Advertisement

Cyberspace Mimic Defense

Generalized Robust Control and Endogenous Security

  • Jiangxing Wu
Book

Part of the Wireless Networks book series (WN)

Table of contents

  1. Front Matter
    Pages i-l
  2. Part I

    1. Front Matter
      Pages 1-1
    2. Jiangxing Wu
      Pages 39-65
    3. Jiangxing Wu
      Pages 67-111
    4. Jiangxing Wu
      Pages 113-157
    5. Jiangxing Wu
      Pages 273-337
  3. Part II

About this book

Introduction

This book discusses uncertain threats, which are caused by unknown attacks based on unknown vulnerabilities or backdoors in the information system or control devices and software/hardware.  Generalized robustness control architecture and the mimic defense mechanisms are presented in this book, which could change “the easy-to-attack and difficult-to-defend game” in cyberspace. The endogenous uncertain effects from the targets of the software/hardware based on this architecture can produce magic “mimic defense fog”, and suppress in a normalized mode random disturbances caused by physical or logic elements, as well as effects of non-probability disturbances brought by uncertain security threats.

This book provides a solution both in theory and engineering implementation to the difficult problem of how to avoid the uncontrollability of product security caused by globalized marketing, COTS and non-trustworthy software/hardware sources. It has been proved that this revolutionary enabling technology has endowed software/hardware products in IT/ICT/CPS with endogenous security functions and has overturned the attack theories and methods based on hardware/software design defects or resident malicious codes.

This book is designed for educators, theoretical and technological researchers in cyber security and autonomous control and for business technicians who are engaged in the research on developing a new generation of software/hardware products by using endogenous security enabling technologies and for other product users. Postgraduates in IT/ICT/CPS/ICS will discover that (as long as the law of “structure determines the nature and architecture determines the security is properly used), the problem of software/hardware design defects or malicious code embedding will become the swelling of Achilles in the process of informationization and will no longer haunt Pandora’s box in cyberspace. Security and opening-up, advanced progressiveness and controllability seem to be contradictory, but there can be theoretically and technologically unified solutions to the problem.

Keywords

Cyber Security Mimic Defense Dynamic Heterogeneous Redundancy Generalized Robustness Endogenous Security Specific Immunity Heterogeneous Executor Reconfigurable Executor Dissimilar Redundancy Structure Heterogeneous Functionally Equivalent Mobile Attack Surface Mimic Interface Mimic Brackets Mimic Ruling

Authors and affiliations

  • Jiangxing Wu
    • 1
  1. 1.National Digital Switching System Engineering & Technological R & D CenterZhengzhuoChina

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-030-29844-9
  • Copyright Information Springer Nature Switzerland AG 2020
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-030-29843-2
  • Online ISBN 978-3-030-29844-9
  • Series Print ISSN 2366-1186
  • Series Online ISSN 2366-1445
  • Buy this book on publisher's site