Computer Science ›› 2024, Vol. 51 ›› Issue (11A): 231000005-6.doi: 10.11896/jsjkx.231000005

• Information Security • Previous Articles     Next Articles

ANP-BP Based Executive Heterogeneity Quantification Method in Mimicry Defense

ZHAO Jia, GU Liang, WU Yao, DU Feng   

  1. State Grid Shanxi Electric Power Company Information and Communication Branch,Taiyuan 030000,China
  • Online:2024-11-16 Published:2024-11-13
  • About author:ZHAO Jia,born in 1995,master.His main research interest is network secu-rity.
    DU Feng,born in 1992,master.His main research interests include data management and blockchain techno-logy.
  • Supported by:
    Science and Technology Project of State Grid Shanxi Electric Power Company(52051C220006).

Abstract: Mimicry defense technology based on dynamic heterogeneous redundancy framework is an active defense technology,which uses characteristics such as non-similarity and redundancy to block or disrupt network attacks to improve system reliability and security.The key to improve the security benefits of mimicry defense is to maximize the heterogeneity among executives.This paper proposes a quantitative method of executive heterogeneity based on network analytic hierarchy process(ANP)and back propagation of error(BP).By collecting and analyzing different influencing factors of heterogeneity,this method establishes a multi-dimensional feature matrix.The ANP method comprehensively considers the interdependence between various dimensions and assigns weights to features of different dimensions.At the same time,BP neural network is used to solve the problem that ANP method is too subjective.The isomerism evaluation model based on ANP-BP can quickly,accurately and effectively screen out the most influential factors of isomerism,and provide scientific basis and technical suggestions for the isomerism evaluation of mimicry defense executive.

Key words: Active defense technique, Mimicry defense technology, Heterogeneity, Analytic network process, BP neural network

CLC Number: 

  • TP391
[1]WU J X.Research on mimicry defense in Cyberspace[J].Journal of Information Security,2016(4):1-10.
[2]TONG Q,ZHANG Z,WU J X.Active defense technology based on software and hardware diversity[J].Journal of Information Security,2017,2(1):1-12.
[3]YAO W B,YANG X Z.Different software component selection algorithm design[J].Journal of Harbin Institute of Technology,2003(3):261-264.
[4]QIU D H,LI H,SUN J L.Measuring software similarity based on structure and property of class diagram[C]//Sixth International Conference on Advanced Computational Intelligence.IEEE,2013:75-80.
[5]GAO M,LUO J,ZHOU H Y,et al.A differential feedbackscheduling decision algorithm based on mimicry defense[J].Telecommunication Science,2019,36(5):73-82.
[6]LIU Q R,LIN S J,GU Z Y.Heterogeneous functional-equivalent block scheduling algorithm for mimicry security defense[J].Journal of Communications,2018,39(7):188-198.
[7]TWU P,MOSTOFI Y,EGERSTEDT M.A measure of heterogeneity in multi-agent systems[C]//2014 American Control Conference.IEEE,2014:3972-3977.
[8]YUE Y Y,FU X,DENG S.Multi-access edge Computing Server heterogeneity quantification Method based on mimicry defense[J].Computer Applications and Software,2019,40(6):276-281,349.
[9]ZHANG J X,PANG J M,ZHANG Z,et al.A quantizationmethod for heterogeneity of network security systems based on dissimilar redundancy architecture[J].Journal of Electronics and Information Technology,2019,41(7):1594-1600.
[10]ZHANG J X,PANG J M,ZHANG Z.A quantitative method for heterogeneity of Web servers based on mimicry construction[J].Journal of Software,2019,31(2):564-577.
[11]LI J J.Research on Evaluation Method and Technology of mi-micry security information System[J].Information Technology and Network Security,2019,38(4):33-36.
[12]WANG X M,YANG W H,ZHANG W,et al.Research onScheduling strategy of mimicry Web server based on BSG[J].Journal of Communications,2018,39(S2):112-120.
[13]WU Z Q,WEI J.Heterogeneous executors scheduling algorithm for mimic defense systems[C]//2019 IEEE 2nd International Conference on Computer and Communication Engineering.Piscataway:IEEE Press,2019:279-284.
[14]ZHANG Y J,YANG Y P,ZHOU Y,et al.State assessment of urban security development based on ANP-BP neural network[J].Journal of Xi 'an University of Science and Technology,2022,42(6):1104-1113.
[15]LIU H.Research on Heterogeneous Software Deployment Stra-tegy for mimicry Defense System[D].Information Engineering University of Strategic Support Forces,2020.
[16]WANG M,FU W H,WANG B T,et al.Optimization of mimicry defense strategy based on Evolutionary game [J].Application Research of Computers,2024,41(2):576-581.
[17]JIANG D M,DING L.ANP-BP highway tunnel fire risk assessment model and its application[J].Journal of Qingdao University of Technology,2018,39(5):111-116.
[18]WANG L F.Theory and Algorithm of Network Analysis Method(ANP)[J].Systems Engineering Theory & Practice,2001(3):44-50.
[19]HUANG Y T,HUANG X B.BP neural network optimizationbased on ANP and Sparrow search algorithm for prefabricated building schedule risk assessment[J].Journal of Engineering Management,2019,36(6):36-41.
[1] XU Yicheng, DAI Chaofan, MA Wubin, WU Yahui, ZHOU Haohao, LU Chenyang. Particle Swarm Optimization-based Federated Learning Method for Heterogeneous Data [J]. Computer Science, 2024, 51(6): 391-398.
[2] WANG Zihang, YANG Min, WEI Zichong. Application of Parameter Decoupling in Differentially Privacy Protection Federated Learning [J]. Computer Science, 2024, 51(11): 379-388.
[3] ZHANG Changfan, MA Yuanyuan, LIU Jianhua, HE Jing. Dual Gating-Residual Feature Fusion for Image-Text Cross-modal Retrieval [J]. Computer Science, 2023, 50(6A): 220700030-7.
[4] XIONG Haojie, WEI Yi. Study on Multibeam Sonar Elevation Data Prediction Based on Improved CNN-BP [J]. Computer Science, 2023, 50(6A): 220100161-4.
[5] CHEN Haiyan, ZHU Junlin, WANG Ping. Study on Prediction Modeling and Compensation of Circular Target Center Positioning Error Based on GA-BP [J]. Computer Science, 2023, 50(11A): 221100170-5.
[6] ZOU Chenwei, YAO Rao. Study on Ultrasonic Phased Array Defect Detection Based on Machine Vision [J]. Computer Science, 2023, 50(11A): 230200150-6.
[7] LI Xia, MA Qian, BAI Mei, WANG Xi-te, LI Guan-yu, NING Bo. RIIM:Real-Time Imputation Based on Individual Models [J]. Computer Science, 2022, 49(8): 56-63.
[8] LIU Bao-bao, YANG Jing-jing, TAO Lu, WANG He-ying. Study on Prediction of Educational Statistical Data Based on DE-LSTM Model [J]. Computer Science, 2022, 49(6A): 261-266.
[9] XU Jia-nan, ZHANG Tian-rui, ZHAO Wei-bo, JIA Ze-xuan. Study on Improved BP Wavelet Neural Network for Supply Chain Risk Assessment [J]. Computer Science, 2022, 49(6A): 654-660.
[10] ZHOU Hai-yu, ZHANG Dao-qiang. Multi-site Hyper-graph Convolutional Neural Networks and Application [J]. Computer Science, 2022, 49(3): 129-133.
[11] XIA Jing, MA Zhong, DAI Xin-fa, HU Zhe-kun. Efficiency Model of Intelligent Cloud Based on BP Neural Network [J]. Computer Science, 2022, 49(2): 353-367.
[12] CHENG Fan, WANG Rui-jin, ZHANG Feng-li. Federated Learning Optimization Method for Dynamic Weights in Edge Scenarios [J]. Computer Science, 2022, 49(12): 53-58.
[13] JIN Yu-yan, YU Tian-hao, WANG Song-bo, LIN Wei-wei, PAN Yu-cong. CPU Power Model for ARM Architecture Cloud Servers [J]. Computer Science, 2022, 49(10): 59-65.
[14] CHENG Tie-jun, WANG Man. Network Public Opinion Trend Prediction of Emergencies Based on Variable Weight Combination [J]. Computer Science, 2021, 48(6A): 190-195.
[15] GUO Fu-min, ZHANG Hua, HU Rong-hua, SONG Yan. Study on Method for Estimating Wrist Muscle Force Based on Surface EMG Signals [J]. Computer Science, 2021, 48(6A): 317-320.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!