Vai al contenuto principale della pagina

Autonomous Cyber Deception : Reasoning, Adaptive Planning, and Evaluation of HoneyThings / / edited by Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Autonomous Cyber Deception : Reasoning, Adaptive Planning, and Evaluation of HoneyThings / / edited by Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang Visualizza cluster
Pubblicazione: Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Edizione: 1st ed. 2019.
Descrizione fisica: 1 online resource (XVI, 235 p. 79 illus., 65 illus. in color.)
Disciplina: 005.8
Soggetto topico: Data protection
Computer communication systems
Artificial intelligence
Application software
Security
Computer Communication Networks
Artificial Intelligence
Information Systems Applications (incl. Internet)
Persona (resp. second.): Al-ShaerEhab
WeiJinpeng
HamlenKevin W
WangCliff
Nota di contenuto: 1 Using Deep Learning to Generate Relational HoneyData -- 2 Towards Intelligent Cyber Deception Systems -- 3 Honeypot Deception Tactics -- 4 Modeling and Analysis of Deception Games based on Hypergame Theory -- 5 Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception -- 6 CONCEAL: A Strategy Composition for Resilient Cyber Deception - Framework, Metrics and Deployment -- 7 NetShifter - A Comprehensive Multi-Dimensional Network Obfuscation and Deception Solution -- 8 Deception-Enhanced Threat Sensing for Resilient Intrusion Detection -- 9 HONEYSCOPE: IoT Device Protection with Deceptive Network Views -- 10 gExtractor: Automated Extraction of Malware Deception Parameters for Autonomous Cyber Deception -- 11 Malware Deception with Automatic Analysis and Generation of HoneyResource.
Sommario/riassunto: This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception. An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced,. This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It’s also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced.
Titolo autorizzato: Autonomous Cyber Deception  Visualizza cluster
ISBN: 3-030-02110-6
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910337568203321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui