GUO Wei, ZHANG Fan, WU Zhaoqi, WEI Jin, WU Jiangxing, ZHOU Wenle. Confidence Skewing Problem and Its Correction Method in Mimic Arbitration Mechanism[J]. Chinese Journal of Electronics, 2020, 29(3): 547-553. doi: 10.1049/cje.2020.03.010
Citation: GUO Wei, ZHANG Fan, WU Zhaoqi, WEI Jin, WU Jiangxing, ZHOU Wenle. Confidence Skewing Problem and Its Correction Method in Mimic Arbitration Mechanism[J]. Chinese Journal of Electronics, 2020, 29(3): 547-553. doi: 10.1049/cje.2020.03.010

Confidence Skewing Problem and Its Correction Method in Mimic Arbitration Mechanism

doi: 10.1049/cje.2020.03.010
Funds:  This work is supported by the National Natural Science Foundation of China (No.61572520), the National Natural Science Foundation of China for Innovative Research Groups (No.61521003), and the Special Fund for Informatization Projects of Shanghai (No.201701046).
More Information
  • Corresponding author: ZHANG Fan (corresponding author) was born in 1981. He received the Ph.D. degrees in information and communication engineering in 2013 from Information Engineering University. He is currently an associate researcher. His research interests include proactive defense, high-performance computing, and big data processing. (Email:17034203@qq.com)
  • Received Date: 2019-10-07
  • Rev Recd Date: 2019-12-30
  • Publish Date: 2020-05-10
  • Arbitration mechanism is the core element of Cyberspace mimic defense (CMD) scheme, providing the security effect of exception perception and exception shielding for the protected system. The existing arbitration methods confront the problem of confidence skewing caused by attack changes when calculating confidence. This paper proposes a correction method for confidence calculation based on Logistic function (Lcorrection). The method makes a grading on influence for different historical periods and filters the noise of “overheating” exception outputs so that the confidence calculation process can adapt to the attack changes in real applications. The evaluations show that the L-correction can adequately handle the confidence skewing and skewingbased confidence cheating, improving the security of mimic arbitration mechanism.
  • loading
  • National Science and Technology Council, “Trustworthy cyberspace: Strategic plan for the federal cybersecurity research and development program”, accessed on: Dec.2011. Available: https://www.nitrd.gov/SUBCOMMITTEE/csia/ed_Cybersecurity_RD_Strategic_Plan_2011.pdf.
    H. Okhravi, A Comella, E Robinson, et al., “Creating a cyber moving target for critical infrastructure applications”, International Conference on Critical Infrastructure Protection, Springer, Berlin, Germany, pp.107-123, 2011.
    J.X. Wu, “Meaning and vision of mimic computing and mimic security defense”, Telecommunications Science, Vol.30, No.7, pp.17, 2014. (in Chinese)
    T. Hobson, H. Okhravi, D. Bigelow, et al., “On the challenges of effective movement”, Proc. of ACM Workshop Moving Target Defense, Scottsdale, Arizona, USA, pp.41-50, 2014.
    D. Evtyushkin, D. Ponomarev and N. Abu-Ghazaleh, “Jump over ASLR: Attacking branch predictors to bypass ASLR”, Proc. of IEEE/ACM MICRO, Taipei, China Taiwan, pp.1-13, 2016.
    K. Z. Snow, F Monrose, L Davi, et al., “Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization”, Proc. of IEEE Symposium on Security and Privacy, Berkeley, CA, USA, pp.574-588, 2013.
    J.X. Wu, “Research on cyber mimic defense”, Journal of Cyber Security, Vol.1, No.4, pp.1-10, 2016. (in Chinese)
    S.X. Chen, A.B. Wu, S.J. Qi, et al., “Analysis of resource defense model for novel active defense modeling”, Acta Electronica Sinica, Vol.47, No.7, pp.1557-1565, 2019. (in Chinese)
    B. Parhami, “Voting algorithms”, IEEE Transactions on Reliability, Vol.43, No.4, pp.617-629, 1994
    G. Latif-Shabgahi, J. M. Bass and S. Bennett, “A taxonomy for software voting algorithms used in safety-critical systems”, IEEE Transactions on Reliability, Vol.53, No.3, pp.319-328, 2004.
    C. Qi, J.X. Wu, H.C Hu, et al., “An intensive security architecture with multi-controller for SDN”, Proc. of IEEE INFOCOM WKSHPS, San Francisco, CA, USA, pp.401-402, 2016.
    H.C. Hu, Z.P. Wang, G.Z. Cheng,et al., “MNOS: A mimic network operating system for software defined networks”, IET Information Security, Vol.11, No.6, pp.345-355, 2017.
    Q. Tong, Z. Zhang, W.H. Zhang, et al., “Design and implementation of mimic defense web server”, Journal of Software, Vol.28, No.4, pp.883-897, 2017. (in Chinese)
    Y.W. Wang, J.X. Wu, Y.F. Guo, et al., “Scientific workflow execution system based on mimic defense in the cloud environment”, Frontiers of Information Technology and Electronic Engineering, Vol.19, No.12, pp.1522-1536, 2018.
    H.C. Hu, J.X. Wu, Z.P. Wang, et al., “Mimic defense: a designed-in cybersecurity defense framework”, IET Information Security, Vol.12, No.3, pp.226-237, 2018.
    Z.P. Wang, H.C. Hu and G.Z. Cheng, “A DNS architecture based on mimic security defense”, Acta Electronica Sinica, Vol.45, No.11, pp.2705-2714, 2017. (in Chinese)
    B. Li, Q. Zhou, X.M. Si, et al., “Mimic encryption system for network security”, IEEE Access, Vol.6, pp.50468-50487, 2018.
    H. He, Y.H. TAN, “A Novel Adaptive Wavelet Thresholding with Identical Correlation Shrinkage Function for ECG Noise Removal”, Chinese Journal of Electronics, Vol.27, No.3, pp.507-513, 2018.
    X.Y. Ye, L.M. Tao and R.H. Sa, “An outdoor small target tracking method based on duo temporal scale motion analysis”, Acta Electronica Sinica, Vol.43, No.7, pp.1257-1265, 2015. (in Chinese)
    H.W. Huo, M.G. Ye and D.P. Gao, “A memory-efficient multi-dimensional hardware-specific algorithm for packet classification”, Chinese Journal of Electronics, Vol.19, No.4, pp.634-636, 2010.
    S.L. Wang, H.H. Chi, Z.Q. Yuan, et al., “Emotion recognition using cloud model”, Chinese Journal of Electronics, Vol.28, No.3, pp.470-474, 2019.
    K. Shvachko, H. Kuang, S. Radia, et al., “The hadoop distributed file system”, MSST, Vol.10, pp.1-10, 2010.
    F. Bellifemine, F. Bergenti, G. Caire, et al., “Jade a Java agent development framework”, Multi-Agent Programming, Springer, Boston, MA, USA, pp.125-147, 2005.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (150) PDF downloads(120) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return