{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T02:42:49Z","timestamp":1774492969939,"version":"3.50.1"},"reference-count":30,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T00:00:00Z","timestamp":1763078400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Science and Technology Project funded by State Grid Jiangsu Electric Power Company","award":["J2024089"],"award-info":[{"award-number":["J2024089"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Mimic defense, as an emerging active defense architecture, enhances the resilience of critical systems against unknown attacks through diversified redundant executors and dynamic switching mechanisms. However, the structural heterogeneity and dynamic behaviors of such systems pose great challenges for efficient and secure task scheduling, which traditional algorithms fail to address effectively. To overcome these limitations, this paper proposes a deep reinforcement learning-based scheduling algorithm for mimic defense servers, termed DRLMDS, which integrates an improved particle swarm optimization strategy to construct an environment-adaptive scheduling model capable of perceiving system state changes and optimizing task-resource allocation among heterogeneous executors. The algorithm is validated on mimic defense server datasets containing multiple heterogeneous nodes, where symmetric resource distribution and adjudication mechanisms are explicitly modeled to ensure balanced load distribution and robustness. Experimental results demonstrate that DRLMDS not only effectively defends against malicious attacks but also achieves approximately 30% reduction in task response time, 25% improvement in resource utilization, and nearly 40% enhancement in system stability compared with traditional swarm intelligence algorithms. These findings confirm the superior efficiency, robustness, and security advantages of the proposed approach in complex edge computing environments. This study provides a novel approach for intelligent and adaptive task scheduling in mimic defense architectures, offering theoretical support for active defense research and practical guidance for secure system deployment.<\/jats:p>","DOI":"10.3390\/sym17111960","type":"journal-article","created":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T10:07:03Z","timestamp":1763114823000},"page":"1960","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["DRLMDS: A Deep Reinforcement Learning-Based Scheduling Algorithm for Mimic Defense Servers"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-8904-0102","authenticated-orcid":false,"given":"Xiaoyun","family":"Liao","sequence":"first","affiliation":[{"name":"Taizhou Power Supply Branch, State Grid Jiangsu Electric Power Co., Ltd., Taizhou 225309, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-6006-9029","authenticated-orcid":false,"given":"Sen","family":"Yang","sequence":"additional","affiliation":[{"name":"Taizhou Power Supply Branch, State Grid Jiangsu Electric Power Co., Ltd., Taizhou 225309, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-4940-8778","authenticated-orcid":false,"given":"Lijian","family":"Ouyang","sequence":"additional","affiliation":[{"name":"Taizhou Power Supply Branch, State Grid Jiangsu Electric Power Co., Ltd., Taizhou 225309, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-0238-2047","authenticated-orcid":false,"given":"Rong","family":"Wu","sequence":"additional","affiliation":[{"name":"Taizhou Power Supply Branch, State Grid Jiangsu Electric Power Co., Ltd., Taizhou 225309, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-7916-7713","authenticated-orcid":false,"given":"Xin","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Xianlin Campus, Nanjing 210003, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-2919-4974","authenticated-orcid":false,"given":"Shengjie","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Xianlin Campus, Nanjing 210003, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-8816-5306","authenticated-orcid":false,"given":"Jinzhou","family":"Mao","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Xianlin Campus, Nanjing 210003, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8511-7544","authenticated-orcid":false,"given":"Shangdong","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Xianlin Campus, Nanjing 210003, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7019-3942","authenticated-orcid":false,"given":"Yimu","family":"Ji","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Xianlin Campus, Nanjing 210003, China"}]}],"member":"1968","published-online":{"date-parts":[[2025,11,14]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1007\/s00607-020-00896-5","article-title":"Edge computing: Current trends, research challenges and future directions","volume":"103","author":"Carvalho","year":"2021","journal-title":"Computing"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3486221","article-title":"Orchestration in fog computing: A comprehensive survey","volume":"55","author":"Costa","year":"2022","journal-title":"ACM Comput. Surv."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"2131","DOI":"10.1109\/COMST.2021.3106401","article-title":"Resource scheduling in edge computing: A survey","volume":"23","author":"Luo","year":"2021","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.jnca.2019.04.010","article-title":"DA-DRLS: Drift adaptive deep reinforcement learning based scheduling for IoT resource management","volume":"138","author":"Chowdhury","year":"2019","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1529","DOI":"10.1109\/TETC.2019.2902661","article-title":"Smart resource allocation for mobile edge computing: A deep reinforcement learning approach","volume":"9","author":"Wang","year":"2021","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1016\/j.future.2023.10.002","article-title":"Energy efficient task scheduling based on deep reinforcement learning in cloud environment: A specialized review","volume":"151","author":"Hou","year":"2024","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3317572","article-title":"Deep reinforcement learning for vehicular edge computing: An intelligent offloading system","volume":"10","author":"Ning","year":"2019","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"5141","DOI":"10.1109\/TWC.2019.2933417","article-title":"Deep reinforcement learning for user association and resource allocation in heterogeneous cellular networks","volume":"18","author":"Zhao","year":"2019","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_9","first-page":"12","article-title":"Research on electric power Internet of Things based on 5G edge computing","volume":"32","author":"Zhu","year":"2023","journal-title":"Electr. Technol. Econ."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","article-title":"Edge computing: Vision and challenges","volume":"3","author":"Shi","year":"2016","journal-title":"IEEE Internet Things J."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Bala, I., Chauhan, D., and Mitchell, L. (2024, January 14\u201318). Orthogonally Initiated Particle Swarm Optimization with Advanced Mutation for Real-Parameter Optimization. Proceedings of the Genetic and Evolutionary Computation Conference Companion (GECCO \u201924 Companion), Melbourne, VIC, Australia.","DOI":"10.1145\/3638530.3654214"},{"key":"ref_12","first-page":"1","article-title":"LBA-EC: A load balancing algorithm based on weighted bipartite graph for edge computing","volume":"31","author":"Shao","year":"2022","journal-title":"Chin. J. Electron."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"4282","DOI":"10.1109\/TWC.2021.3057882","article-title":"A hybrid DQN and optimization approach for strategy and resource allocation in MEC networks","volume":"20","author":"Wu","year":"2021","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"21478","DOI":"10.1109\/TITS.2022.3179987","article-title":"Computation offloading and resource allocation in MEC-enabled integrated aerial-terrestrial vehicular networks: A reinforcement learning approach","volume":"23","author":"Waqar","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1016\/j.eng.2021.08.022","article-title":"Flexible resource scheduling for software-defined cloud manufacturing with edge computing","volume":"22","author":"Yang","year":"2023","journal-title":"Engineering"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"2770","DOI":"10.1109\/TIV.2023.3237960","article-title":"A parallel intelligence-driven resource scheduling scheme for digital twins-based intelligent vehicular systems","volume":"8","author":"Yang","year":"2023","journal-title":"IEEE Trans. Intell. Veh."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"2253","DOI":"10.1109\/TWC.2023.3297014","article-title":"Intent-aware radio resource scheduling in a RAN slicing scenario using reinforcement learning","volume":"23","author":"Nahum","year":"2024","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"5162","DOI":"10.1109\/TMC.2023.3303017","article-title":"DetFed: Dynamic resource scheduling for deterministic federated learning over time-sensitive networks","volume":"23","author":"Yang","year":"2024","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"876","DOI":"10.1016\/j.swevo.2018.09.008","article-title":"Particle swarm optimized density-based clustering and classification: Supervised and unsupervised learning approaches","volume":"44","author":"Guan","year":"2019","journal-title":"Swarm Evol. Comput."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1080\/00031305.2016.1164756","article-title":"On the conditional distribution of the multivariate t distribution","volume":"70","author":"Ding","year":"2016","journal-title":"Am. Stat."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"806","DOI":"10.1109\/LWC.2022.3146207","article-title":"Digital twin-aided intelligent offloading with edge selection in mobile edge computing","volume":"11","author":"Dobre","year":"2022","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"212304","DOI":"10.1007\/s11432-022-3635-2","article-title":"A DHR executor selection algorithm based on historical credibility and dissimilarity clustering","volume":"66","author":"Shao","year":"2023","journal-title":"Sci. China Inf. Sci."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"5064","DOI":"10.1109\/TNNLS.2022.3207346","article-title":"Deep reinforcement learning: A survey","volume":"35","author":"Wang","year":"2024","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11831-021-09531-8","article-title":"A comparative study of recent multi-objective metaheuristics for solving constrained truss optimisation problems","volume":"28","author":"Panagant","year":"2021","journal-title":"Arch. Comput. Methods Eng."},{"key":"ref_25","first-page":"16","article-title":"A novel effective lightweight homomorphic cryptographic algorithm for data security in cloud computing","volume":"3","author":"Thabit","year":"2022","journal-title":"Int. J. Intell. Netw."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"2245","DOI":"10.1016\/j.matpr.2021.11.383","article-title":"An investigation of various applications and related challenges in cloud computing","volume":"51","author":"Pallathadka","year":"2022","journal-title":"Mater. Today Proc."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"102622","DOI":"10.1016\/j.telpol.2023.102622","article-title":"The future of 5G and beyond: Leadership, deployment and European policies","volume":"47","author":"Parcu","year":"2023","journal-title":"Telecommun. Policy"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"236","DOI":"10.23919\/JCC.2021.07.019","article-title":"Joint computing and communication resource allocation for satellite communication networks with edge computing","volume":"18","author":"Zhang","year":"2021","journal-title":"China Commun."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1109\/JPROC.2021.3053601","article-title":"A tutorial on ultrareliable and low-latency communications in 6G: Integrating domain knowledge into deep learning","volume":"109","author":"She","year":"2021","journal-title":"Proc. IEEE"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1038\/nature14236","article-title":"Human-level control through deep reinforcement learning","volume":"518","author":"Mnih","year":"2015","journal-title":"Nature"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/17\/11\/1960\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T10:30:21Z","timestamp":1763116221000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/17\/11\/1960"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,14]]},"references-count":30,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2025,11]]}},"alternative-id":["sym17111960"],"URL":"https:\/\/doi.org\/10.3390\/sym17111960","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,14]]}}}