LEADER 04913nam 22005895 450 001 9910366659103321 005 20200702073523.0 010 $a3-030-29844-2 024 7 $a10.1007/978-3-030-29844-9 035 $a(CKB)4100000009940107 035 $a(DE-He213)978-3-030-29844-9 035 $a(MiAaPQ)EBC5989069 035 $a(PPN)242819540 035 $a(EXLCZ)994100000009940107 100 $a20191202d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyberspace Mimic Defense $eGeneralized Robust Control and Endogenous Security /$fby Jiangxing Wu 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (L, 735 p. 306 illus., 241 illus. in color.) 225 1 $aWireless Networks,$x2366-1186 311 $a3-030-29843-4 327 $a1 Security Risks from Vulnerabilities and Backdoors -- 2 Formal Description of Cyber Attacks -- 3 Conventional Defense Technologies -- 4 New Approaches to Cyber Defense -- 5 Analysis of diversity, randomness and dynamicity -- 6 Revelation of Heterogeneous Redundancy Architecture -- 7 DHR Architecture -- 8 Original Meaning and Vision of Mimic Defense -- 9 Theory of Cyberspace Mimic Defense -- 10 Engineering & Implementation of Mimic Defense -- 11 Foundation and Cost of Mimic Defense -- 12 Examples of Mimic Defense Application -- 13 Testing and Evaluation of the Mimic Defense Principle Verification System -- 14 Application Demonstration and Current Network Testing of Mimic Defense. 330 $aThis book discusses uncertain threats, which are caused by unknown attacks based on unknown vulnerabilities or backdoors in the information system or control devices and software/hardware. Generalized robustness control architecture and the mimic defense mechanisms are presented in this book, which could change ?the easy-to-attack and difficult-to-defend game? in cyberspace. The endogenous uncertain effects from the targets of the software/hardware based on this architecture can produce magic ?mimic defense fog?, and suppress in a normalized mode random disturbances caused by physical or logic elements, as well as effects of non-probability disturbances brought by uncertain security threats. This book provides a solution both in theory and engineering implementation to the difficult problem of how to avoid the uncontrollability of product security caused by globalized marketing, COTS and non-trustworthy software/hardware sources. It has been proved that this revolutionary enabling technology has endowed software/hardware products in IT/ICT/CPS with endogenous security functions and has overturned the attack theories and methods based on hardware/software design defects or resident malicious codes. This book is designed for educators, theoretical and technological researchers in cyber security and autonomous control and for business technicians who are engaged in the research on developing a new generation of software/hardware products by using endogenous security enabling technologies and for other product users. Postgraduates in IT/ICT/CPS/ICS will discover that (as long as the law of ?structure determines the nature and architecture determines the security is properly used), the problem of software/hardware design defects or malicious code embedding will become the swelling of Achilles in the process of informationization and will no longer haunt Pandora?s box in cyberspace. Security and opening-up, advanced progressiveness and controllability seem to be contradictory, but there can be theoretically and technologically unified solutions to the problem. 410 0$aWireless Networks,$x2366-1186 606 $aData protection 606 $aWireless communication systems 606 $aMobile communication systems 606 $aElectrical engineering 606 $aSecurity$3https://scigraph.springernature.com/ontologies/product-market-codes/I28000 606 $aWireless and Mobile Communication$3https://scigraph.springernature.com/ontologies/product-market-codes/T24100 606 $aCommunications Engineering, Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/T24035 615 0$aData protection. 615 0$aWireless communication systems. 615 0$aMobile communication systems. 615 0$aElectrical engineering. 615 14$aSecurity. 615 24$aWireless and Mobile Communication. 615 24$aCommunications Engineering, Networks. 676 $a005.8 700 $aWu$b Jiangxing$4aut$4http://id.loc.gov/vocabulary/relators/aut$0923922 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910366659103321 996 $aCyberspace Mimic Defense$92073405 997 $aUNINA