Advertisement

Autonomous Cyber Deception

Reasoning, Adaptive Planning, and Evaluation of HoneyThings

  • Ehab Al-Shaer
  • Jinpeng Wei
  • Kevin W. Hamlen
  • Cliff Wang

Table of contents

  1. Front Matter
    Pages i-xvi
  2. Cyber Deception Reasoning Frameworks

    1. Front Matter
      Pages 1-1
    2. Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang
      Pages 3-19
    3. Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang
      Pages 21-33
    4. Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang
      Pages 35-45
  3. Dynamic Decision-Making for Cyber Deception

    1. Front Matter
      Pages 47-47
    2. Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang
      Pages 49-74
    3. Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang
      Pages 75-97
  4. Network-Based Deception

    1. Front Matter
      Pages 99-99
    2. Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang
      Pages 101-124
    3. Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang
      Pages 125-146
    4. Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang
      Pages 147-165
    5. Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang
      Pages 167-181
  5. Malware Deception

    1. Front Matter
      Pages 183-183
    2. Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang
      Pages 185-207
    3. Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang
      Pages 209-235

About this book

Introduction

This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception.

 An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced,.

 This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It’s also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced.

Keywords

cyber deception deception metrics deep learning adversarial cyber deception differential privacy deception games deception parameters deception theory deceptive web service decoy deployment dynamic bayesian games dynamic planning honeypots honey resources hypergame theory intelligent agents Internet of Things malware analysis network obfuscation software defined networking

Authors and affiliations

  • Ehab Al-Shaer
    • 1
  • Jinpeng Wei
    • 2
  • Kevin W. Hamlen
    • 3
  • Cliff Wang
    • 4
  1. 1.Department of Software & Information SystemUniversity of North Carolina CharlotteCharlotteUSA
  2. 2.Department of Software and Information SystemUniversity of North CarolinaCharlotteUSA
  3. 3.Computer Science DepartmentUniversity of Texas at DallasRichardsonUSA
  4. 4.Computing and Information Science DivisionArmy Research OfficeDurhamUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-030-02110-8
  • Copyright Information Springer Nature Switzerland AG 2019
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-030-02109-2
  • Online ISBN 978-3-030-02110-8
  • Buy this book on publisher's site