Benutzerdefiniertes Cover
Benutzerdefiniertes Cover
Normale Ansicht MARC-Ansicht ISBD

Autonomous Cyber Deception : Reasoning, Adaptive Planning, and Evaluation of HoneyThings / by Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang

Von: Mitwirkende(r): Resource type: Ressourcentyp: Buch (Online)Buch (Online)Sprache: Englisch Reihen: SpringerLink BücherVerlag: Cham : Springer International Publishing, 2019Beschreibung: Online-Ressource (XVI, 235 p. 79 illus., 65 illus. in color, online resource)ISBN:
  • 9783030021108
Schlagwörter: Andere physische Formen: 9783030021092 | 9783030021115 | Erscheint auch als: 978-3-030-02109-2 Druck-Ausgabe | Printed edition: 9783030021092 | Printed edition: 9783030021115 DDC-Klassifikation:
  • 005.8
LOC-Klassifikation:
  • QA76.9.A25
DOI: DOI: 10.1007/978-3-030-02110-8Online-Ressourcen: Zusammenfassung: This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception. An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced,. This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It’s also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experiencedZusammenfassung: 1 Using Deep Learning to Generate Relational HoneyData -- 2 Towards Intelligent Cyber Deception Systems -- 3 Honeypot Deception Tactics -- 4 Modeling and Analysis of Deception Games based on Hypergame Theory -- 5 Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception -- 6 CONCEAL: A Strategy Composition for Resilient Cyber Deception - Framework, Metrics and Deployment -- 7 NetShifter - A Comprehensive Multi-Dimensional Network Obfuscation and Deception Solution -- 8 Deception-Enhanced Threat Sensing for Resilient Intrusion Detection -- 9 HONEYSCOPE: IoT Device Protection with Deceptive Network Views -- 10 gExtractor: Automated Extraction of Malware Deception Parameters for Autonomous Cyber Deception -- 11 Malware Deception with Automatic Analysis and Generation of HoneyResourcePPN: PPN: 1048371131Package identifier: Produktsigel: ZDB-2-SCS | ZDB-2-SEB | ZDB-2-SXCS
Dieser Titel hat keine Exemplare

Reproduktion. (Springer eBook Collection. Computer Science)