China's network defense technology has made major breakthroughs or changed network security rules

The test results of the Shanghai Science and Technology Commission authorized by the Ministry of Science and Technology, the research results of the national "863 Program" key projects jointly undertaken by the PLA Information Engineering University, Fudan University, Zhejiang University and the Institute of Information Engineering of the Chinese Academy of Sciences The mimetic defense theory and core method have recently passed verification, and the evaluation results are in complete agreement with the theoretical expectations. This indicates that China has made major theoretical and methodological innovations in the field of cyber defense, which will break the strategic pattern of cyberspace “easy to attack and defend” and change the rules of cybersecurity games.

Mimicry refers to a phenomenon in which a creature simulates another organism or environment. In 2008, Li Jiangxing, an academician of the Chinese Academy of Engineering, was inspired by the pattern and behavior of striped octopus that could imitate more than a dozen marine organisms, and proposed the idea of ​​developing a mimetic computer. With the joint support of the Ministry of Science and Technology and Shanghai, the prototype of the mimetic calculation principle was successfully selected and selected as “2013 China's Top Ten Scientific and Technological Progress”. On this basis, the R&D team carried out research on active defense theory based on mimic camouflage for major security issues such as cyberspace uncertainty threats and made major breakthroughs. The proposed “dynamic heterogeneous redundancy architecture” can be based on unknowns. The uncertainty threat of the backdoor of the vulnerability or the known unknown risk becomes a very small probability event.

Since January 2016, a joint test and verification team consisting of 9 authoritative evaluation agencies in China has conducted a six-month verification test on the mimicry defense principle verification system. 21 academicians and more than 110 experts have participated in different stages. Evaluation work. According to the evaluation opinion of the “Mixed Defense Principle Verification System” issued by the Evaluation Expert Committee, the mimicry defense mechanism can independently and effectively respond to or defend against known or uncertain threats based on loopholes and backdoors. The system under test achieves the expectation of mimicry defense theory, and makes it possible to realize the controllable information system by using the "toxic and toxic" components, and it is subversive for the "seller market" offensive strategy based on "backdoor engineering and concealed loopholes".

Qi Jiangxing said that China is one of the countries most suffering from cyber attacks. According to the data of the National Internet Emergency Center, in the sample monitoring in 2015 alone, there were more than 19.78 million mainframes in China controlled by more than 105,000 Trojans and botnet control terminals. Because the existing network defense system adopts the "acquired immunity" mechanism, the "dead sheep" can be "reinforced" by patching and sealing the door, and it is almost impossible for cyber attacks that cannot be perceived and recognized. Fortification, and mimetic defense theories and methods can effectively deal with these problems.

Yan Jiangxing also said that the theory and method of cyberspace mimicry defense is the common wealth of all mankind. Chinese scientists are willing to share this technology with the world and contribute to building a community of cyberspace destiny.

Waterproof Speaker

Waterproof Speaker,Waterproof Portable Speaker,Waterproof Wireless Speaker,Outdoor Waterproof Speaker

NINGBO SANCO ELECTRONICS CO., LTD. , https://www.sancobuzzer.com