Paper
16 October 2024 Mimic arbiter based on similarity comparison
Dalong Zhang, Zigang Cao, Yan Cao
Author Affiliations +
Proceedings Volume 13291, Ninth International Symposium on Advances in Electrical, Electronics, and Computer Engineering (ISAEECE 2024); 132910C (2024) https://doi.org/10.1117/12.3033548
Event: Ninth International Symposium on Advances in Electrical, Electronics, and Computer Engineering (ISAEECE 2024), 2024, Changchun, China
Abstract
Mimic defense is an important means of cyberspace defense. It defends against unknown attacks by constructing multiple heterogeneous executors to make the system redundant. However, existing mimetic arbiters often suffer from low efficiency because they judge the response data of executors. To address this issue, a mimetic decision rule based on heterogeneous executors path comparison is proposed to improve the voting efficiency. Based on the judgment of paths of executors, key positions in each heterogeneous executor are instrumented with route markers so that each executor automatically outputs markers on the actual execution path during runtime. The markers output by each executor are grouped based on similarity, then the algorithm of decision and scheduling rules based on historical performance and base address distance are set according to the grouping. Experimental results show that this method can improve the efficiency of mimetic decision-making while ensuring security.
(2024) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Dalong Zhang, Zigang Cao, and Yan Cao "Mimic arbiter based on similarity comparison", Proc. SPIE 13291, Ninth International Symposium on Advances in Electrical, Electronics, and Computer Engineering (ISAEECE 2024), 132910C (16 October 2024); https://doi.org/10.1117/12.3033548
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Decision making

Defense and security

Information security

Design

Equipment

Reliability

Network security

Back to Top