Network security defense method and system, effect evaluation method and related device thereof

According to the technical scheme, the influence of generalized disturbance on the second strategy is eliminated by using the first strategy comprising encoding, decoding and memory elimination strategies, correct calculation, storage and communication of the data are realized by acting the second s...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: HE LEI, ZHOU JINSUO, ZHANG WEILI, GUO YIWEI, ZHOU JUN, DING RUIHAO, WU JIANGXING, REN QUAN, FU MIN
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:According to the technical scheme, the influence of generalized disturbance on the second strategy is eliminated by using the first strategy comprising encoding, decoding and memory elimination strategies, correct calculation, storage and communication of the data are realized by acting the second strategy on the data, and the generalized disturbance is used as an external cause, so the internal cause of the fault of the second strategy can be activated, and error and failure are generated, so the error and failure caused by the activated fault can be corrected through the first strategy, andthe first strategy is obtained through adjustment of the feedback control strategy triggered by the decoding result of the processed data; therefore, a closed loop is formed between the steps, and theendogenous security problem is solved without external software and hardware. In conclusion, according to the technical scheme provided by the invention, the endogenous safety problem can be solved through an endogenous safet