Skip to main content
  • Textbook
  • © 2016

Introduction to Cyberdeception

  • Examines a broad range of cyberdeception techniques including impersonation, delays, fakes, camouflage, false excuses, and social engineering
  • Provides more breadth of coverage than any competing book
  • Uses a student-friendly format with exercises, minimal mathematics, and extensive references

Buy it now

Buying options

eBook USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 79.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (16 chapters)

  1. Front Matter

    Pages i-xiv
  2. Introduction

    • Neil C. Rowe, Julian Rrushi
    Pages 1-8
  3. Psychology of Deception

    • Neil C. Rowe, Julian Rrushi
    Pages 9-23
  4. Professional Deception

    • Neil C. Rowe, Julian Rrushi
    Pages 25-38
  5. Deception Methods for Defense

    • Neil C. Rowe, Julian Rrushi
    Pages 39-53
  6. Deception Methods for Offense

    • Neil C. Rowe, Julian Rrushi
    Pages 55-62
  7. Delays

    • Neil C. Rowe, Julian Rrushi
    Pages 63-73
  8. Fakes

    • Neil C. Rowe, Julian Rrushi
    Pages 75-96
  9. Defensive Camouflage

    • Neil C. Rowe, Julian Rrushi
    Pages 97-104
  10. False Excuses

    • Neil C. Rowe, Julian Rrushi
    Pages 105-119
  11. Defensive Social Engineering

    • Neil C. Rowe, Julian Rrushi
    Pages 121-131
  12. Measuring Deception

    • Neil C. Rowe, Julian Rrushi
    Pages 133-159
  13. Planning Cyberspace Deception

    • Neil C. Rowe, Julian Rrushi
    Pages 161-187
  14. Software Engineering of Deceptive Software and Systems

    • Neil C. Rowe, Julian Rrushi
    Pages 189-213
  15. Decoy I/O Devices

    • Neil C. Rowe, Julian Rrushi
    Pages 215-229
  16. Deception for the Electrical Power Industry

    • Neil C. Rowe, Julian Rrushi
    Pages 231-239
  17. Law and Ethics for Software Deception

    • Neil C. Rowe, Julian Rrushi
    Pages 241-250
  18. Back Matter

    Pages 251-334

About this book

This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots.  It contains features friendly for classroom use: (1) minimal use of programming details and mathematics, (2) modular chapters that can be covered in many orders, (3) exercises with each chapter, and (4) an extensive reference list.
Cyberattacks have grown serious enough that understanding and using deception is essential to safe operation in cyberspace. The deception techniques covered are impersonation, delays, fakes, camouflage, false excuses, and social engineering. Special attention is devoted to cyberdeception in industrial control systems and within operating systems. This material is supported by a detailed discussion of how to plan deceptions and calculate their detectability and effectiveness. Some of the chapters provide further technical details of specific deception techniques and their application. 
Cyberdeception can be conducted ethically and efficiently when necessary by following a few basic principles. This book is intended for advanced undergraduate students and graduate students, as well as computer professionals learning on their own. It will be especially useful for anyone who helps run important and essential computer systems such as critical-infrastructure and military systems.  


Reviews

“The purpose of this book is both to provide a systematic overview of cyberdeception and also to provide a study guide for all readers. … young researchers, managers, and anyone interested in the problem of cyberdeception will find in this book a great opportunity to learn about the topic. I highly recommend this book for anyone who is looking for an engaging and reader-friendly introduction to cyberdeception.” (Eugen Petac, Computing Reviews, April, 2017)

Authors and Affiliations

  • US Naval Postgraduate School, Monterey, USA

    Neil C. Rowe

  • Western Washington University, Bellingham, USA

    Julian Rrushi

About the authors

Neil C. Rowe is Professor of Computer Science at the U.S. Naval Postgraduate School where he has been since 1983.  He has a Ph.D. in Computer Science from Stanford University (1983).  His main research interests are in data mining, digital forensics, modeling of deception, and cyberwarfare.

Julian Rrushi is an assistant professor with the Department of Computer Science at Western Washington University, Bellingham, WA. He received a PhD in computer science from the University of Milan in 2009. His research is on cyber security, and includes work on industrial control systems. He worked for several years in industry as a vulnerability researcher before accepting a faculty appointment with Western Washington University.

Bibliographic Information

Buy it now

Buying options

eBook USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 79.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access