Overview
- Provides comprehensive coverage of adaptive cyber deception in many aspects, including theory and practice, sense-making and decision making, and network and system perspectives
- Focuses on how to make cyber deception adaptive, dynamic, and resilient
- Many of the chapter concepts are rooted in the science of cyber deception as it provides metrics to measure the effectiveness and cost of deception, methodologies to measure the deception benefit, and methodologies to optimize deception, planning, and decision
- Includes exercises that help students have hand-on experience with the topic and deeply understand the chapter concepts
- Diversity of approaches that provide important foundations for cyber deception that includes AI, ML, game theory, satisfiability theory, symbolic analysis, and others
Buy print copy
About this book
This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception.
An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced,.
This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It’s also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced.
Similar content being viewed by others
Keywords
- cyber deception
- deception metrics
- deep learning
- adversarial cyber deception
- differential privacy
- deception games
- deception parameters
- deception theory
- deceptive web service
- decoy deployment
- dynamic bayesian games
- dynamic planning
- honeypots
- honey resources
- hypergame theory
- intelligent agents
- Internet of Things
- malware analysis
- network obfuscation
- software defined networking
Table of contents (12 chapters)
-
Cyber Deception Reasoning Frameworks
-
Dynamic Decision-Making for Cyber Deception
-
Network-Based Deception
-
Malware Deception
Editors and Affiliations
About the editors
Dr. Jinpeng Wei leads the Systems Security Lab in the Department of Software and Information Systems at UNC Charlotte. His research focuses on theory, methods, and tools that enhance the security of systems software for a wide range of applications. His research topics include systems software vulnerability detection and mitigation, runtime verification of systems software security properties, stealthy malware detection, analysis and defense, secure software architecture, cloud computing security, and security problems in emerging application domains such as Internet of Things. His work has been published in premier venues such as ACSAC, ESORICS, Computers & Security, USENIX FAST, and USENIX ATC. He is the winner of three best paper awards and the AFRL Visiting Faculty Research Program (VFRP) award. His research has been funded by Air Force Research Lab, Department of Homeland Security, Department of Defense, Centre for Strategic Infocomm Technologies (CSIT), Singapore, and Electronics and Telecommunications Research Institute (ETRI). He has been a program committee member for more than 20 conferences (such as SecureComm 2014, IEEE CLOUD 2015, and ICDCS 2011), the Workshop Co-Chair of CollaborateCom 2014, and a reviewer for reputable journals such as ACM Computing Surveys, ACM Transactions on Computer Systems, Elsevier Journal of Computers and Security, and IEEE Transactions on Dependable and Secure Computing. Dr. Wei received a PhD in Computer Science from Georgia Institute of Technology, and prior to his appointment at UNC Charlotte he was a faculty member in the School of Computing and Information Sciences, Florida International University.
Kevin Hamlen is currently an Associate Professor in the Computer Science Department at the University of Texas at Dallas, and a Senior Technical Advisor of UTD's Cyber Security Research and Education Institute. His research focus concerns the field of language-based security, which leverages techniques from programming language theory and compilers to enforce software security. Topics of interest include in-lined reference monitors, type-safe intermediate languages, software abstract interpretation and model-checking, proof-carrying code, and certifying compilers. He also has ongoing projects related to malware defense and cloud computing security. His research is currently supported by grants from the U.S. Air Force Office of Scientific Research (AFOSR), the National Science Foundation (NSF), the Office of Naval Research (ONR), and Raytheon Company. See my CV for additional details. He received his Master's and Ph.D. degrees from Cornell University, where his doctoral research was part of the Language-Based Security For Malicious Mobile Code initiative.
Cliff Wang from the US Army Research Office, Durham, NC, was named Fellow of the Institute of Electrical and Electronics Engineers (IEEE) in 2016 for leadership in trusted computing and communication systems. His focus in the US Army Research Office is in the Information and Software Assurance division, which addresses the research and development of highly assured, self-healing and survivable software and information systems that address the processing and delivery of authentic, accurate, secure, reliable, and timely information, regardless of threat conditions.
Bibliographic Information
Book Title: Autonomous Cyber Deception
Book Subtitle: Reasoning, Adaptive Planning, and Evaluation of HoneyThings
Editors: Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang
DOI: https://doi.org/10.1007/978-3-030-02110-8
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer Nature Switzerland AG 2019
Hardcover ISBN: 978-3-030-02109-2Published: 22 January 2019
eBook ISBN: 978-3-030-02110-8Published: 02 January 2019
Edition Number: 1
Number of Pages: XII, 235
Number of Illustrations: 14 b/w illustrations, 65 illustrations in colour
Topics: Security, Computer Communication Networks, Artificial Intelligence, Information Systems Applications (incl. Internet)