2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET) 2019
DOI: 10.1109/ccet48361.2019.8989231
|View full text |Cite
|
Sign up to set email alerts
|

Heterogeneous Executors Scheduling Algorithm for Mimic Defense Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Based on common vulnerability between executors, Pu proposes a pool scheduling algorithm based on priority and time slice (PSPT), which achieves good dynamism and time complexity. Reference [20] proposes a random seed scheduling algorithm (RSMHQH) based on executor heterogeneity, performance, and historical confdence, which achieves better performance and comprehensive indexes. Meanwhile, the selection of the seed executor is too random, which will give the attacker a greater chance to attack successfully.…”
Section: Related Workmentioning
confidence: 99%
“…Based on common vulnerability between executors, Pu proposes a pool scheduling algorithm based on priority and time slice (PSPT), which achieves good dynamism and time complexity. Reference [20] proposes a random seed scheduling algorithm (RSMHQH) based on executor heterogeneity, performance, and historical confdence, which achieves better performance and comprehensive indexes. Meanwhile, the selection of the seed executor is too random, which will give the attacker a greater chance to attack successfully.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, many researchers both consider the differences between the executors and the historical confidence in their scheduling strategies, which can further improve the defense capability of the system. Wu et et al [39] introduced historical confidence in the RSSSA in order to improve the security of the mimic defense system. They selected the seed executor from the executors which historical confidence satisfy the threshold.…”
Section: ) Combining Differences and Historical Confidencementioning
confidence: 99%