04093nam 22006375 450 991033756820332120200702173817.03-030-02110-610.1007/978-3-030-02110-8(CKB)4100000007389469(DE-He213)978-3-030-02110-8(MiAaPQ)EBC5918808(PPN)233801863(EXLCZ)99410000000738946920190102d2019 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierAutonomous Cyber Deception Reasoning, Adaptive Planning, and Evaluation of HoneyThings /edited by Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang1st ed. 2019.Cham :Springer International Publishing :Imprint: Springer,2019.1 online resource (XVI, 235 p. 79 illus., 65 illus. in color.) 3-030-02109-2 1 Using Deep Learning to Generate Relational HoneyData -- 2 Towards Intelligent Cyber Deception Systems -- 3 Honeypot Deception Tactics -- 4 Modeling and Analysis of Deception Games based on Hypergame Theory -- 5 Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception -- 6 CONCEAL: A Strategy Composition for Resilient Cyber Deception - Framework, Metrics and Deployment -- 7 NetShifter - A Comprehensive Multi-Dimensional Network Obfuscation and Deception Solution -- 8 Deception-Enhanced Threat Sensing for Resilient Intrusion Detection -- 9 HONEYSCOPE: IoT Device Protection with Deceptive Network Views -- 10 gExtractor: Automated Extraction of Malware Deception Parameters for Autonomous Cyber Deception -- 11 Malware Deception with Automatic Analysis and Generation of HoneyResource.This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception. An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced,. This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It’s also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced.Data protectionComputer communication systemsArtificial intelligenceApplication softwareSecurityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28000Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Artificial Intelligencehttps://scigraph.springernature.com/ontologies/product-market-codes/I21000Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Data protection.Computer communication systems.Artificial intelligence.Application software.Security.Computer Communication Networks.Artificial Intelligence.Information Systems Applications (incl. Internet).005.8005.8Al-Shaer Ehabedthttp://id.loc.gov/vocabulary/relators/edtWei Jinpengedthttp://id.loc.gov/vocabulary/relators/edtHamlen Kevin Wedthttp://id.loc.gov/vocabulary/relators/edtWang Cliffedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910337568203321Autonomous Cyber Deception2518412UNINA