skip to main content
10.1145/3558819.3565150acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccsieConference Proceedingsconference-collections
research-article

Distributed Mimic Judgment Algorithm based on Multi-Strategy Decentralization Model

Published: 26 October 2022 Publication History

Abstract

The current mimic adjudication model is centered on a single adjudicator, and the adjudication algorithm is relatively single and static, which cannot cope with today's complex and changeable network environment. First, a distributed adjudication model is proposed to decentralize the adjudicator, each sub-arbiter is different from the previous use of all executive results, but randomly selects the output of the executive as the input incentive. Secondly, based on this model, a consensus mechanism algorithm is proposed to iteratively normalize the local adjudication results of the sub-arbiters to achieve the global optimal adjudication result. The analysis of the simulation experiment results shows that the algorithm proposed in this paper is more accurate than the traditional adjudication algorithm when multiple executors are online. The algorithm can further reduce the risk of common-mode escape and improve the security of the mimic defense system.

References

[1]
WU Jiangxing.Research on Cyber Mimic Defense[J].Journal of Cyber Security,2016,1(4) :1-10.
[2]
Vihinen, Mauno. Majority vote and other problems when using computational tools [J]. Human Mutation, 2014, 35 (8): 912-914.
[3]
Ouyang Chengtian, Wang Xi, Zheng Jian. Adaptive unanimous voting algorithm [J]. Computer Science, 2011, 38 (7): 130-133.
[4]
WEI Shuai,ZHANG Huihua,SU Ye,et al.Majority Voting Algorithm and Performance Analysis based on High level Heterogeneity[J].
[5]
LI Jun, WANG Zhihao, CHEN Yingchun. An Intelligent Adjudication Algorithm based on Security of Executors [J]. Communications Technology,2021,54(4):929-937.
[6]
Shen Congqi, Chen Shuang xi, Wu Chun ming. Research on adaptive mimic controller based on reputation and dissimilarity [J]. Journal on Communications, 2018, 039 (z2): 173-180.
[7]
Wu Zhaoqi, Zhang Fan, Guo Wei, A mimic ruling optimization method based on the isomerism of the executive body [J]. Computer Engineering, 2020, 46 (5): 12-18.
[8]
C. Shen, S.-X. Chen, C.-M. Wu, A decentralized multi-ruling arbiter for cyberspace mimicry defense, in: 2019 International Symposium on Networks, Computers and Communications (ISNCC), IEEE, 2019, pp. 1–6.
[9]
PULiming, BOYi,YOUWei,etal.Heterogeneous Executors Output Decision Method for Mimic Cloud Service[J].Journal of Information Engineering University,2020,21(3):344-351.
[10]
MA H L, YI P, JIANG Y M, Dynamic heterogeneous redundancybased router architecture with mimic defenses[J]. Journal of CyberSecurity, 2017, 2(1): 29-42.
[11]
TONG Q, ZHANG Z, ZHANG W H, Design and implementation of mimic defense Web server[J]. Journal of Software, 2017, 28(4):883-897.
[12]
Nan Zhao,Jingjing Bao,Nan Chen,Hongshu Chen. Ranking Influential Nodes in Complex Networks with Information Entropy Method[J]. Complexity, 2020,2020.

Index Terms

  1. Distributed Mimic Judgment Algorithm based on Multi-Strategy Decentralization Model

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICCSIE '22: Proceedings of the 7th International Conference on Cyber Security and Information Engineering
    September 2022
    1094 pages
    ISBN:9781450397414
    DOI:10.1145/3558819
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 October 2022

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICCSIE2022

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 24
      Total Downloads
    • Downloads (Last 12 months)5
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 28 Feb 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media