Get Free Shipping on orders over $79
Game Theory for Cyber Deception : From Theory to Applications - Jeffrey Pawlick

Game Theory for Cyber Deception

From Theory to Applications

By: Jeffrey Pawlick, Quanyan Zhu

Paperback | 31 January 2022

At a Glance

Paperback


$169.00

or 4 interest-free payments of $42.25 with

 or 

Ships in 5 to 7 business days

This book introduces game theory as a means to conceptualize, model, and analyze cyber deception. Drawing upon a collection of deception research from the past 10 years, the authors develop a taxonomy of six species of defensive cyber deception. Three of these six species are highlighted in the context of emerging problems such as privacy against ubiquitous tracking in the Internet of things (IoT), dynamic honeynets for the observation of advanced persistent threats (APTs), and active defense against physical denial-of-service (PDoS) attacks. Because of its uniquely thorough treatment of cyber deception, this book will serve as a timely contribution and valuable resource in this active field.



The opening chapters introduce both cybersecurity in a manner suitable for game theorists and game theory as appropriate for cybersecurity professionals. Chapter Four then guides readers through the specific field of defensive cyber deception. A key feature of the remaining chapters is the development of a signaling game model for the species of leaky deception featured in honeypots and honeyfiles. This model is expanded to study interactions between multiple agents with varying abilities to detect deception.



Game Theory for Cyber Deception will appeal to advanced undergraduates, graduate students, and researchers interested in applying game theory to cybersecurity. It will also be of value to researchers and professionals working on cybersecurity who seek an introduction to game theory.

Industry Reviews
"The book is a good approach for abstracting the essentials of IoT allowing to model designing optimal, robust, and multi-layered approaches to defensive deception and counter-deception. It will be a good help for both scholars and persons involved in the practical issues of cyber-protection." (Carlos Narciso Bouza Herrera, zbMATH 1484.91002, 2022)

More in Computer Security

Grey Area : Dark Web Data Collection and the Future of OSINT - Vinny Troia
Permanent Record : A Memoir of a Reluctant Whistleblower - Edward Snowden
Computer Security : Art and Science - Dariel Wyatt
Foundations of Information Security - Liam Lewis
Cybersecurity All-in-One For Dummies : For Dummies - Joseph Steinberg
Hacking For Dummies : For Dummies (Computer/Tech) - Kevin Beaver

RRP $49.95

$38.75

22%
OFF
Careless People : A story of where I used to work - Sarah Wynn-Williams

RRP $24.99

$21.75

13%
OFF
Mindf*ck : Inside Cambridge Analytica's Plot to Break the World - Profile Books
Supremacy : AI, ChatGPT and the Race that Will Change the World - Parmy Olson
Crafting an Information Security Playbook - Brandon Enright

RRP $95.00

$43.75

54%
OFF