnline publication date: 28-Feb-2022
    • (2022)Integrating data augmentation and hybrid feature selection for small sample credit risk assessment with high dimensionalityComputers and Operations Research10.1016/j.cor.2022.105937146:COnline publication date: 1-Oct-2022
    • Show More Cited By

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media