Abstract
DHR, as an innovative and simplified system architecture, can provide general robust control which is not seen in a conventional mode. Not relying on any a priori knowledge and additional security support, it can normalize all uncertain disturbances caused by random faults or attacks based on vulnerabilities or backdoors as classic reliability problems and handle them in the same approach. With its inherent “uncertainty” effect, the DHR framework has an intrinsic defensive function—“invisibility.” Such invisibility is related not only to the redundancy, heterogeneity, and multimode output vector grammar and semantic abundance of the executors under functional equivalence conditions but also to the multimode decision algorithm set; the executor scheduling policy; the cleaning, restoration, and reorganization and restructuring mechanism; as well as the application of traditional security technology. So now the question is: what driving mechanism and gaming strategy should be adopted to get the desired endogenous security defense effect? The earth biosphere that has been naturally evolving for hundreds of millions of years usually provides a perspective of solving the problem and enlightening us on our creative thinking.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Wu, J. (2020). Original Meaning and Vision of Mimic Defense. In: Cyberspace Mimic Defense. Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-030-29844-9_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-29844-9_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-29843-2
Online ISBN: 978-3-030-29844-9
eBook Packages: Computer ScienceComputer Science (R0)