skip to main content
10.1145/3558819.3565150acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccsieConference Proceedingsconference-collections
research-article

Distributed Mimic Judgment Algorithm based on Multi-Strategy Decentralization Model

Published:26 October 2022Publication History

ABSTRACT

The current mimic adjudication model is centered on a single adjudicator, and the adjudication algorithm is relatively single and static, which cannot cope with today's complex and changeable network environment. First, a distributed adjudication model is proposed to decentralize the adjudicator, each sub-arbiter is different from the previous use of all executive results, but randomly selects the output of the executive as the input incentive. Secondly, based on this model, a consensus mechanism algorithm is proposed to iteratively normalize the local adjudication results of the sub-arbiters to achieve the global optimal adjudication result. The analysis of the simulation experiment results shows that the algorithm proposed in this paper is more accurate than the traditional adjudication algorithm when multiple executors are online. The algorithm can further reduce the risk of common-mode escape and improve the security of the mimic defense system.

References

  1. WU Jiangxing.Research on Cyber Mimic Defense[J].Journal of Cyber Security,2016,1(4) :1-10.Google ScholarGoogle Scholar
  2. Vihinen, Mauno. Majority vote and other problems when using computational tools [J]. Human Mutation, 2014, 35 (8): 912-914.Google ScholarGoogle ScholarCross RefCross Ref
  3. Ouyang Chengtian, Wang Xi, Zheng Jian. Adaptive unanimous voting algorithm [J]. Computer Science, 2011, 38 (7): 130-133.Google ScholarGoogle Scholar
  4. WEI Shuai,ZHANG Huihua,SU Ye,et al.Majority Voting Algorithm and Performance Analysis based on High level Heterogeneity[J].Google ScholarGoogle Scholar
  5. LI Jun, WANG Zhihao, CHEN Yingchun. An Intelligent Adjudication Algorithm based on Security of Executors [J]. Communications Technology,2021,54(4):929-937.Google ScholarGoogle Scholar
  6. Shen Congqi, Chen Shuang xi, Wu Chun ming. Research on adaptive mimic controller based on reputation and dissimilarity [J]. Journal on Communications, 2018, 039 (z2): 173-180.Google ScholarGoogle Scholar
  7. Wu Zhaoqi, Zhang Fan, Guo Wei, A mimic ruling optimization method based on the isomerism of the executive body [J]. Computer Engineering, 2020, 46 (5): 12-18.Google ScholarGoogle Scholar
  8. C. Shen, S.-X. Chen, C.-M. Wu, A decentralized multi-ruling arbiter for cyberspace mimicry defense, in: 2019 International Symposium on Networks, Computers and Communications (ISNCC), IEEE, 2019, pp. 1–6.Google ScholarGoogle ScholarCross RefCross Ref
  9. PULiming, BOYi,YOUWei,etal.Heterogeneous Executors Output Decision Method for Mimic Cloud Service[J].Journal of Information Engineering University,2020,21(3):344-351.Google ScholarGoogle Scholar
  10. MA H L, YI P, JIANG Y M, Dynamic heterogeneous redundancybased router architecture with mimic defenses[J]. Journal of CyberSecurity, 2017, 2(1): 29-42.Google ScholarGoogle Scholar
  11. TONG Q, ZHANG Z, ZHANG W H, Design and implementation of mimic defense Web server[J]. Journal of Software, 2017, 28(4):883-897.Google ScholarGoogle Scholar
  12. Nan Zhao,Jingjing Bao,Nan Chen,Hongshu Chen. Ranking Influential Nodes in Complex Networks with Information Entropy Method[J]. Complexity, 2020,2020.Google ScholarGoogle Scholar

Index Terms

  1. Distributed Mimic Judgment Algorithm based on Multi-Strategy Decentralization Model

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICCSIE '22: Proceedings of the 7th International Conference on Cyber Security and Information Engineering
      September 2022
      1094 pages
      ISBN:9781450397414
      DOI:10.1145/3558819

      Copyright © 2022 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 26 October 2022

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)8
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format