Research on Cyber Mimic Defense

Jiangxing WU
DOI: https://doi.org/10.19363/j.cnki.cn10-1380/tn.2016.04.001
2016-01-01
Abstract:The unbalance in cyber security and its root is analyzed in this paper, of which a dynamically redundant het-erogeneity architecture and the basic principle to compose an information system of high reliability and high security level with unreliable hardware is mainly discussed. Then, basic concepts about mimic defense is briefly stated. Finally, a test evaluation and preliminary conclusion about the system of mimic defense verification is presented.
What problem does this paper attempt to address?