China’s network defense technology is a major breakthrough will change the rules of the game – Sohu -kasey chase

China network defense technology was a major breakthrough: to change the rules of the game – the Sohu Liberation Army Shanghai Military Channel 13, November: assessment by the Ministry of science and technology organizations authorized by the Shanghai Municipal Science and Technology Commission, by the The PLA Information Engineering University, Fudan University, Zhejiang University and Chinese Academy of Sciences and Information Engineering Institute and other units of the joint research team of the national "863 Program" key the research results of the project — "cyberspace defense theory and the core method of Mimicry" recently validated, the evaluation results are consistent with theoretical expectations. This indicates that China has achieved significant theoretical and methodological innovation in the field of network defense, will break the network space easy to attack difficult to defend the strategic pattern, change the rules of the network security game. Mimicry, refers to a biological simulation of another organism or environment phenomenon. On 2008, academician of Academy of engineering, The PLA Information Engineering University professor Wu Jiangxing Chinese from fringe Octopus inspired by imitation dozens of marine morphology and behavior, put forward the idea of pseudo computer research. In the city of Shanghai and the Ministry of science and technology support, calculation principle prototype successfully developed mimicry and selected "2013 annual China ten advances in science and technology". On this basis, the research team for the network spatial uncertainty of threats and other major safety problems, carry out active defense mimicry based on theoretical research and achieved a major breakthrough, a framework is put forward to the network space unknown risks unknown backdoor vulnerabilities uncertainty or threat based on the known as small probability events. In January 2016, a joint test verification team consists of 9 domestic authoritative evaluation agencies, to validate the system defense principle mimicry for a period of 6 months of testing, there are 21 academicians and more than 110 experts participated in the evaluation work in different stages. In August 2016, the evaluation opinions given evaluation committee consists of 53 experts think: pseudo defense mechanism independently and effectively deal with or against the back door vulnerabilities, based on the known risks or uncertain threat; measured by the system to achieve the desired pseudo defense theory, and make use of "toxic bacteria" component to realize the controllable information system be based on "back door engineering and hidden loopholes" and "seller’s market" strategic offensive subversive significance. Academician Wu Jiangxing said that China is one of the countries suffered the most serious cyber attacks. Due to the use of network defense system is the "acquired immune mechanism", "sheep to fill", almost undefended for perceptual or cognitive network attack and defense, the theory and method of mimicry is able to effectively deal with these known or unknown threats. He also said, "pseudo defense" theory and method of network space is the common wealth of mankind, this technology China scientists are willing to share with the world, make a contribution to the construction of cyberspace community of destiny.相关的主题文章: