Skip to main content

Original Meaning and Vision of Mimic Defense

  • Chapter
  • First Online:
Cyberspace Mimic Defense

Part of the book series: Wireless Networks ((WN))

  • 739 Accesses

Abstract

DHR, as an innovative and simplified system architecture, can provide general robust control which is not seen in a conventional mode. Not relying on any a priori knowledge and additional security support, it can normalize all uncertain disturbances caused by random faults or attacks based on vulnerabilities or backdoors as classic reliability problems and handle them in the same approach. With its inherent “uncertainty” effect, the DHR framework has an intrinsic defensive function—“invisibility.” Such invisibility is related not only to the redundancy, heterogeneity, and multimode output vector grammar and semantic abundance of the executors under functional equivalence conditions but also to the multimode decision algorithm set; the executor scheduling policy; the cleaning, restoration, and reorganization and restructuring mechanism; as well as the application of traditional security technology. So now the question is: what driving mechanism and gaming strategy should be adopted to get the desired endogenous security defense effect? The earth biosphere that has been naturally evolving for hundreds of millions of years usually provides a perspective of solving the problem and enlightening us on our creative thinking.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Wu, J. (2020). Original Meaning and Vision of Mimic Defense. In: Cyberspace Mimic Defense. Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-030-29844-9_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-29844-9_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-29843-2

  • Online ISBN: 978-3-030-29844-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics