Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама



Название: Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings
Автор: Ehab Al-Shaer and Jinpeng Wei
Издательство: Springer
ISBN: 3030021092
Год: 2019
Страниц: 235
Язык: английский
Формат: pdf (true), epub
Размер: 28.3 MB

This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception.

What Is Cyber Deception? Cyber deception has emerged as an effective and complementary defense technique to overcome asymmetry challenges faced by traditional detection and prevention strategies. Approaches in this domain deliberately introduce misinformation or misleading functionality into cyberspace in order to trick adversaries in ways that render attacks ineffective or infeasible. These reciprocal asymmetries pose scalability problems for attackers similar to the ones traditionally faced by defenders, thereby leveling the battlefield.

An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced,.

This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It’s also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced.

Contents:
Part I. Cyber Deception Reasoning Frameworks
1. Using Deep Learning to Generate Relational HoneyData
2. Towards Intelligent Cyber Deception Systems
3. Honeypot Deception Tactics
Part II. Dynamic Decision-Making for Cyber Deception
4. Modeling and Analysis of Deception Games Based on Hypergame Theory
5. Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception
Part III. Network-Based Deception
6. CONCEAL: A Strategy Composition for Resilient Cyber Deception: Framework, Metrics, and Deployment
7. NetShifter: A Comprehensive Multi-Dimensional Network Obfuscation and Deception Solution
8. Deception-Enhanced Threat Sensing for Resilient Intrusion Detection
9. HONEYSCOPE: IoT Device Protection with Deceptive Network Views
Part IV. Malware Deception
10. gExtractor: Automated Extraction of Malware Deception Parameters for Autonomous Cyber Deception
11. Malware Deception with Automatic Analysis and Generation of HoneyResource

Скачать Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings









НЕ РАБОТАЕТ TURBOBIT.NET? ЕСТЬ РЕШЕНИЕ, ЖМИ СЮДА!





Автор: Ingvar16 3-06-2019, 13:25 | Напечатать | СООБЩИТЬ ОБ ОШИБКЕ ИЛИ НЕ РАБОЧЕЙ ССЫЛКЕ
 
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.





С этой публикацией часто скачивают:
    {related-news}

Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.





 MyMirKnig.ru  ©2019     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности