Autonomous Cyber Deception Reasoning, Adaptive Planning, and Evaluation of HoneyThings /

This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception. An important distinguishing characteristic of this boo...

Full description

Corporate Author: SpringerLink (Online service)
Other Authors: Al-Shaer, Ehab. (Editor, http://id.loc.gov/vocabulary/relators/edt), Wei, Jinpeng. (Editor, http://id.loc.gov/vocabulary/relators/edt), Hamlen, Kevin W. (Editor, http://id.loc.gov/vocabulary/relators/edt), Wang, Cliff. (Editor, http://id.loc.gov/vocabulary/relators/edt)
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2019.
Edition:1st ed. 2019.
Subjects:
Online Access:https://doi.org/10.1007/978-3-030-02110-8
Table of Contents:
  • 1 Using Deep Learning to Generate Relational HoneyData
  • 2 Towards Intelligent Cyber Deception Systems
  • 3 Honeypot Deception Tactics
  • 4 Modeling and Analysis of Deception Games based on Hypergame Theory
  • 5 Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception
  • 6 CONCEAL: A Strategy Composition for Resilient Cyber Deception - Framework, Metrics and Deployment
  • 7 NetShifter - A Comprehensive Multi-Dimensional Network Obfuscation and Deception Solution
  • 8 Deception-Enhanced Threat Sensing for Resilient Intrusion Detection
  • 9 HONEYSCOPE: IoT Device Protection with Deceptive Network Views
  • 10 gExtractor: Automated Extraction of Malware Deception Parameters for Autonomous Cyber Deception
  • 11 Malware Deception with Automatic Analysis and Generation of HoneyResource.