Testing and Evaluation of the Mimic Defense Principle Verification System

Jiangxing Wu
DOI: https://doi.org/10.1007/978-3-030-29844-9_13
2020-01-01
Abstract:In March 2014, China National Digital Switching System Engineering and Technological Research Center (NDSC), together with No.32 Research Institute of China Electronic Technology Group Corporation (CECT), Zhejiang University (ZJU), Fudan University, Shanghai Jiao Tong University (SJTU), Shenzhen ZTE Corporation, Wuhan FiberHome Telecommunication Technologies Co. Ltd., Chengdu Maipu Communication Technology Co., Ltd., etc., undertook the research and development of the “cyberspace mimic defense principle verification system,” an assignment issued by Shanghai Municipal Science and Technology Commission. The assignment aims to verify the effectiveness and applicability of the mimic defense principle in the field of information and communication networks. For this purpose, it was broken down into two subjects of study: one is the mimic defense principle verification in the router environment (or mimic-structured router) for specific purposes; the other is the mimic defense principle verification in the web server environment (or mimic-structured web server) for general purposes. In November 2015, the R&D teams completed their verification systems, respectively, and conducted self-tests. In December 2015, Shanghai Municipal Science and Technology Commission submitted an application to the Ministry of Science and Technology of the People’s Republic of China for testing of the systems. In January 2016, the Ministry of Science and Technology officially approved the application, and then Shanghai Municipal Science and Technology Commission started the joint test and evaluation of the mimic defense principle verification systems. It is hereby declared that the data and information of this chapter mainly come from the records and documents generated during the test and evaluation processes.
What problem does this paper attempt to address?