11.2.2 拟态安全防御