𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings

✍ Scribed by Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang


Publisher
Springer
Year
2019
Tongue
English
Leaves
239
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception.
An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced.
This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It’s also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced.

✦ Table of Contents


Front Matter ....Pages i-xvi
Front Matter ....Pages 1-1
Using Deep Learning to Generate Relational HoneyData (Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang)....Pages 3-19
Towards Intelligent Cyber Deception Systems (Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang)....Pages 21-33
Honeypot Deception Tactics (Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang)....Pages 35-45
Front Matter ....Pages 47-47
Modeling and Analysis of Deception Games Based on Hypergame Theory (Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang)....Pages 49-74
Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception (Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang)....Pages 75-97
Front Matter ....Pages 99-99
CONCEAL: A Strategy Composition for Resilient Cyber Deception: Framework, Metrics, and Deployment (Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang)....Pages 101-124
NetShifter: A Comprehensive Multi-Dimensional Network Obfuscation and Deception Solution (Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang)....Pages 125-146
Deception-Enhanced Threat Sensing for Resilient Intrusion Detection (Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang)....Pages 147-165
HONEYSCOPE: IoT Device Protection with Deceptive Network Views (Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang)....Pages 167-181
Front Matter ....Pages 183-183
gExtractor: Automated Extraction of Malware Deception Parameters for Autonomous Cyber Deception (Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang)....Pages 185-207
Malware Deception with Automatic Analysis and Generation of HoneyResource (Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang)....Pages 209-235

✦ Subjects


Deep Learning; Security; Cybersecurity; Decision Making; Network Security; Honeypot; Malware Analysis; Obfuscation; Strategy


πŸ“œ SIMILAR VOLUMES


Adaptive Autonomous Secure Cyber Systems
✍ Sushil Jajodia (editor), George Cybenko (editor), V.S. Subrahmanian (editor), Vi πŸ“‚ Library πŸ“… 2020 πŸ› Springer 🌐 English

<div>This book explores fundamental scientific problems essential for autonomous cyber defense. Specific areas include:</div><div><br></div><div><ul><li>Game and control theory-based moving target defenses (MTDs) and adaptive cyber defenses (ACDs) for fully autonomous cyber operations;</li></ul></di

The Logic of Autonomy: Law, Morality and
✍ Jan R. Sieckmann πŸ“‚ Library πŸ“… 2012 πŸ› Hart Publishing 🌐 English

Autonomy is the central idea of modern practical philosophy. Understood as self-legislation, autonomy seems to require that the validity of norms depends on recognition, namely, that their addressees, being autonomous agents, recognise these norms to be valid. But how can one be bound by norms whose

The Logic of Autonomy: Law, Morality and
✍ Jan-R Sieckmann πŸ“‚ Library πŸ“… 2012 πŸ› Hart Publishing 🌐 English

Autonomy is the central idea of modern practical philosophy. Understood as self-legislation, autonomy seems to require that the validity of norms depends on recognition, namely, that their addressees, being autonomous agents, recognize these norms to be valid. But, how can one be bound by norms whos

Adversarial and Uncertain Reasoning for
✍ Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman πŸ“‚ Library πŸ“… 2019 πŸ› Springer International Publishing 🌐 English

<p><p>Today’s cyber defenses are largely static allowing adversaries to pre-plan their attacks. In response to this situation, researchers have started to investigate various methods that make networked information systems less homogeneous and less predictable by engineering systems that have homoge

Cogeneration Power Plants: Planning and
✍ Joel K Wilson πŸ“‚ Library πŸ“… 2018 πŸ› Pennwell Books 🌐 English

<p><span>Many on-site power plants either fail outright or perform far below expectations-- all because of poor planning and evaluation of the power plants from the beginning.</span></p><p><span>This book is intended to help those interested in cogeneration power plants by laying out a thorough and