|
Showing 1 - 2 of
2 matches in All Departments
This book introduces game theory as a means to conceptualize,
model, and analyze cyber deception. Drawing upon a collection of
deception research from the past 10 years, the authors develop a
taxonomy of six species of defensive cyber deception. Three of
these six species are highlighted in the context of emerging
problems such as privacy against ubiquitous tracking in the
Internet of things (IoT), dynamic honeynets for the observation of
advanced persistent threats (APTs), and active defense against
physical denial-of-service (PDoS) attacks. Because of its uniquely
thorough treatment of cyber deception, this book will serve as a
timely contribution and valuable resource in this active field. The
opening chapters introduce both cybersecurity in a manner suitable
for game theorists and game theory as appropriate for cybersecurity
professionals. Chapter Four then guides readers through the
specific field of defensive cyber deception. A key feature of the
remaining chapters is the development of a signaling game model for
the species of leaky deception featured in honeypots and
honeyfiles. This model is expanded to study interactions between
multiple agents with varying abilities to detect deception. Game
Theory for Cyber Deception will appeal to advanced undergraduates,
graduate students, and researchers interested in applying game
theory to cybersecurity. It will also be of value to researchers
and professionals working on cybersecurity who seek an introduction
to game theory.
This book introduces game theory as a means to conceptualize,
model, and analyze cyber deception. Drawing upon a collection of
deception research from the past 10 years, the authors develop a
taxonomy of six species of defensive cyber deception. Three of
these six species are highlighted in the context of emerging
problems such as privacy against ubiquitous tracking in the
Internet of things (IoT), dynamic honeynets for the observation of
advanced persistent threats (APTs), and active defense against
physical denial-of-service (PDoS) attacks. Because of its uniquely
thorough treatment of cyber deception, this book will serve as a
timely contribution and valuable resource in this active field. The
opening chapters introduce both cybersecurity in a manner suitable
for game theorists and game theory as appropriate for cybersecurity
professionals. Chapter Four then guides readers through the
specific field of defensive cyber deception. A key feature of the
remaining chapters is the development of a signaling game model for
the species of leaky deception featured in honeypots and
honeyfiles. This model is expanded to study interactions between
multiple agents with varying abilities to detect deception. Game
Theory for Cyber Deception will appeal to advanced undergraduates,
graduate students, and researchers interested in applying game
theory to cybersecurity. It will also be of value to researchers
and professionals working on cybersecurity who seek an introduction
to game theory.
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.