000 03880nam a22005895i 4500
001 978-3-030-02110-8
003 DE-He213
005 20240423124958.0
007 cr nn 008mamaa
008 190102s2019 sz | s |||| 0|eng d
020 _a9783030021108
_9978-3-030-02110-8
024 7 _a10.1007/978-3-030-02110-8
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aAutonomous Cyber Deception
_h[electronic resource] :
_bReasoning, Adaptive Planning, and Evaluation of HoneyThings /
_cedited by Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang.
250 _a1st ed. 2019.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2019.
300 _aXII, 235 p. 79 illus., 65 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _a1 Using Deep Learning to Generate Relational HoneyData -- 2 Towards Intelligent Cyber Deception Systems -- 3 Honeypot Deception Tactics -- 4 Modeling and Analysis of Deception Games based on Hypergame Theory -- 5 Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception -- 6 CONCEAL: A Strategy Composition for Resilient Cyber Deception - Framework, Metrics and Deployment -- 7 NetShifter - A Comprehensive Multi-Dimensional Network Obfuscation and Deception Solution -- 8 Deception-Enhanced Threat Sensing for Resilient Intrusion Detection -- 9 HONEYSCOPE: IoT Device Protection with Deceptive Network Views -- 10 gExtractor: Automated Extraction of Malware Deception Parameters for Autonomous Cyber Deception -- 11 Malware Deception with Automatic Analysis and Generation of HoneyResource.
520 _aThis textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception. An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced,. This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It’s also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced.
650 0 _aData protection.
650 0 _aComputer networks .
650 0 _aArtificial intelligence.
650 0 _aApplication software.
650 1 4 _aData and Information Security.
650 2 4 _aComputer Communication Networks.
650 2 4 _aArtificial Intelligence.
650 2 4 _aComputer and Information Systems Applications.
700 1 _aAl-Shaer, Ehab.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aWei, Jinpeng.
_eeditor.
_0(orcid)0000-0002-6982-7386
_1https://orcid.org/0000-0002-6982-7386
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aHamlen, Kevin W.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aWang, Cliff.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030021092
776 0 8 _iPrinted edition:
_z9783030021115
856 4 0 _uhttps://doi.org/10.1007/978-3-030-02110-8
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c172858
_d172858