Skip to main content
  • Book
  • © 2021

Game Theory for Cyber Deception

From Theory to Applications

Birkhäuser
  • Introduces game theory as a means to conceptualize, analyze, and model cyber deception
  • Develops a thorough game-theoretic taxonomy to identify and investigate emerging problems in cybersecurity
  • Includes a broad range of game-theoretic models, such as large-population games and games of incomplete information

Buy it now

Buying options

eBook USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (11 chapters)

  1. Front Matter

    Pages i-xiii
  2. Fundamentals

    1. Front Matter

      Pages 1-1
    2. Introduction

      • Jeffrey Pawlick, Quanyan Zhu
      Pages 3-12
    3. Nash and Stackelberg Games

      • Jeffrey Pawlick, Quanyan Zhu
      Pages 13-26
    4. Introduction to Incomplete Information

      • Jeffrey Pawlick, Quanyan Zhu
      Pages 27-33
  3. Defensive Deception

    1. Front Matter

      Pages 35-35
    2. A Taxonomy of Defensive Deception

      • Jeffrey Pawlick, Quanyan Zhu
      Pages 37-48
    3. Obfuscation

      • Jeffrey Pawlick, Quanyan Zhu
      Pages 49-58
    4. Honey-X

      • Jeffrey Pawlick, Quanyan Zhu
      Pages 59-89
    5. Attacker Engagement

      • Jeffrey Pawlick, Quanyan Zhu
      Pages 91-109
  4. Mitigation of Malicious Deception

    1. Front Matter

      Pages 111-111
    2. Strategic Trust

      • Jeffrey Pawlick, Quanyan Zhu
      Pages 113-145
    3. Active Crowd Defense

      • Jeffrey Pawlick, Quanyan Zhu
      Pages 147-167
  5. Challenges and Opportunities in Cyber Deception

    1. Front Matter

      Pages 169-169
    2. Insights and Future Directions

      • Jeffrey Pawlick, Quanyan Zhu
      Pages 171-174
    3. Current Challenges in Cyber Deception

      • Jeffrey Pawlick, Quanyan Zhu
      Pages 175-177
  6. Back Matter

    Pages 179-190

About this book

This book introduces game theory as a means to conceptualize, model, and analyze cyber deception. Drawing upon a collection of deception research from the past 10 years, the authors develop a taxonomy of six species of defensive cyber deception. Three of these six species are highlighted in the context of emerging problems such as privacy against ubiquitous tracking in the Internet of things (IoT), dynamic honeynets for the observation of advanced persistent threats (APTs), and active defense against physical denial-of-service (PDoS) attacks. Because of its uniquely thorough treatment of cyber deception, this book will serve as a timely contribution and valuable resource in this active field.

The opening chapters introduce both cybersecurity in a manner suitable for game theorists and game theory as appropriate for cybersecurity professionals. Chapter Four then guides readers through the specific field of defensive cyber deception. A key feature of the remaining chapters is the development of a signaling game model for the species of leaky deception featured in honeypots and honeyfiles. This model is expanded to study interactions between multiple agents with varying abilities to detect deception.

Game Theory for Cyber Deception will appeal to advanced undergraduates, graduate students, and researchers interested in applying game theory to cybersecurity. It will also be of value to researchers and professionals working on cybersecurity who seek an introduction to game theory.


Reviews

“The book is a good approach for abstracting the essentials of IoT allowing to model designing optimal, robust, and multi-layered approaches to defensive deception and counter-deception. It will be a good help for both scholars and persons involved in the practical issues of cyber-protection.” (Carlos Narciso Bouza Herrera, zbMATH 1484.91002, 2022)

Authors and Affiliations

  • Tandon School of Engineering, New York University, Brooklyn, USA

    Jeffrey Pawlick, Quanyan Zhu

Bibliographic Information

Buy it now

Buying options

eBook USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access