Game Theory for Cyber Deception From Theory to Applications

This book introduces game theory as a means to conceptualize, model, and analyze cyber deception. Drawing upon a collection of deception research from the past 10 years, the authors develop a taxonomy of six species of defensive cyber deception. Three of these six species are highlighted in the cont...

Full description

Bibliographic Details
Main Authors: Pawlick, Jeffrey, Zhu, Quanyan (Author)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2021, 2021
Edition:1st ed. 2021
Series:Static & Dynamic Game Theory: Foundations & Applications
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03080nmm a2200313 u 4500
001 EB001957314
003 EBX01000000000000001120216
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210208 ||| eng
020 |a 9783030660659 
100 1 |a Pawlick, Jeffrey 
245 0 0 |a Game Theory for Cyber Deception  |h Elektronische Ressource  |b From Theory to Applications  |c by Jeffrey Pawlick, Quanyan Zhu 
250 |a 1st ed. 2021 
260 |a Cham  |b Springer International Publishing  |c 2021, 2021 
300 |a XIII, 190 p. 62 illus., 53 illus. in color  |b online resource 
505 0 |a Part I Fundamentals -- Introduction -- Nash and Stackelberg Games -- Introduction to Incomplete Information -- Part II Defensive Deception -- A Taxonomy of Defensive Deception -- Obfuscation -- Honey-X -- Attacker Engagement -- Part III Mitigation of Malicious Deception -- Strategic Trust -- Active Crowd Defense -- Part IV Challenges and Opportunities in Cyber Deception -- Insights and Future Directions -- Current Challenges in Cyber Deception 
653 |a Computer science—Mathematics 
653 |a Computer security 
653 |a Mathematical Applications in Computer Science 
653 |a Computer mathematics 
653 |a Systems and Data Security 
700 1 |a Zhu, Quanyan  |e [author] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Static & Dynamic Game Theory: Foundations & Applications 
856 4 0 |u https://doi.org/10.1007/978-3-030-66065-9?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 004.0151 
520 |a This book introduces game theory as a means to conceptualize, model, and analyze cyber deception. Drawing upon a collection of deception research from the past 10 years, the authors develop a taxonomy of six species of defensive cyber deception. Three of these six species are highlighted in the context of emerging problems such as privacy against ubiquitous tracking in the Internet of things (IoT), dynamic honeynets for the observation of advanced persistent threats (APTs), and active defense against physical denial-of-service (PDoS) attacks. Because of its uniquely thorough treatment of cyber deception, this book will serve as a timely contribution and valuable resource in this active field. The opening chapters introduce both cybersecurity in a manner suitable for game theorists and game theory as appropriate for cybersecurity professionals. Chapter Four then guides readers through the specific field of defensive cyber deception. A key feature of the remaining chapters is the development of a signaling game model for the species of leaky deception featured in honeypots and honeyfiles. This model is expanded to study interactions between multiple agents with varying abilities to detect deception. Game Theory for Cyber Deception will appeal to advanced undergraduates, graduate students, and researchers interested in applying game theory to cybersecurity. It will also be of value to researchers and professionals working on cybersecurity who seek an introduction to game theory