000 04800nam a22005775i 4500
001 978-3-030-29844-9
003 DE-He213
005 20240423125309.0
007 cr nn 008mamaa
008 191202s2020 sz | s |||| 0|eng d
020 _a9783030298449
_9978-3-030-29844-9
024 7 _a10.1007/978-3-030-29844-9
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
100 1 _aWu, Jiangxing.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aCyberspace Mimic Defense
_h[electronic resource] :
_bGeneralized Robust Control and Endogenous Security /
_cby Jiangxing Wu.
250 _a1st ed. 2020.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2020.
300 _aL, 735 p. 306 illus., 241 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aWireless Networks,
_x2366-1445
505 0 _a1 Security Risks from Vulnerabilities and Backdoors -- 2 Formal Description of Cyber Attacks -- 3 Conventional Defense Technologies -- 4 New Approaches to Cyber Defense -- 5 Analysis of diversity, randomness and dynamicity -- 6 Revelation of Heterogeneous Redundancy Architecture -- 7 DHR Architecture -- 8 Original Meaning and Vision of Mimic Defense -- 9 Theory of Cyberspace Mimic Defense -- 10 Engineering & Implementation of Mimic Defense -- 11 Foundation and Cost of Mimic Defense -- 12 Examples of Mimic Defense Application -- 13 Testing and Evaluation of the Mimic Defense Principle Verification System -- 14 Application Demonstration and Current Network Testing of Mimic Defense.
520 _aThis book discusses uncertain threats, which are caused by unknown attacks based on unknown vulnerabilities or backdoors in the information system or control devices and software/hardware. Generalized robustness control architecture and the mimic defense mechanisms are presented in this book, which could change “the easy-to-attack and difficult-to-defend game” in cyberspace. The endogenous uncertain effects from the targets of the software/hardware based on this architecture can produce magic “mimic defense fog”, and suppress in a normalized mode random disturbances caused by physical or logic elements, as well as effects of non-probability disturbances brought by uncertain security threats. This book provides a solution both in theory and engineering implementation to the difficult problem of how to avoid the uncontrollability of product security caused by globalized marketing, COTS and non-trustworthy software/hardware sources. It has been proved that this revolutionary enabling technology has endowed software/hardware products in IT/ICT/CPS with endogenous security functions and has overturned the attack theories and methods based on hardware/software design defects or resident malicious codes. This book is designed for educators, theoretical and technological researchers in cyber security and autonomous control and for business technicians who are engaged in the research on developing a new generation of software/hardware products by using endogenous security enabling technologies and for other product users. Postgraduates in IT/ICT/CPS/ICS will discover that (as long as the law of “structure determines the nature and architecture determines the security is properly used), the problem of software/hardware design defects or malicious code embedding will become the swelling of Achilles in the process of informationization and will no longer haunt Pandora’s box in cyberspace. Security and opening-up, advanced progressiveness and controllability seem to be contradictory, but there can be theoretically and technologically unified solutions to the problem.
650 0 _aData protection.
650 0 _aWireless communication systems.
650 0 _aMobile communication systems.
650 0 _aTelecommunication.
650 1 4 _aData and Information Security.
650 2 4 _aWireless and Mobile Communication.
650 2 4 _aCommunications Engineering, Networks.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030298432
776 0 8 _iPrinted edition:
_z9783030298456
776 0 8 _iPrinted edition:
_z9783030298463
830 0 _aWireless Networks,
_x2366-1445
856 4 0 _uhttps://doi.org/10.1007/978-3-030-29844-9
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c176418
_d176418