Advertisement

Autonomous Cyber Deception

Reasoning, Adaptive Planning, and Evaluation of HoneyThings

  • Ehab Al-Shaer
  • Jinpeng Wei
  • Kevin W. Hamlen
  • Cliff Wang
Textbook

Table of contents

  1. Front Matter
    Pages i-xii
  2. Cyber Deception Reasoning Frameworks

    1. Front Matter
      Pages 1-1
    2. Nazmiye Ceren Abay, Cuneyt Gurcan Akcora, Yan Zhou, Murat Kantarcioglu, Bhavani Thuraisingham
      Pages 3-19
    3. Fabio De Gaspari, Sushil Jajodia, Luigi V. Mancini, Giulio Pagnotta
      Pages 21-33
    4. Neil C. Rowe
      Pages 35-45
  3. Dynamic Decision-Making for Cyber Deception

    1. Front Matter
      Pages 47-47
    2. Jin-Hee Cho, Mu Zhu, Munindar Singh
      Pages 49-74
  4. Network-Based Deception

    1. Front Matter
      Pages 99-99
    2. Gahng-Seop Ahn, Kyung Joon Kwak, Alexey Bogaevskiy, Jason Li, Gregory Briskin, Robert Vaeth
      Pages 125-146
    3. Frederico Araujo, Gbadebo Ayoade, Kevin W. Hamlen, Latifur Khan
      Pages 147-165
    4. Reham Mohamed, Terrence O’Connor, Markus Miettinen, William Enck, Ahmad-Reza Sadeghi
      Pages 167-181
  5. Malware Deception

    1. Front Matter
      Pages 183-183
    2. Mohammed Noraden Alsaleh, Jinpeng Wei, Ehab Al-Shaer, Mohiuddin Ahmed
      Pages 185-207
    3. Zhaoyan Xu, Jialong Zhang, Zhiqiang Lin, Guofei Gu
      Pages 209-235
  6. Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang
    Pages C1-C2

About this book

Introduction

This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception.

 An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced,.

 This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It’s also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced.

Keywords

cyber deception deception metrics deep learning adversarial cyber deception differential privacy deception games deception parameters deception theory deceptive web service decoy deployment dynamic bayesian games dynamic planning honeypots honey resources hypergame theory intelligent agents Internet of Things malware analysis network obfuscation software defined networking

Editors and affiliations

  1. 1.Department of Software & Information SystemUniversity of North Carolina CharlotteCharlotteUSA
  2. 2.Department of Software and Information SystemUniversity of North CarolinaCharlotteUSA
  3. 3.Computer Science DepartmentUniversity of Texas at DallasRichardsonUSA
  4. 4.Computing and Information Science DivisionArmy Research OfficeDurhamUSA

Bibliographic information