語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cyberspace mimic defensegeneralized ...
~
SpringerLink (Online service)
Cyberspace mimic defensegeneralized robust control and endogenous security /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Cyberspace mimic defenseby Jiangxing Wu.
其他題名:
generalized robust control and endogenous security /
作者:
Wu, Jiangxing.
出版者:
Cham :Springer International Publishing :2020.
面頁冊數:
l, 735 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
標題:
Data protection.
電子資源:
https://doi.org/10.1007/978-3-030-29844-9
ISBN:
9783030298449$q(electronic bk.)
Cyberspace mimic defensegeneralized robust control and endogenous security /
Wu, Jiangxing.
Cyberspace mimic defense
generalized robust control and endogenous security /[electronic resource] :by Jiangxing Wu. - Cham :Springer International Publishing :2020. - l, 735 p. :ill., digital ;24 cm. - Wireless networks,2366-1186. - Wireless networks..
1 Security Risks from Vulnerabilities and Backdoors -- 2 Formal Description of Cyber Attacks -- 3 Conventional Defense Technologies -- 4 New Approaches to Cyber Defense -- 5 Analysis of diversity, randomness and dynamicity -- 6 Revelation of Heterogeneous Redundancy Architecture -- 7 DHR Architecture -- 8 Original Meaning and Vision of Mimic Defense -- 9 Theory of Cyberspace Mimic Defense -- 10 Engineering & Implementation of Mimic Defense -- 11 Foundation and Cost of Mimic Defense -- 12 Examples of Mimic Defense Application -- 13 Testing and Evaluation of the Mimic Defense Principle Verification System -- 14 Application Demonstration and Current Network Testing of Mimic Defense.
This book discusses uncertain threats, which are caused by unknown attacks based on unknown vulnerabilities or backdoors in the information system or control devices and software/hardware. Generalized robustness control architecture and the mimic defense mechanisms are presented in this book, which could change "the easy-to-attack and difficult-to-defend game" in cyberspace. The endogenous uncertain effects from the targets of the software/hardware based on this architecture can produce magic "mimic defense fog", and suppress in a normalized mode random disturbances caused by physical or logic elements, as well as effects of non-probability disturbances brought by uncertain security threats. This book provides a solution both in theory and engineering implementation to the difficult problem of how to avoid the uncontrollability of product security caused by globalized marketing, COTS and non-trustworthy software/hardware sources. It has been proved that this revolutionary enabling technology has endowed software/hardware products in IT/ICT/CPS with endogenous security functions and has overturned the attack theories and methods based on hardware/software design defects or resident malicious codes. This book is designed for educators, theoretical and technological researchers in cyber security and autonomous control and for business technicians who are engaged in the research on developing a new generation of software/hardware products by using endogenous security enabling technologies and for other product users. Postgraduates in IT/ICT/CPS/ICS will discover that (as long as the law of "structure determines the nature and architecture determines the security is properly used), the problem of software/hardware design defects or malicious code embedding will become the swelling of Achilles in the process of informationization and will no longer haunt Pandora's box in cyberspace. Security and opening-up, advanced progressiveness and controllability seem to be contradictory, but there can be theoretically and technologically unified solutions to the problem.
ISBN: 9783030298449$q(electronic bk.)
Standard No.: 10.1007/978-3-030-29844-9doiSubjects--Topical Terms:
202312
Data protection.
LC Class. No.: QA76.9.A25 / W85 2020
Dewey Class. No.: 005.8
Cyberspace mimic defensegeneralized robust control and endogenous security /
LDR
:03818nmm a2200337 a 4500
001
592794
003
DE-He213
005
20200702073523.0
006
m d
007
cr nn 008maaau
008
210727s2020 sz s 0 eng d
020
$a
9783030298449$q(electronic bk.)
020
$a
9783030298432$q(paper)
024
7
$a
10.1007/978-3-030-29844-9
$2
doi
035
$a
978-3-030-29844-9
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
W85 2020
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
W959 2020
100
1
$a
Wu, Jiangxing.
$3
884030
245
1 0
$a
Cyberspace mimic defense
$h
[electronic resource] :
$b
generalized robust control and endogenous security /
$c
by Jiangxing Wu.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
l, 735 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Wireless networks,
$x
2366-1186
505
0
$a
1 Security Risks from Vulnerabilities and Backdoors -- 2 Formal Description of Cyber Attacks -- 3 Conventional Defense Technologies -- 4 New Approaches to Cyber Defense -- 5 Analysis of diversity, randomness and dynamicity -- 6 Revelation of Heterogeneous Redundancy Architecture -- 7 DHR Architecture -- 8 Original Meaning and Vision of Mimic Defense -- 9 Theory of Cyberspace Mimic Defense -- 10 Engineering & Implementation of Mimic Defense -- 11 Foundation and Cost of Mimic Defense -- 12 Examples of Mimic Defense Application -- 13 Testing and Evaluation of the Mimic Defense Principle Verification System -- 14 Application Demonstration and Current Network Testing of Mimic Defense.
520
$a
This book discusses uncertain threats, which are caused by unknown attacks based on unknown vulnerabilities or backdoors in the information system or control devices and software/hardware. Generalized robustness control architecture and the mimic defense mechanisms are presented in this book, which could change "the easy-to-attack and difficult-to-defend game" in cyberspace. The endogenous uncertain effects from the targets of the software/hardware based on this architecture can produce magic "mimic defense fog", and suppress in a normalized mode random disturbances caused by physical or logic elements, as well as effects of non-probability disturbances brought by uncertain security threats. This book provides a solution both in theory and engineering implementation to the difficult problem of how to avoid the uncontrollability of product security caused by globalized marketing, COTS and non-trustworthy software/hardware sources. It has been proved that this revolutionary enabling technology has endowed software/hardware products in IT/ICT/CPS with endogenous security functions and has overturned the attack theories and methods based on hardware/software design defects or resident malicious codes. This book is designed for educators, theoretical and technological researchers in cyber security and autonomous control and for business technicians who are engaged in the research on developing a new generation of software/hardware products by using endogenous security enabling technologies and for other product users. Postgraduates in IT/ICT/CPS/ICS will discover that (as long as the law of "structure determines the nature and architecture determines the security is properly used), the problem of software/hardware design defects or malicious code embedding will become the swelling of Achilles in the process of informationization and will no longer haunt Pandora's box in cyberspace. Security and opening-up, advanced progressiveness and controllability seem to be contradictory, but there can be theoretically and technologically unified solutions to the problem.
650
0
$a
Data protection.
$3
202312
650
0
$a
Wireless communication systems.
$3
182744
650
0
$a
Mobile communication systems.
$3
182488
650
0
$a
Electrical engineering.
$3
454503
650
1 4
$a
Security.
$3
760527
650
2 4
$a
Wireless and Mobile Communication.
$3
820685
650
2 4
$a
Communications Engineering, Networks.
$3
273745
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
830
0
$a
Wireless networks.
$3
731203
856
4 0
$u
https://doi.org/10.1007/978-3-030-29844-9
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000192785
電子館藏
1圖書
電子書
EB QA76.9.A25 W959 2020 2020
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/978-3-030-29844-9
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入