Abstract
The traditional information security protection cannot prevent the malicious and directed intrusion of the network. To discover potential risks comprehensively, accurately, and timely, the polymorphic heterogeneous executor is constructed to confuse the attacker, called mimicry multimode decision. However, heterogeneous executors are composed of complex hardware, systems and applications, so how to select the optimal combination to face the potential risks becomes a problem. This paper proposes a mimicry multimode decision scheme based on Adaboost machine learning algorithm. The administrator can utilize Adaboost classifier to adaptively select the combination of the most defensible executor, so as to realize mimicry multimode defense and improve the security of applications. Simulation results demonstrate that the adaptive mimicry multimode decision method is promising.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Jiang, D., Wang, Y., Lv, Z., Wang, W., Wang, H.: An energy-efficient networking approach in cloud services for IIoT networks. IEEE J. Sel. Areas Commun. 38(5), 928–941 (2020)
Jiang, D., Wang, Y., Lv, Z., Qi, S., Singh, S.: Big data analysis based network behavior insight of cellular networks for industry 4.0 applications. IEEE Trans. Ind. Inform. 16(2), 1310–1320 (2020)
Qi, S., Jiang, D., Huo, L.: A prediction approach to end-to-end traffic in space information networks. Mob. Netw. Appl. (2020)
Rassouli, B., Rosas, F.E., Gündüz, D.: Data disclosure under perfect sample privacy. IEEE Trans. Inf. Forensics Secur. 15, 2012–2025 (2020)
Han, X., Huang, H., Wang, L.: F-PAD: private attribute disclosure risk estimation in online social networks. IEEE Trans. Dependable Secure Comput. 16(6), 1054–1069 (2019)
Husseis, A., Liu-Jimenez, J., Goicoechea-Telleria, I., et al.: A survey in presentation attack and presentation attack detection. In: Proceedings of ICCST 2019, pp. 1–13 (2019)
Huo, L., Shao, P., Ying, F., et al.: The research on task scheduling algorithm for the cloud management platform of mimic common operating environment. In: Proceedings of DCABES 2019, pp. 167–171 (2019)
Wang, F., Jiang, D., Qi, S.: An adaptive routing algorithm for integrated information networks. China Commun. 7(1), 196–207 (2019)
Huo, L., Jiang, D., Qi, S., et al.: An AI-based adaptive cognitive modeling and measurement method of network traffic for EIS. Mob. Netw. Appl. (2019)
Liang, H., Chen, F., Ni, S., et al.: Cloud security in space communication network. In: Proceedings of ICCC 2019, pp. 1053–1057 (2019)
Jiang, D., Wang, W., Shi, L., Song, H.: A compressive sensing-based approach to end-to-end network traffic reconstruction. IEEE Trans. Netw. Sci. Eng. 7(1), 507–519 (2020)
Jiang, D., Huo, L., Lv, Z., Song, H., Qin, W.: A joint multi-criteria utility-based network selection approach for vehicle-to-infrastructure networking. IEEE Trans. Intell. Transp. Syst. 19(10), 3305–3319 (2018)
Wang, Y., Jiang, D., Huo, L., Zhao, Y.: A new traffic prediction algorithm to software defined networking. Mob. Netw. Appl. (2020)
Jiang, D., Huo, L., Song, H.: Rethinking behaviors and activities of base stations in mobile cellular networks based on big data analysis. IEEE Trans. Netw. Sci. Eng. 7(1), 80–90 (2020)
Jiang, D., Huo, L., Li, Y.: Fine-granularity inference and estimations to network traffic for SDN. PLoS ONE 13(5), 1–23 (2018)
Jiang, D., Zhang, P., Lv, Z., et al.: Energy-efficient multi-constraint routing algorithm with load balancing for smart city applications. IEEE Internet Things J. 3(6), 1437–1447 (2016)
Jiang, D., Li, W., Lv, H.: An energy-efficient cooperative multicast routing in multi-hop wireless networks for smart medical applications. Neurocomputing 220(2017), 160–169 (2017)
Zheng, J., Wu, G., Wen, B., et al.: Research on SDN-based mimic server defense technology. In: Proceedings of ICAICS 2019, pp. 163–169 (2019)
Wu, Z., Wei, J.: Heterogeneous executors scheduling algorithm for mimic defense systems. In: Proceedings of CCET 2019, pp. 279–284 (2019)
Acknowledgements
This work was supported in part by the National Natural Science Foundation of China (No. 61571104), the Sichuan Science and Technology Program (No. 2018JY0539), the Key projects of the Sichuan Provincial Education Department (No. 18ZA0219), the Fundamental Research Funds for the Central Universities (No. ZYGX2017KYQD170), the CERNET Innovation Project (No. NGII20190111), the Fund Project (Nos. 61403110405, 315075802), and the Innovation Funding (No. 2018510007000134). The authors wish to thank the reviewers for their helpful comments.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Wang, F., Jiang, D., Wang, Z., Chen, Y. (2021). An Adaptive Algorithm Based on Adaboost for Mimicry Multimode Decisions. In: Song, H., Jiang, D. (eds) Simulation Tools and Techniques. SIMUtools 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 369. Springer, Cham. https://doi.org/10.1007/978-3-030-72792-5_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-72792-5_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-72791-8
Online ISBN: 978-3-030-72792-5
eBook Packages: Computer ScienceComputer Science (R0)