Academic Journal of Engineering and Technology Science, 2025, 8(4); doi: 10.25236/AJETS.2025.080406.
Li Zhaozhao
Purple Mountain Laboratories, Nanjing, China
The traditional implementation of mimicry decision-making often adopts majority decision-making mechanisms such as 2-out-of-3 and 3-out-of-5, where each executor is assigned the same decision weight, ignoring the current health status of each executor. It only makes threshold judgments based on the cumulative number of decision errors, and triggers the cleaning and recovery mechanism only when the threshold is exceeded. This approach cannot effectively respond to short-term, sharply deteriorating working conditions and also ignores the guiding significance of historical data for mimicry decision-making. Therefore, this paper proposes a situation-aware-based mimicry decision module, which utilizes the error frequency of executors as an indicator, assigns different decision weights to CPU executors under various working conditions, and fully integrates historical data with current data, thereby making the mimicry defense system more robust. At the same time, the relationship between the window size and the sensitivity of executors is analyzed through simulation experiments.
Mimic Judgement, Situation Awareness, Mimic Defence
Li Zhaozhao. Design and Implementation of a Mimic Judgment Module Based on Situation Awareness. Academic Journal of Engineering and Technology Science (2025), Vol. 8, Issue 4: 47-52. https://doi.org/10.25236/AJETS.2025.080406.
[1] Hu, H., Wu, J., Wang, Z., & Cheng, G. (2018). Mimic defense: a designed‐in cybersecurity defense framework. IET Information Security, 12(3), 226-237.
[2] Ma, H. L., Yi, P., Jiang, Y. M., & He, L. (2017). Dynamic heterogeneous redundancy based router architecture with mimic defenses. Journal of Cyber Security, 2(1), 29-42.
[3] Xu, J. (2021). Research on cyberspace mimic defense based on dynamic heterogeneous redundancy mechanism. Journal of Computer and Communications, 9(7), 1-7.
[4] Zhang, B., Xi, Z., Wang, Y., & He, C. (2023, March). Research on the main elements of mimic platforms. In Fifth International Conference on Computer Information Science and Artificial Intelligence. 12566, 148-154.
[5] Wang, Y., Xi, Z., Zhang, B., & He, C. (2023, March). A protection framework based on dynamic heterogeneous redundancy architecture. In Fifth International Conference on Computer Information Science and Artificial Intelligence. 12566, 127-134
[6] Ouyang, L., Song, K., Zhang, W., & Wei, S. (2023). Microcontroller design based on dynamic heterogeneous redundancy architecture. China Communications, 20(9), 144-159.
[7] Shao, S., Ji, Y., Zhang, W., Liu, S., Jiang, F., Cao, Z., ... & Zhou, L. (2023). A DHR executor selection algorithm based on historical credibility and dissimilarity clustering. Science China Information Sciences, 66(11), 212304.
[8] Hu, J., Li, Y., Li, Z., Liu, Q., & Wu, J. (2024). Unveiling the strategic defense mechanisms in dynamic heterogeneous redundancy architecture. IEEE Transactions on Network and Service Management, 21(4), 4912-4926.
[9] Kang, Y., Zhang, Q., Jiang, B., & Bu, Y. (2024). A Differentially Private Framework for the Dynamic Heterogeneous Redundant Architecture System in Cyberspace. Electronics, 13(10), 1805.