文件名称:Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation
文件大小:6.47MB
文件格式:PDF
更新时间:2022-02-22 19:12:15
network
Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings By 作者: Ehab Al-Shaer – Jinpeng Wei – Kevin W. Hamlen – Cliff Wang ISBN-10 书号: 3030021092 ISBN-13 书号: 9783030021092 Edition 版本: 1st ed. 2019 出版日期: 2019-01-02 pages 页数: (235 ) $84.99 This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception. An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced,. This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It’s also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced. Cover Front Matter Part I. Cyber Deception Reasoning Frameworks 1. Using Deep Learning to Generate Relational HoneyData 2. Towards Intelligent Cyber Deception Systems 3. Honeypot Deception Tactics Part II. Dynamic Decision-Making for Cyber Deception 4. Modeling and Analysis of Deception Games Based on Hypergame Theory 5. Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception Part III. Network-Based Deception 6. CONCEAL:A Strategy Composition for Resilient Cyber Deception: Framework, Metrics, and Deployment 7. WetShifter:A Comprehensive Multi-Dimensional Network Obfuscation and Deception Solution 8. Deception-Enhanced Threat Sensing for Resilient Intrusion Detection 9. HONEYSCOPE: IoT Device Protection with Deceptive Network Views Part IV. Malware Deception 10. gExtractor: Automated Extraction of Malware Deception Parameters for Autononous Cyber Deception 11. Malware Deception with Automatic Analysis and Generation of HoneyResource