Skip to main content

An Adaptive Algorithm Based on Adaboost for Mimicry Multimode Decisions

  • Conference paper
  • First Online:
  • 821 Accesses

Abstract

The traditional information security protection cannot prevent the malicious and directed intrusion of the network. To discover potential risks comprehensively, accurately, and timely, the polymorphic heterogeneous executor is constructed to confuse the attacker, called mimicry multimode decision. However, heterogeneous executors are composed of complex hardware, systems and applications, so how to select the optimal combination to face the potential risks becomes a problem. This paper proposes a mimicry multimode decision scheme based on Adaboost machine learning algorithm. The administrator can utilize Adaboost classifier to adaptively select the combination of the most defensible executor, so as to realize mimicry multimode defense and improve the security of applications. Simulation results demonstrate that the adaptive mimicry multimode decision method is promising.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Jiang, D., Wang, Y., Lv, Z., Wang, W., Wang, H.: An energy-efficient networking approach in cloud services for IIoT networks. IEEE J. Sel. Areas Commun. 38(5), 928–941 (2020)

    Article  Google Scholar 

  2. Jiang, D., Wang, Y., Lv, Z., Qi, S., Singh, S.: Big data analysis based network behavior insight of cellular networks for industry 4.0 applications. IEEE Trans. Ind. Inform. 16(2), 1310–1320 (2020)

    Article  Google Scholar 

  3. Qi, S., Jiang, D., Huo, L.: A prediction approach to end-to-end traffic in space information networks. Mob. Netw. Appl. (2020)

    Google Scholar 

  4. Rassouli, B., Rosas, F.E., Gündüz, D.: Data disclosure under perfect sample privacy. IEEE Trans. Inf. Forensics Secur. 15, 2012–2025 (2020)

    Article  Google Scholar 

  5. Han, X., Huang, H., Wang, L.: F-PAD: private attribute disclosure risk estimation in online social networks. IEEE Trans. Dependable Secure Comput. 16(6), 1054–1069 (2019)

    Article  Google Scholar 

  6. Husseis, A., Liu-Jimenez, J., Goicoechea-Telleria, I., et al.: A survey in presentation attack and presentation attack detection. In: Proceedings of ICCST 2019, pp. 1–13 (2019)

    Google Scholar 

  7. Huo, L., Shao, P., Ying, F., et al.: The research on task scheduling algorithm for the cloud management platform of mimic common operating environment. In: Proceedings of DCABES 2019, pp. 167–171 (2019)

    Google Scholar 

  8. Wang, F., Jiang, D., Qi, S.: An adaptive routing algorithm for integrated information networks. China Commun. 7(1), 196–207 (2019)

    Google Scholar 

  9. Huo, L., Jiang, D., Qi, S., et al.: An AI-based adaptive cognitive modeling and measurement method of network traffic for EIS. Mob. Netw. Appl. (2019)

    Google Scholar 

  10. Liang, H., Chen, F., Ni, S., et al.: Cloud security in space communication network. In: Proceedings of ICCC 2019, pp. 1053–1057 (2019)

    Google Scholar 

  11. Jiang, D., Wang, W., Shi, L., Song, H.: A compressive sensing-based approach to end-to-end network traffic reconstruction. IEEE Trans. Netw. Sci. Eng. 7(1), 507–519 (2020)

    Article  MathSciNet  Google Scholar 

  12. Jiang, D., Huo, L., Lv, Z., Song, H., Qin, W.: A joint multi-criteria utility-based network selection approach for vehicle-to-infrastructure networking. IEEE Trans. Intell. Transp. Syst. 19(10), 3305–3319 (2018)

    Article  Google Scholar 

  13. Wang, Y., Jiang, D., Huo, L., Zhao, Y.: A new traffic prediction algorithm to software defined networking. Mob. Netw. Appl. (2020)

    Google Scholar 

  14. Jiang, D., Huo, L., Song, H.: Rethinking behaviors and activities of base stations in mobile cellular networks based on big data analysis. IEEE Trans. Netw. Sci. Eng. 7(1), 80–90 (2020)

    Article  MathSciNet  Google Scholar 

  15. Jiang, D., Huo, L., Li, Y.: Fine-granularity inference and estimations to network traffic for SDN. PLoS ONE 13(5), 1–23 (2018)

    Google Scholar 

  16. Jiang, D., Zhang, P., Lv, Z., et al.: Energy-efficient multi-constraint routing algorithm with load balancing for smart city applications. IEEE Internet Things J. 3(6), 1437–1447 (2016)

    Article  Google Scholar 

  17. Jiang, D., Li, W., Lv, H.: An energy-efficient cooperative multicast routing in multi-hop wireless networks for smart medical applications. Neurocomputing 220(2017), 160–169 (2017)

    Article  Google Scholar 

  18. Zheng, J., Wu, G., Wen, B., et al.: Research on SDN-based mimic server defense technology. In: Proceedings of ICAICS 2019, pp. 163–169 (2019)

    Google Scholar 

  19. Wu, Z., Wei, J.: Heterogeneous executors scheduling algorithm for mimic defense systems. In: Proceedings of CCET 2019, pp. 279–284 (2019)

    Google Scholar 

Download references

Acknowledgements

This work was supported in part by the National Natural Science Foundation of China (No. 61571104), the Sichuan Science and Technology Program (No. 2018JY0539), the Key projects of the Sichuan Provincial Education Department (No. 18ZA0219), the Fundamental Research Funds for the Central Universities (No. ZYGX2017KYQD170), the CERNET Innovation Project (No. NGII20190111), the Fund Project (Nos. 61403110405, 315075802), and the Innovation Funding (No. 2018510007000134). The authors wish to thank the reviewers for their helpful comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dingde Jiang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, F., Jiang, D., Wang, Z., Chen, Y. (2021). An Adaptive Algorithm Based on Adaboost for Mimicry Multimode Decisions. In: Song, H., Jiang, D. (eds) Simulation Tools and Techniques. SIMUtools 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 369. Springer, Cham. https://doi.org/10.1007/978-3-030-72792-5_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-72792-5_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-72791-8

  • Online ISBN: 978-3-030-72792-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics