Cyber deception : techniques, strategies, and human aspects /

"This book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber deception is that it is an interdisciplinary research field requiring study from techniques and strategies to human aspects. This book covers a wid...

Full description

Saved in:
Bibliographic Details
Group Author: Bao, Tiffany (Editor); Tambe, Milind, 1965- (Editor); Wang, Cliff (Editor)
Published: Springer,
Publisher Address: Cham :
Publication Dates: [2023]
Literature type: Book
Language: English
Series: Advances in information security, 89
Subjects:
Summary: "This book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber deception is that it is an interdisciplinary research field requiring study from techniques and strategies to human aspects. This book covers a wide variety of cyber deception research, including game theory, artificial intelligence, cognitive science, and deception-related technology. The research introduced in this book identifies the scientific challenges, highlights the complexity and inspires the future research of cyber deception. Researchers working in cybersecurity and advanced-level computer science students focused on cybersecurity will find this book useful as a reference. This book also targets professionals working in cybersecurity."--Publisher's description.
Carrier Form: x, 249 pages : illustrations (some color) ; 24 cm.
Bibliography: Includes bibliographical references.
ISBN: 9783031166129
3031166124
Index Number: TK5105
CLC: TP393.08
Call Number: TP393.08/C994-34
Contents: Diversifying Deception: Game Theoretic Models for Two-Sided Deception and Initial Human Studies -- Human-Subject Experiments on Risk-based Cyber Camouflage Games -- Adaptive Cyberdefense with Deception: A Human-AI Cognitive Approach -- Cognitive Modeling for Personalized, Adaptive Signaling for Cyber Deception -- Deceptive Signaling: Understanding Human Behavior against Signaling algorithms -- Optimizing Honey Traffic Using Game Theory and Adversarial Learning -- Mee: Adaptive Honeyfile System for Insider Attacker Detection -- HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems -- Using Amnesia to Detect Credential Database Breaches -- Deceiving ML-Based Friend-or-Foe Identification for Executables.