Cyberspace Endogenous Safety and Security

Jiangxing Wu

Engineering ›› 2022, Vol. 15 ›› Issue (8) : 179-185.

PDF(536 KB)
PDF(536 KB)
Engineering ›› 2022, Vol. 15 ›› Issue (8) : 179-185. DOI: 10.1016/j.eng.2021.05.015
Research
Article

Cyberspace Endogenous Safety and Security

Author information +
History +

Abstract

Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace. This paper analyzes the philosophical and technical causes of the existence of so-called “dark functions” such as system vulnerabilities and backdoors, and points out that endogenous security problems cannot be completely eliminated at the theoretical and engineering levels; rather, it is necessary to develop or utilize the endogenous security functions of the system architecture itself. In addition, this paper gives a definition for and lists the main technical characteristics of endogenous safety and security in cyberspace, introduces endogenous security mechanisms and characteristics based on dynamic heterogeneous redundancy (DHR) architecture, and describes the theoretical implications of a coding channel based on DHR.

Keywords

Cyberspace endogenous security problem / Uncertain threat / Cyberspace endogenous safety and security / Relative right axiom / Dynamic heterogeneous redundant architecture

Cite this article

Download citation ▾
Jiangxing Wu. Cyberspace Endogenous Safety and Security. Engineering, 2022, 15(8): 179‒185 https://doi.org/10.1016/j.eng.2021.05.015

References

[1]
Wu J. [Introduction to cyberspace mimic defense]. Beijing: Science Press; 2017. Chinese.
[2]
Wu J. [Principle of cyberspace mimic defense: endogenous safety–security & generalized robust control]. Beijing: Science Press; 2018. Chinese.
[3]
Wu J. Cyberspace mimic defense: generalized robust control and endogenous safety–security. Berlin: Springer International Publishing; 2019.
[4]
Wu J. [Endogenous safety and security in cyberspace: mimic defense and generalized robust control]. Beijing: Science Press; 2020. Chinese.
[5]
Nie C, Zhao X, Chen K, Han Z. An Software vulnerability number prediction model based on micro-parameters. Comput Res Dev 2011;48(7):1279–87. Chinese.
[6]
Shannon CE, Weaver W. The mathematical theory of communication. Urbana: University of Illinois Press; 1949.
AI Summary AI Mindmap
PDF(536 KB)

Accesses

Citations

Detail

Sections
Recommended

/