Authors:
- Introduces game theory as a means to conceptualize, analyze, and model cyber deception
- Develops a thorough game-theoretic taxonomy to identify and investigate emerging problems in cybersecurity
- Includes a broad range of game-theoretic models, such as large-population games and games of incomplete information
Part of the book series: Static & Dynamic Game Theory: Foundations & Applications (SDGTFA)
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (11 chapters)
-
Front Matter
-
Fundamentals
-
Front Matter
-
-
Defensive Deception
-
Front Matter
-
-
Mitigation of Malicious Deception
-
Front Matter
-
-
Challenges and Opportunities in Cyber Deception
-
Front Matter
-
-
Back Matter
About this book
This book introduces game theory as a means to conceptualize, model, and analyze cyber deception. Drawing upon a collection of deception research from the past 10 years, the authors develop a taxonomy of six species of defensive cyber deception. Three of these six species are highlighted in the context of emerging problems such as privacy against ubiquitous tracking in the Internet of things (IoT), dynamic honeynets for the observation of advanced persistent threats (APTs), and active defense against physical denial-of-service (PDoS) attacks. Because of its uniquely thorough treatment of cyber deception, this book will serve as a timely contribution and valuable resource in this active field.
The opening chapters introduce both cybersecurity in a manner suitable for game theorists and game theory as appropriate for cybersecurity professionals. Chapter Four then guides readers through the specific field of defensive cyber deception. A key feature of the remaining chapters is the development of a signaling game model for the species of leaky deception featured in honeypots and honeyfiles. This model is expanded to study interactions between multiple agents with varying abilities to detect deception.Game Theory for Cyber Deception will appeal to advanced undergraduates, graduate students, and researchers interested in applying game theory to cybersecurity. It will also be of value to researchers and professionals working on cybersecurity who seek an introduction to game theory.
Keywords
- Game Theory cyber deception
- Game theory cybersecurity
- Game Theory Internet of Things
- Defensive deception cyber
- Obfuscation cybersecurity
- Honey-X cybersecurity
- Strategic trust cybersecurity
- Attacker engagement cybersecurity
- Large population games
- Games of incomplete information
- Dos attack cybersecurity
- Nash games
- Stackelberg games
- Zero-sum matrix games
- Bayesian games
Reviews
Authors and Affiliations
-
Tandon School of Engineering, New York University, Brooklyn, USA
Jeffrey Pawlick, Quanyan Zhu
Bibliographic Information
Book Title: Game Theory for Cyber Deception
Book Subtitle: From Theory to Applications
Authors: Jeffrey Pawlick, Quanyan Zhu
Series Title: Static & Dynamic Game Theory: Foundations & Applications
DOI: https://doi.org/10.1007/978-3-030-66065-9
Publisher: Birkhäuser Cham
eBook Packages: Mathematics and Statistics, Mathematics and Statistics (R0)
Copyright Information: Springer Nature Switzerland AG 2021
Hardcover ISBN: 978-3-030-66064-2Published: 31 January 2021
Softcover ISBN: 978-3-030-66067-3Published: 31 January 2022
eBook ISBN: 978-3-030-66065-9Published: 30 January 2021
Series ISSN: 2363-8516
Series E-ISSN: 2363-8524
Edition Number: 1
Number of Pages: XIII, 190
Number of Illustrations: 9 b/w illustrations, 53 illustrations in colour
Topics: Mathematical Applications in Computer Science, Systems and Data Security