Autonomous cyber deception : reasoning, adaptive planning, and evaluation of HoneyThings /

Saved in:
Bibliographic Details
Author / Creator:Al-Shaer, Ehab S., 1967- author.
Imprint:Cham, Switzerland : Springer, 2019.
Description:1 online resource (xvi, 235 pages) : illustrations (some color)
Language:English
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11781038
Hidden Bibliographic Details
Other authors / contributors:Wei, Jinpeng, author.
Hamlen, Kevin, author.
Wang, Cliff, author.
ISBN:9783030021108
3030021106
9783030021092
3030021092
9783030021092
9783030021115
3030021114
Digital file characteristics:text file PDF
Notes:Online resource; title from PDF title page (SpringerLink, viewed January 17, 2019).
Summary:This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception. An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced, . This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It?s also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced.
Other form:Printed edition: 9783030021092
Printed edition: 9783030021115
Standard no.:10.1007/978-3-030-02110-8

MARC

LEADER 00000cam a2200000Ii 4500
001 11781038
005 20210625185426.7
006 m o d
007 cr cnu|||unuuu
008 190117s2019 sz a o 000 0 eng d
015 |a GBB918299  |2 bnb 
016 7 |a 019216888  |2 Uk 
019 |a 1086469631  |a 1144294722  |a 1156379416  |a 1162763312 
020 |a 9783030021108  |q (electronic bk.) 
020 |a 3030021106  |q (electronic bk.) 
020 |z 9783030021092  |q (print) 
020 |a 3030021092 
020 |a 9783030021092 
020 |a 9783030021115  |q (print) 
020 |a 3030021114 
024 7 |a 10.1007/978-3-030-02110-8  |2 doi 
035 |a (OCoLC)1082474696  |z (OCoLC)1086469631  |z (OCoLC)1144294722  |z (OCoLC)1156379416  |z (OCoLC)1162763312 
035 9 |a (OCLCCM-CC)1082474696 
037 |a com.springer.onix.9783030021108  |b Springer Nature 
040 |a GW5XE  |b eng  |e rda  |e pn  |c GW5XE  |d UKMGB  |d OCLCF  |d UAB  |d COO  |d YDX  |d OCLCQ  |d EBLCP  |d OCLCQ  |d LEAUB  |d CEF  |d OCLCQ  |d VT2  |d UKAHL 
049 |a MAIN 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
100 1 |a Al-Shaer, Ehab S.,  |d 1967-  |e author.  |0 http://id.loc.gov/authorities/names/n2001016943 
245 1 0 |a Autonomous cyber deception :  |b reasoning, adaptive planning, and evaluation of HoneyThings /  |c Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang. 
264 1 |a Cham, Switzerland :  |b Springer,  |c 2019. 
300 |a 1 online resource (xvi, 235 pages) :  |b illustrations (some color) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
588 0 |a Online resource; title from PDF title page (SpringerLink, viewed January 17, 2019). 
505 0 |a 1 Using Deep Learning to Generate Relational HoneyData.- 2 Towards Intelligent Cyber Deception Systems.- 3 Honeypot Deception Tactics.- 4 Modeling and Analysis of Deception Games based on Hypergame Theory.- 5 Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception.- 6 CONCEAL: A Strategy Composition for Resilient Cyber Deception -- Framework, Metrics and Deployment.- 7 NetShifter -- A Comprehensive Multi-Dimensional Network Obfuscation and Deception Solution.- 8 Deception-Enhanced Threat Sensing for Resilient Intrusion Detection.- 9 HONEYSCOPE: IoT Device Protection with Deceptive Network Views.- 10 gExtractor: Automated Extraction of Malware Deception Parameters for Autonomous Cyber Deception.- 11 Malware Deception with Automatic Analysis and Generation of HoneyResource. 
520 |a This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception. An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced, . This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It?s also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced. 
650 0 |a Computer security.  |0 http://id.loc.gov/authorities/subjects/sh90001862 
650 0 |a Computer networks  |x Security measures.  |0 http://id.loc.gov/authorities/subjects/sh94001277 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
655 4 |a Electronic books. 
700 1 |a Wei, Jinpeng,  |e author. 
700 1 |a Hamlen, Kevin,  |e author.  |0 http://id.loc.gov/authorities/names/nb2018002657 
700 1 |a Wang, Cliff,  |e author.  |0 http://id.loc.gov/authorities/names/n2007005295 
776 0 8 |i Printed edition:  |z 9783030021092 
776 0 8 |i Printed edition:  |z 9783030021115 
903 |a HeVa 
929 |a oclccm 
999 f f |i 6306f497-36cf-5a9d-b29f-98286f122cc1  |s 3d051a88-546e-52d8-ba10-28c6a3c21d56 
928 |t Library of Congress classification  |a QA76.9.A25  |l Online  |c UC-FullText  |u https://link.springer.com/10.1007/978-3-030-02110-8  |z Springer Nature  |g ebooks  |i 12559879