Vai al contenuto principale della pagina
Titolo: | Autonomous Cyber Deception : Reasoning, Adaptive Planning, and Evaluation of HoneyThings / / edited by Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang |
Pubblicazione: | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Edizione: | 1st ed. 2019. |
Descrizione fisica: | 1 online resource (XVI, 235 p. 79 illus., 65 illus. in color.) |
Disciplina: | 005.8 |
Soggetto topico: | Data protection |
Computer communication systems | |
Artificial intelligence | |
Application software | |
Security | |
Computer Communication Networks | |
Artificial Intelligence | |
Information Systems Applications (incl. Internet) | |
Persona (resp. second.): | Al-ShaerEhab |
WeiJinpeng | |
HamlenKevin W | |
WangCliff | |
Nota di contenuto: | 1 Using Deep Learning to Generate Relational HoneyData -- 2 Towards Intelligent Cyber Deception Systems -- 3 Honeypot Deception Tactics -- 4 Modeling and Analysis of Deception Games based on Hypergame Theory -- 5 Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception -- 6 CONCEAL: A Strategy Composition for Resilient Cyber Deception - Framework, Metrics and Deployment -- 7 NetShifter - A Comprehensive Multi-Dimensional Network Obfuscation and Deception Solution -- 8 Deception-Enhanced Threat Sensing for Resilient Intrusion Detection -- 9 HONEYSCOPE: IoT Device Protection with Deceptive Network Views -- 10 gExtractor: Automated Extraction of Malware Deception Parameters for Autonomous Cyber Deception -- 11 Malware Deception with Automatic Analysis and Generation of HoneyResource. |
Sommario/riassunto: | This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception. An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced,. This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It’s also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced. |
Titolo autorizzato: | Autonomous Cyber Deception |
ISBN: | 3-030-02110-6 |
Formato: | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione: | Inglese |
Record Nr.: | 9910337568203321 |
Lo trovi qui: | Univ. Federico II |
Opac: | Controlla la disponibilità qui |