Название: Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings Автор: Ehab Al-Shaer and Jinpeng Wei Издательство: Springer ISBN: 3030021092 Год: 2019 Страниц: 235 Язык: английский Формат: pdf (true), epub Размер: 28.3 MB
This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception.
What Is Cyber Deception? Cyber deception has emerged as an effective and complementary defense technique to overcome asymmetry challenges faced by traditional detection and prevention strategies. Approaches in this domain deliberately introduce misinformation or misleading functionality into cyberspace in order to trick adversaries in ways that render attacks ineffective or infeasible. These reciprocal asymmetries pose scalability problems for attackers similar to the ones traditionally faced by defenders, thereby leveling the battlefield.
An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced,.
This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It’s also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced.
Contents: Part I. Cyber Deception Reasoning Frameworks 1. Using Deep Learning to Generate Relational HoneyData 2. Towards Intelligent Cyber Deception Systems 3. Honeypot Deception Tactics Part II. Dynamic Decision-Making for Cyber Deception 4. Modeling and Analysis of Deception Games Based on Hypergame Theory 5. Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception Part III. Network-Based Deception 6. CONCEAL: A Strategy Composition for Resilient Cyber Deception: Framework, Metrics, and Deployment 7. NetShifter: A Comprehensive Multi-Dimensional Network Obfuscation and Deception Solution 8. Deception-Enhanced Threat Sensing for Resilient Intrusion Detection 9. HONEYSCOPE: IoT Device Protection with Deceptive Network Views Part IV. Malware Deception 10. gExtractor: Automated Extraction of Malware Deception Parameters for Autonomous Cyber Deception 11. Malware Deception with Automatic Analysis and Generation of HoneyResource
Скачать Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings
|