Cargando…

Game theory for cyber deception: from theory to applications

This book introduces game theory as a means to conceptualize, model, and analyze cyber deception. Drawing upon a collection of deception research from the past 10 years, the authors develop a taxonomy of six species of defensive cyber deception. Three of these six species are highlighted in the cont...

Descripción completa

Detalles Bibliográficos
Autores principales: Pawlick, Jeffrey, Zhu, Quanyan
Lenguaje:eng
Publicado: Springer 2021
Materias:
Acceso en línea:https://dx.doi.org/10.1007/978-3-030-66065-9
http://cds.cern.ch/record/2752790
_version_ 1780969303815749632
author Pawlick, Jeffrey
Zhu, Quanyan
author_facet Pawlick, Jeffrey
Zhu, Quanyan
author_sort Pawlick, Jeffrey
collection CERN
description This book introduces game theory as a means to conceptualize, model, and analyze cyber deception. Drawing upon a collection of deception research from the past 10 years, the authors develop a taxonomy of six species of defensive cyber deception. Three of these six species are highlighted in the context of emerging problems such as privacy against ubiquitous tracking in the Internet of things (IoT), dynamic honeynets for the observation of advanced persistent threats (APTs), and active defense against physical denial-of-service (PDoS) attacks. Because of its uniquely thorough treatment of cyber deception, this book will serve as a timely contribution and valuable resource in this active field. The opening chapters introduce both cybersecurity in a manner suitable for game theorists and game theory as appropriate for cybersecurity professionals. Chapter Four then guides readers through the specific field of defensive cyber deception. A key feature of the remaining chapters is the development of a signaling game model for the species of leaky deception featured in honeypots and honeyfiles. This model is expanded to study interactions between multiple agents with varying abilities to detect deception. Game Theory for Cyber Deception will appeal to advanced undergraduates, graduate students, and researchers interested in applying game theory to cybersecurity. It will also be of value to researchers and professionals working on cybersecurity who seek an introduction to game theory.
id cern-2752790
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2021
publisher Springer
record_format invenio
spelling cern-27527902021-04-21T16:43:35Zdoi:10.1007/978-3-030-66065-9http://cds.cern.ch/record/2752790engPawlick, JeffreyZhu, QuanyanGame theory for cyber deception: from theory to applicationsMathematical Physics and MathematicsThis book introduces game theory as a means to conceptualize, model, and analyze cyber deception. Drawing upon a collection of deception research from the past 10 years, the authors develop a taxonomy of six species of defensive cyber deception. Three of these six species are highlighted in the context of emerging problems such as privacy against ubiquitous tracking in the Internet of things (IoT), dynamic honeynets for the observation of advanced persistent threats (APTs), and active defense against physical denial-of-service (PDoS) attacks. Because of its uniquely thorough treatment of cyber deception, this book will serve as a timely contribution and valuable resource in this active field. The opening chapters introduce both cybersecurity in a manner suitable for game theorists and game theory as appropriate for cybersecurity professionals. Chapter Four then guides readers through the specific field of defensive cyber deception. A key feature of the remaining chapters is the development of a signaling game model for the species of leaky deception featured in honeypots and honeyfiles. This model is expanded to study interactions between multiple agents with varying abilities to detect deception. Game Theory for Cyber Deception will appeal to advanced undergraduates, graduate students, and researchers interested in applying game theory to cybersecurity. It will also be of value to researchers and professionals working on cybersecurity who seek an introduction to game theory.Springeroai:cds.cern.ch:27527902021
spellingShingle Mathematical Physics and Mathematics
Pawlick, Jeffrey
Zhu, Quanyan
Game theory for cyber deception: from theory to applications
title Game theory for cyber deception: from theory to applications
title_full Game theory for cyber deception: from theory to applications
title_fullStr Game theory for cyber deception: from theory to applications
title_full_unstemmed Game theory for cyber deception: from theory to applications
title_short Game theory for cyber deception: from theory to applications
title_sort game theory for cyber deception: from theory to applications
topic Mathematical Physics and Mathematics
url https://dx.doi.org/10.1007/978-3-030-66065-9
http://cds.cern.ch/record/2752790
work_keys_str_mv AT pawlickjeffrey gametheoryforcyberdeceptionfromtheorytoapplications
AT zhuquanyan gametheoryforcyberdeceptionfromtheorytoapplications