Game theory for cyber deception : from theory to applications / Jeffrey Pawlick, Quanyan Zhu.
2021
QA76.9.A25
Formats
| Format | |
|---|---|
| BibTeX | |
| MARCXML | |
| TextMARC | |
| MARC | |
| DublinCore | |
| EndNote | |
| NLM | |
| RefWorks | |
| RIS |
Cite
Citation
Linked e-resources
Linked Resource
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Game theory for cyber deception : from theory to applications / Jeffrey Pawlick, Quanyan Zhu.
Author
ISBN
9783030660659 (electronic book)
3030660656 (electronic book)
3030660648
9783030660642
3030660656 (electronic book)
3030660648
9783030660642
Published
Cham, Switzerland : Birkhäuser, [2021]
Language
English
Description
1 online resource.
Item Number
10.1007/978-3-030-66065-9 doi
Call Number
QA76.9.A25
Dewey Decimal Classification
005.8
Summary
This book introduces game theory as a means to conceptualize, model, and analyze cyber deception. Drawing upon a collection of deception research from the past 10 years, the authors develop a taxonomy of six species of defensive cyber deception. Three of these six species are highlighted in the context of emerging problems such as privacy against ubiquitous tracking in the Internet of things (IoT), dynamic honeynets for the observation of advanced persistent threats (APTs), and active defense against physical denial-of-service (PDoS) attacks. Because of its uniquely thorough treatment of cyber deception, this book will serve as a timely contribution and valuable resource in this active field. The opening chapters introduce both cybersecurity in a manner suitable for game theorists and game theory as appropriate for cybersecurity professionals. Chapter Four then guides readers through the specific field of defensive cyber deception. A key feature of the remaining chapters is the development of a signaling game model for the species of leaky deception featured in honeypots and honeyfiles. This model is expanded to study interactions between multiple agents with varying abilities to detect deception. Game Theory for Cyber Deception will appeal to advanced undergraduates, graduate students, and researchers interested in applying game theory to cybersecurity. It will also be of value to researchers and professionals working on cybersecurity who seek an introduction to game theory.
Bibliography, etc. Note
Includes bibliographical references and index.
Access Note
Access limited to authorized users.
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed March 11, 2021).
Added Author
Series
Static & dynamic game theory.
Available in Other Form
Print version: 9783030660642
Linked Resources
Record Appears in
Table of Contents
Introduction
1Nash and Stackelberg Games
Introduction to Incomplete Information
A Taxonomy of Defensive Deception
Obfuscation
Honey-X
Attacker Engagment
Strategic Trust
Active Crowd Defense
Insights and Future Directions
Current Challenges in Cyber Deception.
1Nash and Stackelberg Games
Introduction to Incomplete Information
A Taxonomy of Defensive Deception
Obfuscation
Honey-X
Attacker Engagment
Strategic Trust
Active Crowd Defense
Insights and Future Directions
Current Challenges in Cyber Deception.