2020
DOI: 10.1109/access.2019.2961644
|View full text |Cite
|
Sign up to set email alerts
|

Scheduling Sequence Control Method Based on Sliding Window in Cyberspace Mimic Defense

Abstract: Cyberspace Mimic Defense (CMD) is a proactive defense theory proposed in recent years to deal with vulnerability and backdoor threats that are common in information systems. Different from moving target defense (MTD), CMD can obtain foundation by verifying multiple results from isolated, heterogeneous, and parallel running spaces, thus initiating a more targeted defensive action, such as scheduling and structure transformation. However, scheduling sequence control is a severe problem in this process, which nee… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(12 citation statements)
references
References 24 publications
0
12
0
Order By: Relevance
“…The scheduling timing focuses on when to carry out dynamic scheduling, and the scheduling strategy focuses on how to carry out dynamic scheduling. As for the research on scheduling timing, there have been substantial academic results [17], [29], [30], so it is not the core issue of this article.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…The scheduling timing focuses on when to carry out dynamic scheduling, and the scheduling strategy focuses on how to carry out dynamic scheduling. As for the research on scheduling timing, there have been substantial academic results [17], [29], [30], so it is not the core issue of this article.…”
Section: Related Workmentioning
confidence: 99%
“…Assuming that the number of online executors is n (n is odd). According to [17], within time ∆t, the online executors change from normal state to abnormal state following a Poisson process with an intensity of λ. Besides, assuming that the probability of each executor returning from abnormal state to normal state in time ∆t is µ∆t+o(∆t).…”
Section: B Continuous-time Markov Process Of the Mimic Defense Systemmentioning
confidence: 99%
See 2 more Smart Citations
“…Based on operation, MTD can be roughly divided into four types [16]: shuffling [17][18], diversity [19][20], redundancy [21][22][23] and hybrid [24][25]. Although different types of MTD have their own characteristics, it is still difficult to satisfy coverage, timeliness and unpredictability at the same time [26], and problems such as blindness, inefficiency and unverifiability may also arise [27].…”
Section: Introductionmentioning
confidence: 99%