Front cover image for Autonomous cyber deception : reasoning, adaptive planning, and evaluation of HoneyThings

Autonomous cyber deception : reasoning, adaptive planning, and evaluation of HoneyThings

Ehab S. Al-Shaer (Author), Jinpeng Wei (Author), Kevin Hamlen (Author), Cliff Wang (Author)
This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception. An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced, . This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It?s also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced. -- Provided by publisher
Print Book, English, 2019
Springer, Cham, Switzerland, 2019
xvi, 235 pages : illustrations (some color) ; 25 cm
9783030021092, 3030021092
Using Deep Learning to Generate Relational HoneyData
Towards Intelligent Cyber Deception Systems
Honeypot Deception Tactics
Modeling and Analysis of Deception Games based on Hypergame Theory
Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception
CONCEAL: A Strategy Composition for Resilient Cyber Deception Framework, Metrics and Deployment
NetShifter: A Comprehensive Multi-Dimensional Network Obfuscation and Deception Solution
Deception-Enhanced Threat Sensing for Resilient Intrusion Detection.- 9 HONEYSCOPE: IoT Device Protection with Deceptive Network Views
gExtractor: Automated Extraction of Malware Deception Parameters for Autonomous Cyber Deception
Malware Deception with Automatic Analysis and Generation of HoneyResource