Cyberspace Mimic Defense Generalized Robust Control and Endogenous Security /

This book discusses uncertain threats, which are caused by unknown attacks based on unknown vulnerabilities or backdoors in the information system or control devices and software/hardware. Generalized robustness control architecture and the mimic defense mechanisms are presented in this book, which...

Full description

Main Author: Wu, Jiangxing. (Author, http://id.loc.gov/vocabulary/relators/aut)
Corporate Author: SpringerLink (Online service)
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2020.
Edition:1st ed. 2020.
Series:Wireless Networks,
Subjects:
Online Access:https://doi.org/10.1007/978-3-030-29844-9
Table of Contents:
  • 1 Security Risks from Vulnerabilities and Backdoors
  • 2 Formal Description of Cyber Attacks
  • 3 Conventional Defense Technologies
  • 4 New Approaches to Cyber Defense
  • 5 Analysis of diversity, randomness and dynamicity
  • 6 Revelation of Heterogeneous Redundancy Architecture
  • 7 DHR Architecture
  • 8 Original Meaning and Vision of Mimic Defense
  • 9 Theory of Cyberspace Mimic Defense
  • 10 Engineering & Implementation of Mimic Defense
  • 11 Foundation and Cost of Mimic Defense
  • 12 Examples of Mimic Defense Application
  • 13 Testing and Evaluation of the Mimic Defense Principle Verification System
  • 14 Application Demonstration and Current Network Testing of Mimic Defense.