Cyberspace Mimic Defense Generalized Robust Control and Endogenous Security /
This book discusses uncertain threats, which are caused by unknown attacks based on unknown vulnerabilities or backdoors in the information system or control devices and software/hardware. Generalized robustness control architecture and the mimic defense mechanisms are presented in this book, which...
Main Author: | |
---|---|
Corporate Author: | |
Language: | English |
Published: |
Cham :
Springer International Publishing : Imprint: Springer,
2020.
|
Edition: | 1st ed. 2020. |
Series: | Wireless Networks,
|
Subjects: | |
Online Access: | https://doi.org/10.1007/978-3-030-29844-9 |
Table of Contents:
- 1 Security Risks from Vulnerabilities and Backdoors
- 2 Formal Description of Cyber Attacks
- 3 Conventional Defense Technologies
- 4 New Approaches to Cyber Defense
- 5 Analysis of diversity, randomness and dynamicity
- 6 Revelation of Heterogeneous Redundancy Architecture
- 7 DHR Architecture
- 8 Original Meaning and Vision of Mimic Defense
- 9 Theory of Cyberspace Mimic Defense
- 10 Engineering & Implementation of Mimic Defense
- 11 Foundation and Cost of Mimic Defense
- 12 Examples of Mimic Defense Application
- 13 Testing and Evaluation of the Mimic Defense Principle Verification System
- 14 Application Demonstration and Current Network Testing of Mimic Defense.