LEADER 04093nam 22006375 450 001 9910337568203321 005 20200702173817.0 010 $a3-030-02110-6 024 7 $a10.1007/978-3-030-02110-8 035 $a(CKB)4100000007389469 035 $a(DE-He213)978-3-030-02110-8 035 $a(MiAaPQ)EBC5918808 035 $a(PPN)233801863 035 $a(EXLCZ)994100000007389469 100 $a20190102d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAutonomous Cyber Deception $eReasoning, Adaptive Planning, and Evaluation of HoneyThings /$fedited by Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XVI, 235 p. 79 illus., 65 illus. in color.) 311 $a3-030-02109-2 327 $a1 Using Deep Learning to Generate Relational HoneyData -- 2 Towards Intelligent Cyber Deception Systems -- 3 Honeypot Deception Tactics -- 4 Modeling and Analysis of Deception Games based on Hypergame Theory -- 5 Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception -- 6 CONCEAL: A Strategy Composition for Resilient Cyber Deception - Framework, Metrics and Deployment -- 7 NetShifter - A Comprehensive Multi-Dimensional Network Obfuscation and Deception Solution -- 8 Deception-Enhanced Threat Sensing for Resilient Intrusion Detection -- 9 HONEYSCOPE: IoT Device Protection with Deceptive Network Views -- 10 gExtractor: Automated Extraction of Malware Deception Parameters for Autonomous Cyber Deception -- 11 Malware Deception with Automatic Analysis and Generation of HoneyResource. 330 $aThis textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception. An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced,. This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It?s also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced. 606 $aData protection 606 $aComputer communication systems 606 $aArtificial intelligence 606 $aApplication software 606 $aSecurity$3https://scigraph.springernature.com/ontologies/product-market-codes/I28000 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aData protection. 615 0$aComputer communication systems. 615 0$aArtificial intelligence. 615 0$aApplication software. 615 14$aSecurity. 615 24$aComputer Communication Networks. 615 24$aArtificial Intelligence. 615 24$aInformation Systems Applications (incl. Internet). 676 $a005.8 676 $a005.8 702 $aAl-Shaer$b Ehab$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWei$b Jinpeng$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHamlen$b Kevin W$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWang$b Cliff$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910337568203321 996 $aAutonomous Cyber Deception$92518412 997 $aUNINA