Full Text:   <6>

CLC number: TP393

On-line Access: 2025-06-04

Received: 2024-04-02

Revision Accepted: 2024-10-22

Crosschecked: 2025-09-04

Cited: 0

Clicked: 34

Citations:  Bibtex RefMan EndNote GB/T7714

 ORCID:

Sisi SHAO

https://orcid.org/0009-0005-9026-0133

Yimu JI

https://orcid.org/0000-0001-7019-3942

-   Go to

Article info.
Open peer comments

Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.8 P.1279-1292

http://doi.org/10.1631/FITEE.2400251


Output difference feedback and system benefit control based dynamic heterogeneous redundancy architecture


Author(s):  Sisi SHAO, Zhibo HE, Shangdong LIU, Weili ZHANG, Fei WU, Fukang ZENG, Jun ZUO, Longfei ZHOU, Yukun NIU, Yimu JI

Affiliation(s):  School of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing 210023, China; more

Corresponding email(s):   jiym@njupt.edu.cn

Key Words:  Mimic defense, Adjudication mechanism, Scheduling strategy, Executor output difference, System benefit


Sisi SHAO, Zhibo HE, Shangdong LIU, Weili ZHANG, Fei WU, Fukang ZENG, Jun ZUO, Longfei ZHOU, Yukun NIU, Yimu JI. Output difference feedback and system benefit control based dynamic heterogeneous redundancy architecture[J]. Frontiers of Information Technology & Electronic Engineering, 2025, 26(8): 1279-1292.

@article{title="Output difference feedback and system benefit control based dynamic heterogeneous redundancy architecture",
author="Sisi SHAO, Zhibo HE, Shangdong LIU, Weili ZHANG, Fei WU, Fukang ZENG, Jun ZUO, Longfei ZHOU, Yukun NIU, Yimu JI",
journal="Frontiers of Information Technology & Electronic Engineering",
volume="26",
number="8",
pages="1279-1292",
year="2025",
publisher="Zhejiang University Press & Springer",
doi="10.1631/FITEE.2400251"
}

%0 Journal Article
%T Output difference feedback and system benefit control based dynamic heterogeneous redundancy architecture
%A Sisi SHAO
%A Zhibo HE
%A Shangdong LIU
%A Weili ZHANG
%A Fei WU
%A Fukang ZENG
%A Jun ZUO
%A Longfei ZHOU
%A Yukun NIU
%A Yimu JI
%J Frontiers of Information Technology & Electronic Engineering
%V 26
%N 8
%P 1279-1292
%@ 2095-9184
%D 2025
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.2400251

TY - JOUR
T1 - Output difference feedback and system benefit control based dynamic heterogeneous redundancy architecture
A1 - Sisi SHAO
A1 - Zhibo HE
A1 - Shangdong LIU
A1 - Weili ZHANG
A1 - Fei WU
A1 - Fukang ZENG
A1 - Jun ZUO
A1 - Longfei ZHOU
A1 - Yukun NIU
A1 - Yimu JI
J0 - Frontiers of Information Technology & Electronic Engineering
VL - 26
IS - 8
SP - 1279
EP - 1292
%@ 2095-9184
Y1 - 2025
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.2400251


Abstract: 
Mimic active defense technology effectively disrupts attack routes and reduces the probability of successful attacks by using a dynamic heterogeneous redundancy (DHR) architecture. However, current approaches often overlook the adaptability of the adjudication mechanism in complex and variable network environments, focusing primarily on system security while neglecting performance considerations. To address these limitations, we propose an output difference feedback and system benefit control based DHR architecture. This architecture introduces an adjudication mechanism based on output difference feedback, which enhances adaptability by considering the impact of each executor’s output deviation on the global decision. Additionally, the architecture incorporates a scheduling strategy based on system benefit, which models the quality of service and switching overhead as a bi-objective optimization problem, balancing security with reduced computational costs and system overhead. Simulation results demonstrate that our architecture improves adaptability towards different network environments and effectively reduces both the attack success rate and average failure rate.

Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article

Reference

[1]Cho JH, Sharma DP, Alavizadeh H, et al., 2020. Toward proactive, adaptive defense: a survey on moving target defense. IEEE Commun Surv Tut, 22(1):709-745.

[2]Fu T, Zhen W, Yang F, et al., 2022. Mimic defense equivalent scheduling algorithm based on service quality and credit. IEEE 6th Information Technology and Mechatronics Engineering Conf, p.414-419.

[3]Hu HC, Wu JX, Wang ZP, et al., 2018. Mimic defense: a designed-in cybersecurity defense framework. IET Inform Secur, 12(3):226-237.

[4]Hu JJ, Li Y, Li ZZ, et al., 2024. Unveiling the strategic defense mechanisms in dynamic heterogeneous redundancy architecture. IEEE Trans Netw Serv Manag, 21(4):4912-4926.

[5]Jiang DD, Wang ZH, Huo LW, et al., 2021. A performance measurement and analysis method for software-defined networking of IoV. IEEE Trans Intell Transp Syst, 22(6):3707-3719.

[6]Jiang DD, Wang F, Lv ZH, et al., 2023. QoE-aware efficient content distribution scheme for satellite-terrestrial networks. IEEE Trans Mob Comput, 22(1):443-458.

[7]Jiang DD, Wang ZH, Wang Y, et al., 2024. A blockchain-reinforced federated intrusion detection architecture for IIoT. IEEE Int Things J, 11(16):26793-26805.

[8]Li GS, Wang W, Gai KK, et al., 2021. A framework for mimic defense system in cyberspace. J Signal Process Syst, 93(2):169-185.

[9]Lin SJ, Liu QR, Wang XL, 2018. Competitive arbitration model for mimic defense system. Comput Eng, 44(4):193-198 (in Chinese).

[10]Lin X, Wu J, Li JH, et al., 2023. Heterogeneous differential-private federated learning: trading privacy for utility truthfully. IEEE Trans Depend Secur Comput, 20(6):5113-5129.

[11]Liu QR, Lin SJ, Gu ZY, 2018. Heterogeneous redundancies scheduling algorithm for mimic security defense. J Commun, 39(7):188-198 (in Chinese).

[12]Lu YQ, Huang JX, Cheng Z, et al., 2021. A multi-index mimic voting algorithm based on improved AHP-FCE model. J Beijing Univ Posts Telecommun, 44(2):8-13 (in Chinese).

[13]Lu ZP, Chen FC, Cheng GZ, et al., 2017. Towards a dynamic controller scheduling-timing problem in software-defined networking. China Commun, 14(10):26-38.

[14]Lucy W, 2024. Algorithms and adjudication. Jurisprudence, 15(3):251-281.

[15]Rehman Z, Gondal I, Ge MM, et al., 2024. Proactive defense mechanism: enhancing IoT security through diversity-based moving target defense and cyber deception. Comput Secur, 139:103685.

[16]Ren Q, Wu JX, He L, 2020. Performance modeling based on GSPN for cyberspace mimic DNS. Chin J Electron, 29(4):738-749.

[17]Shao SS, Ji YM, Zhang WL, et al., 2023a. A DHR executor selection algorithm based on historical credibility and dissimilarity clustering. Sci China Inform Sci, 66(11):212304.

[18]Shao SS, Liu SD, Li K, et al., 2023b. LBA-EC: load balancing algorithm based on weighted bipartite graph for edge computing. Chin J Electron, 32(2):313-324.

[19]Tong Q, Guo YF, 2021. A comprehensive evaluation of diversity systems based on mimic defense. Sci China Inform Sci, 64(12):229304.

[20]Wang YW, Wu JX, Guo YF, et al., 2018. Scientific workflow execution system based on mimic defense in the cloud environment. Front Inform Technol Electron Eng, 19(12):1522-1536.

[21]Wang ZH, Jiang DD, Wang F, et al., 2021. A polymorphic heterogeneous security architecture for edge-enabled smart grids. Sustain Cities Soc, 67:102661.

[22]Wang ZH, Jiang DD, Lv ZH, 2023. AI-assisted trustworthy architecture for industrial IoT based on dynamic heterogeneous redundancy. IEEE Trans Ind Inform, 19(2):2019-2027.

[23]Wei D, Xiao L, Shi L, et al., 2022. Mimic web application security technology based on DHR architecture. Proc Int Conf on Artificial Intelligence and Intelligent Information Processing, p.118-124.

[24]Wu JX, 2022a. Cyberspace endogenous safety and security. Engineering, 15:179-185.

[25]Wu JX, 2022b. Development paradigms of cyberspace endogenous safety and security. Sci China Inform Sci, 65(5):156301.

[26]Wu T, Hu CN, Chen QN, et al., 2021. Defense-enhanced dynamic heterogeneous redundancy architecture based on executor partition. J Commun, 42(3):122-134 (in Chinese).

[27]Yadav D, Raj BAA, 2024. An efficient swarm intelligence algorithm for multi-objective task scheduling optimization in the context of cloud computing. Int Conf on Automation and Computation, p.148-152.

[28]Yu F, Liu K, Geng YY, et al., 2022. Multi executor decision algorithm and scheduling algorithm based on differential distance feedback. Appl Res Comput, 39(5):1437-1443 (in Chinese).

[29]Zhang JX, Pang JM, Zhang Z, 2020. Quantification method for heterogeneity on web server with mimic construction. J Softw, 31(2):564-577 (in Chinese).

[30]Zheng Y, Li Z, Xu XL, et al., 2022. Dynamic defenses in cyber security: techniques, methods and challenges. Digit Commun Netw, 8(4):422-435.

[31]Zhu ZB, Liu QR, Liu DP, et al., 2021. Research progress of mimic multi-execution scheduling algorithm. J Commun, 42(5):179-190 (in Chinese).

Open peer comments: Debate/Discuss/Question/Opinion

<1>

Please provide your name, email address and a comment





Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE