Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings

Автор: literator от 3-06-2019, 13:25, Коментариев: 0

Категория: КНИГИ » ПРОГРАММИРОВАНИЕ

Название: Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings
Автор: Ehab Al-Shaer and Jinpeng Wei
Издательство: Springer
ISBN: 3030021092
Год: 2019
Страниц: 235
Язык: английский
Формат: pdf (true), epub
Размер: 28.3 MB

This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception.

What Is Cyber Deception? Cyber deception has emerged as an effective and complementary defense technique to overcome asymmetry challenges faced by traditional detection and prevention strategies. Approaches in this domain deliberately introduce misinformation or misleading functionality into cyberspace in order to trick adversaries in ways that render attacks ineffective or infeasible. These reciprocal asymmetries pose scalability problems for attackers similar to the ones traditionally faced by defenders, thereby leveling the battlefield.

An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced,.

This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It’s also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced.

Contents:
Part I. Cyber Deception Reasoning Frameworks
1. Using Deep Learning to Generate Relational HoneyData
2. Towards Intelligent Cyber Deception Systems
3. Honeypot Deception Tactics
Part II. Dynamic Decision-Making for Cyber Deception
4. Modeling and Analysis of Deception Games Based on Hypergame Theory
5. Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception
Part III. Network-Based Deception
6. CONCEAL: A Strategy Composition for Resilient Cyber Deception: Framework, Metrics, and Deployment
7. NetShifter: A Comprehensive Multi-Dimensional Network Obfuscation and Deception Solution
8. Deception-Enhanced Threat Sensing for Resilient Intrusion Detection
9. HONEYSCOPE: IoT Device Protection with Deceptive Network Views
Part IV. Malware Deception
10. gExtractor: Automated Extraction of Malware Deception Parameters for Autonomous Cyber Deception
11. Malware Deception with Automatic Analysis and Generation of HoneyResource

Скачать Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings








Нашел ошибку? Есть жалоба? Жми!
Пожаловаться администрации
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.