Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception

Linan Huang, Quanyan Zhu

Research output: Chapter in Book/Report/Conference proceedingChapter


Security challenges accompany the efficiency. The pervasive integration of information and communications technologies (ICTs) makes cyber-physical systems vulnerable to targeted attacks that are deceptive, persistent, adaptive, and strategic. Attack instances such as Stuxnet, Dyn, and WannaCry ransomware have shown the insufficiency of off-the-shelf defensive methods including the firewall and intrusion detection systems.

Original languageEnglish (US)
Title of host publicationAutonomous Cyber Deception
Subtitle of host publicationReasoning, Adaptive Planning, and Evaluation of HoneyThings
PublisherSpringer International Publishing
Number of pages23
ISBN (Electronic)9783030021108
ISBN (Print)9783030021092
StatePublished - Jan 1 2019


  • Advanced Persistent Threats (APTs)
  • Bayesian games
  • Cyber deception
  • Multi-stage transitions
  • Proactive and strategic defense

ASJC Scopus subject areas

  • General Computer Science


Dive into the research topics of 'Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception'. Together they form a unique fingerprint.

Cite this