Abstract
Security challenges accompany the efficiency. The pervasive integration of information and communications technologies (ICTs) makes cyber-physical systems vulnerable to targeted attacks that are deceptive, persistent, adaptive, and strategic. Attack instances such as Stuxnet, Dyn, and WannaCry ransomware have shown the insufficiency of off-the-shelf defensive methods including the firewall and intrusion detection systems.
Original language | English (US) |
---|---|
Title of host publication | Autonomous Cyber Deception |
Subtitle of host publication | Reasoning, Adaptive Planning, and Evaluation of HoneyThings |
Publisher | Springer International Publishing |
Pages | 75-97 |
Number of pages | 23 |
ISBN (Electronic) | 9783030021108 |
ISBN (Print) | 9783030021092 |
DOIs | |
State | Published - Jan 1 2019 |
Keywords
- Advanced Persistent Threats (APTs)
- Bayesian games
- Cyber deception
- Multi-stage transitions
- Proactive and strategic defense
ASJC Scopus subject areas
- General Computer Science