Cyberspace Mimic Defense: Generalized Robust Control and Endogenous Security: Wireless Networks
Autor Jiangxing Wuen Limba Engleză Paperback – 17 ian 2021
This book discusses uncertain threats, which are caused by unknown attacks based on unknown vulnerabilities or backdoors in the information system or control devices and software/hardware. Generalized robustness control architecture and the mimic defense mechanisms are presented in this book, which could change “the easy-to-attack and difficult-to-defend game” in cyberspace. The endogenous uncertain effects from the targets of the software/hardware based on this architecture can produce magic “mimic defense fog”, and suppress in a normalized mode random disturbances caused by physical or logic elements, as well as effects of non-probability disturbances brought by uncertain security threats.
This book provides a solution both in theory and engineering implementation to the difficult problem of how to avoid the uncontrollability of product security caused by globalized marketing, COTS and non-trustworthy software/hardware sources. It has been proved that this revolutionary enabling technology has endowed software/hardware products in IT/ICT/CPS with endogenous security functions and has overturned the attack theories and methods based on hardware/software design defects or resident malicious codes.
This book is designed for educators, theoretical and technological researchers in cyber security and autonomous control and for business technicians who are engaged in the research on developing a new generation of software/hardware products by using endogenous security enabling technologies and for other product users. Postgraduates in IT/ICT/CPS/ICS will discover that (as long as the law of “structure determines the nature and architecture determines the security is properly used), the problem of software/hardware design defects or malicious code embedding will become the swelling of Achilles in the process of informationization and will no longer haunt Pandora’s box in cyberspace. Security and opening-up, advanced progressiveness and controllability seem to be contradictory, but there can be theoretically and technologically unified solutions to the problem.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 1269.56 lei 6-8 săpt. | |
Springer International Publishing – 17 ian 2021 | 1269.56 lei 6-8 săpt. | |
Hardback (1) | 1276.19 lei 6-8 săpt. | |
Springer International Publishing – 19 dec 2019 | 1276.19 lei 6-8 săpt. |
Din seria Wireless Networks
- 20% Preț: 632.08 lei
- 20% Preț: 798.27 lei
- 18% Preț: 1193.37 lei
- 20% Preț: 965.86 lei
- 20% Preț: 865.27 lei
- 20% Preț: 1142.04 lei
- 15% Preț: 629.52 lei
- Preț: 378.08 lei
- 15% Preț: 623.93 lei
- 20% Preț: 1024.85 lei
- Preț: 382.16 lei
- 18% Preț: 712.93 lei
- 18% Preț: 992.31 lei
- 20% Preț: 742.47 lei
- 15% Preț: 620.21 lei
- 20% Preț: 306.62 lei
- 18% Preț: 712.30 lei
- 24% Preț: 794.49 lei
- 20% Preț: 632.73 lei
- 20% Preț: 799.69 lei
- 15% Preț: 620.21 lei
- 20% Preț: 634.04 lei
- 20% Preț: 646.36 lei
- 18% Preț: 871.88 lei
- 18% Preț: 712.76 lei
- 20% Preț: 968.44 lei
- 18% Preț: 877.61 lei
- 18% Preț: 983.83 lei
- 18% Preț: 710.14 lei
- Preț: 447.84 lei
- 20% Preț: 633.72 lei
- 20% Preț: 553.25 lei
- 18% Preț: 715.40 lei
- 18% Preț: 762.39 lei
- 15% Preț: 627.75 lei
- 18% Preț: 711.85 lei
- 18% Preț: 766.11 lei
- 18% Preț: 771.83 lei
- 20% Preț: 563.08 lei
- 24% Preț: 784.38 lei
- 20% Preț: 1138.80 lei
- 20% Preț: 630.29 lei
- 20% Preț: 964.88 lei
- 20% Preț: 310.17 lei
Preț: 1269.56 lei
Preț vechi: 1586.95 lei
-20% Nou
Puncte Express: 1904
Preț estimativ în valută:
242.97€ • 252.38$ • 201.82£
242.97€ • 252.38$ • 201.82£
Carte tipărită la comandă
Livrare economică 01-15 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030298463
ISBN-10: 3030298469
Ilustrații: L, 735 p. 306 illus., 241 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 1.08 kg
Ediția:1st ed. 2020
Editura: Springer International Publishing
Colecția Springer
Seria Wireless Networks
Locul publicării:Cham, Switzerland
ISBN-10: 3030298469
Ilustrații: L, 735 p. 306 illus., 241 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 1.08 kg
Ediția:1st ed. 2020
Editura: Springer International Publishing
Colecția Springer
Seria Wireless Networks
Locul publicării:Cham, Switzerland
Cuprins
1 Security Risks from Vulnerabilities and Backdoors.- 2 Formal Description of Cyber Attacks.- 3 Conventional Defense Technologies.- 4 New Approaches to Cyber Defense.- 5 Analysis of diversity, randomness and dynamicity.- 6 Revelation of Heterogeneous Redundancy Architecture.- 7 DHR Architecture.- 8 Original Meaning and Vision of Mimic Defense.- 9 Theory of Cyberspace Mimic Defense.- 10 Engineering & Implementation of Mimic Defense.- 11 Foundation and Cost of Mimic Defense.- 12 Examples of Mimic Defense Application.- 13 Testing and Evaluation of the Mimic Defense Principle Verification System.- 14 Application Demonstration and Current Network Testing of Mimic Defense.
Notă biografică
Jiangxing WU serves as the Director of China National Digital Switching System Engineering & Technological R&D Center. He was elected as a Fellow of China Academy of Engineering in 2003. As a renowned expert in information & communication and network switching in China, he has played an important role in China and worked as the Vice Director in the communication section and the Vice Director of the Expert Board in the information section in the 8th, 9th, 10th and 11th Five-year Plans of China National High-tech R&D Program (863 Program); he has been the General Director of the High Speed Information Demonstration Network(CAINONet) , 3TNet, the Next Generation Broadcasting Network (NGB) and the New Concept High-efficient Computer System and Architecture R&D. He took charge of the New Generation High Credibility Network and Flexible Reconfiguration Network and served as the Director of the Technical Board of the Mobile Communication for the National Key Technologies R&D Program and the First Vice Director of the Expert Board of the National Tri-network Convergence Committee. From 1990s, after the great success of the first high capacity Digital SPC Switching System in China, Jiangxing Wu successively presided over the development of the first high-speed core router in China, the world’s first massive Access Convergence Router (ACR) and information communication core infrastructure of the Flexible Reconfiguration Network. In 2013 he first launched the high-efficient computer prototype based on Mimic Computing and the theory of Cyberspace Mimic Defense, which went successfully through the test and assessment in 2016.He was awarded the First Prize for National Science and Technological Progress for three times and the Second Prize for the National Science and Technological Progress for four times in addition to the First Prize of the National Teaching Achievement Award. He received the Prize for Scientific and Technological Progress from Ho Leung Ho Lee Foundation in 1995 and the Prize for Scientific and Technological Achievements from the same foundation in 2015. Wu’s team was awarded four times with the First Prize of th National Science and Technology Progress Award, nine times with the Second Prize of the National Science and Technology Progress Award and recognized in honor as the Innovation Team of State Science and Technology Progress Award in 2015.
Textul de pe ultima copertă
This book discusses uncertain threats, which are caused by unknown attacks based on unknown vulnerabilities or backdoors in the information system or control devices and software/hardware. Generalized robustness control architecture and the mimic defense mechanisms are presented in this book, which could change “the easy-to-attack and difficult-to-defend game” in cyberspace. The endogenous uncertain effects from the targets of the software/hardware based on this architecture can produce magic “mimic defense fog”, and suppress in a normalized mode random disturbances caused by physical or logic elements, as well as effects of non-probability disturbances brought by uncertain security threats.
This book provides a solution both in theory and engineering implementation to the difficult problem of how to avoid the uncontrollability of product security caused by globalized marketing, COTS and non-trustworthy software/hardware sources. It has been proved that this revolutionary enabling technology has endowed software/hardware products in IT/ICT/CPS with endogenous security functions and has overturned the attack theories and methods based on hardware/software design defects or resident malicious codes.
This book is designed for educators, theoretical and technological researchers in cyber security and autonomous control and for business technicians who are engaged in the research on developing a new generation of software/hardware products by using endogenous security enabling technologies and for other product users. Postgraduates in IT/ICT/CPS/ICS will discover that (as long as the law of “structure determines the nature and architecture determines the security is properly used), the problem of software/hardware design defects or malicious code embedding will become the swelling of Achilles in the process of informationization and will no longer haunt Pandora’s box in cyberspace. Security and opening-up, advanced progressiveness and controllability seem to be contradictory, but there can be theoretically and technologically unified solutions to the problem.
Caracteristici
Presents an endogenous security defense mechanism entitled "Cyber Mimic Defense" Offers a complete theoretical framework of Cyberspace Mimic Defense and Dynamic Heterogeneous Redundancy model Introduces several typical application scenarios of Cyber Mimic Defense with efficiency evaluation