Skip to main content

Testing and Evaluation of the Mimic Defense Principle Verification System

  • Chapter
  • First Online:
Cyberspace Mimic Defense

Part of the book series: Wireless Networks ((WN))

Abstract

In March 2014, China National Digital Switching System Engineering and Technological Research Center (NDSC), together with No.32 Research Institute of China Electronic Technology Group Corporation (CECT), Zhejiang University (ZJU), Fudan University, Shanghai Jiao Tong University (SJTU), Shenzhen ZTE Corporation, Wuhan FiberHome Telecommunication Technologies Co. Ltd., Chengdu Maipu Communication Technology Co., Ltd., etc., undertook the research and development of the “cyberspace mimic defense principle verification system,” an assignment issued by Shanghai Municipal Science and Technology Commission. The assignment aims to verify the effectiveness and applicability of the mimic defense principle in the field of information and communication networks. For this purpose, it was broken down into two subjects of study: one is the mimic defense principle verification in the router environment (or mimic-structured router) for specific purposes; the other is the mimic defense principle verification in the web server environment (or mimic-structured web server) for general purposes. In November 2015, the R&D teams completed their verification systems, respectively, and conducted self-tests. In December 2015, Shanghai Municipal Science and Technology Commission submitted an application to the Ministry of Science and Technology of the People’s Republic of China for testing of the systems. In January 2016, the Ministry of Science and Technology officially approved the application, and then Shanghai Municipal Science and Technology Commission started the joint test and evaluation of the mimic defense principle verification systems. It is hereby declared that the data and information of this chapter mainly come from the records and documents generated during the test and evaluation processes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Wu, J. (2020). Testing and Evaluation of the Mimic Defense Principle Verification System. In: Cyberspace Mimic Defense. Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-030-29844-9_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-29844-9_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-29843-2

  • Online ISBN: 978-3-030-29844-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics