Game Theory for Cyber Deception - Jeffrey Pawlick, Quanyan Zhu

Game Theory for Cyber Deception

From Theory to Applications
Buch | Hardcover
XIII, 190 Seiten
2021 | 1st ed. 2021
Springer International Publishing (Verlag)
978-3-030-66064-2 (ISBN)
117,69 inkl. MwSt

This book introduces game theory as a means to conceptualize, model, and analyze cyber deception. Drawing upon a collection of deception research from the past 10 years, the authors develop a taxonomy of six species of defensive cyber deception. Three of these six species are highlighted in the context of emerging problems such as privacy against ubiquitous tracking in the Internet of things (IoT), dynamic honeynets for the observation of advanced persistent threats (APTs), and active defense against physical denial-of-service (PDoS) attacks. Because of its uniquely thorough treatment of cyber deception, this book will serve as a timely contribution and valuable resource in this active field.

The opening chapters introduce both cybersecurity in a manner suitable for game theorists and game theory as appropriate for cybersecurity professionals. Chapter Four then guides readers through the specific field of defensive cyber deception. A key feature of the remaining chapters is the development of a signaling game model for the species of leaky deception featured in honeypots and honeyfiles. This model is expanded to study interactions between multiple agents with varying abilities to detect deception.

Game Theory for Cyber Deception will appeal to advanced undergraduates, graduate students, and researchers interested in applying game theory to cybersecurity. It will also be of value to researchers and professionals working on cybersecurity who seek an introduction to game theory.

Part I Fundamentals.- Introduction.- Nash and Stackelberg Games.- Introduction to Incomplete Information.- Part II Defensive Deception.- A Taxonomy of Defensive Deception.- Obfuscation.- Honey-X.- Attacker Engagement.- Part III Mitigation of Malicious Deception.- Strategic Trust.- Active Crowd Defense.- Part IV Challenges and Opportunities in Cyber Deception.- Insights and Future Directions.- Current Challenges in Cyber Deception.

"The book is a good approach for abstracting the essentials of IoT allowing to model designing optimal, robust, and multi-layered approaches to defensive deception and counter-deception. It will be a good help for both scholars and persons involved in the practical issues of cyber-protection." (Carlos Narciso Bouza Herrera, zbMATH 1484.91002, 2022)

“The book is a good approach for abstracting the essentials of IoT allowing to model designing optimal, robust, and multi-layered approaches to defensive deception and counter-deception. It will be a good help for both scholars and persons involved in the practical issues of cyber-protection.” (Carlos Narciso Bouza Herrera, zbMATH 1484.91002, 2022)

Erscheinungsdatum
Reihe/Serie Static & Dynamic Game Theory: Foundations & Applications
Zusatzinfo XIII, 190 p. 62 illus., 53 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Gewicht 463 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Theorie / Studium
Mathematik / Informatik Mathematik Angewandte Mathematik
Schlagworte Attacker engagement cybersecurity • Bayesian Games • Defensive deception cyber • Dos attack cybersecurity • Games of incomplete information • Game Theory cyber deception • Game theory cybersecurity • Game Theory Internet of Things • Honey-X cybersecurity • Large population games • Nash games • Obfuscation cybersecurity • Stackelberg Games • Strategic trust cybersecurity • Zero-sum matrix games
ISBN-10 3-030-66064-8 / 3030660648
ISBN-13 978-3-030-66064-2 / 9783030660642
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00