network security
Shanghai on November 13 (xinhua) (Li Yun, yeung sum) authorized by the Ministry of Science and Technology commission of Shanghai organization test evaluation, the PLA information engineering university, fudan university, zhejiang university and the institute of information engineering, Chinese Academy of Sciences and other scientific research team jointly bear the national "863 project" key project of research method and the core theory of "cyberspace mimicry defense" in the near future through the verification, evaluation results and the theoretical expectations perfectly, this symbolized our country get significant theory and method innovation in the field of network defense, will break the network space "to attack difficulty keep" strategic pattern, change the network security rules of the game,
Mimicry, refers to a kind of another kind of creature or biological simulation environment of the phenomenon, in 2008, the Chinese Academy of Engineering jiang-xing wu from the stripe octopus can imitate a dozen inspired by Marine life form and behavior, this article puts forward the idea of r&d mimicry computer, under the Ministry of Science and Technology and Shanghai to support successful mimicry calculation principle prototype was named "2013 China top ten scientific and technological progress", on this basis, the research and development team and other major security threat to network space uncertainty problems, based on mimicry of active defense and achieved a major breakthrough in the theory study, the proposed "dynamic heterogeneous redundancy system architecture", can be based on the uncertainty of unknown hole back door threat known or unknown risks into very small probability events,
January 2016, composed of nine domestic authoritative evaluation institutions joint test validation team, on the principle of mimicry defense authentication system for a period of 6 months verification test, 21 members and more than 110 experts in various stages of the evaluation work, evaluation expert committee issued "principle of mimicry defense authentication system evaluation opinions" think: mimicry defense mechanism to be independent and effective way of dealing with or against based on vulnerability, the back door known risks or uncertain threat, such as the measurement system to achieve expected mimicry defense theory, and make use of "toxic pathogen" component implementation can tube control information system, based on "the back door engineering and hidden holes" subversive "seller's market" offensive strategy significance,
Jiang-xing wu said that China is one of the most serious countries of network attack, according to the national emergency center, according to the Internet only sampling monitoring in 2015, our country has more than 19.78 million hosts by 10. More than 50000 Trojan and botnet control remote control, as a result of the existing network defense system USES is "acquired immune mechanism", "dead sheep", the first to pass patch, FengMen plugging to "fill up", that can't perception and cognition of network attack almost unprotected, and mimicry defense theory and the method can effectively deal with these problems,
Mimicry jiang-xing wu also said that the cyberspace defense theory and method is the common wealth of mankind, the Chinese scientists willing to put this technology to share the rest of the world, contribute to build cyberspace community of fate,
CodePudding user response:
Mimicry technology even unknown vulnerabilities, the virus can be found and prevention, mimicry technology really so bad?