<電子ブック>
Game Theory for Cyber Deception : From Theory to Applications / by Jeffrey Pawlick, Quanyan Zhu
(Static & Dynamic Game Theory: Foundations & Applications. ISSN:23638524)
版 | 1st ed. 2021. |
---|---|
出版者 | Cham : Springer International Publishing : Imprint: Birkhäuser |
出版年 | 2021 |
大きさ | XIII, 190 p. 62 illus., 53 illus. in color : online resource |
著者標目 | *Pawlick, Jeffrey author Zhu, Quanyan author SpringerLink (Online service) |
件 名 | LCSH:Computer science—Mathematics LCSH:Data protection FREE:Mathematical Applications in Computer Science FREE:Data and Information Security |
一般注記 | Part I Fundamentals -- Introduction -- Nash and Stackelberg Games -- Introduction to Incomplete Information -- Part II Defensive Deception -- A Taxonomy of Defensive Deception -- Obfuscation -- Honey-X -- Attacker Engagement -- Part III Mitigation of Malicious Deception -- Strategic Trust -- Active Crowd Defense -- Part IV Challenges and Opportunities in Cyber Deception -- Insights and Future Directions -- Current Challenges in Cyber Deception This book introduces game theory as a means to conceptualize, model, and analyze cyber deception. Drawing upon a collection of deception research from the past 10 years, the authors develop a taxonomy of six species of defensive cyber deception. Three of these six species are highlighted in the context of emerging problems such as privacy against ubiquitous tracking in the Internet of things (IoT), dynamic honeynets for the observation of advanced persistent threats (APTs), and active defense against physical denial-of-service (PDoS) attacks. Because of its uniquely thorough treatment of cyber deception, this book will serve as a timely contribution and valuable resource in this active field. The opening chapters introduce both cybersecurity in a manner suitable for game theorists and game theory as appropriate for cybersecurity professionals. Chapter Four then guides readers through the specific field of defensive cyber deception. A key feature of the remaining chapters is the development of a signaling game model for the species of leaky deception featured in honeypots and honeyfiles. This model is expanded to study interactions between multiple agents with varying abilities to detect deception. Game Theory for Cyber Deception will appeal to advanced undergraduates, graduate students, and researchers interested in applying game theory to cybersecurity. It will also be of value to researchers and professionals working on cybersecurity who seek an introduction to game theory HTTP:URL=https://doi.org/10.1007/978-3-030-66065-9 |
目次/あらすじ
所蔵情報を非表示
電子ブック | 配架場所 | 資料種別 | 巻 次 | 請求記号 | 状 態 | 予約 | コメント | ISBN | 刷 年 | 利用注記 | 指定図書 | 登録番号 |
---|---|---|---|---|---|---|---|---|---|---|---|---|
電子ブック | オンライン | 電子ブック |
|
|
Springer eBooks | 9783030660659 |
|
電子リソース |
|
EB00200557 |
書誌詳細を非表示
データ種別 | 電子ブック |
---|---|
分 類 | LCC:QA76.9.M35 DC23:004.0151 |
書誌ID | 4000135580 |
ISBN | 9783030660659 |