Read more
This book, structured as an edited volume, consists of 12 chapters organized into four key themes: Theoretical Foundations, Human Factors, Application Domains, and Future Challenges. It highlights the dynamic and interdisciplinary nature of cyber deception research, offering insights into diverse application areas such as industrial control systems and AI security.
Cyber deception has emerged as a critical strategy for defending digital assets across academia, industry, and government. By creating false information, deceptive environments, or misleading signals, it aims to confuse, delay, or misdirect adversaries while simultaneously gathering intelligence on their tactics. This proactive approach shifts the traditional information advantage from attackers to defenders, strengthening cybersecurity resilience.
Designed as a foundational resource, this book is particularly valuable for students and early-career researchers seeking to understand cyber deception and identify pressing research challenges. It emphasizes the need for context-aware and adaptive strategies to counter the ever-evolving tactics of cyber adversaries. Furthermore, this book advocates for leveraging emerging technologies and interdisciplinary approaches to advance deception techniques. By addressing both current and future challenges, this volume provides a comprehensive roadmap for enhancing cyber deception strategies and fostering the development of more robust and resilient cybersecurity defences.
List of contents
Section 1: Modeling and Analysis.- Chapter 1: Overview and challenges of modeling and analysis for cyber deception.- Chapter 2: Game-theoretic models for cyber deception.- Chapter 3: Formal methods and their applications.- Chapter 4: Data science and machine learning for cyber deception.- Section 2: Human Factors.- Chapter 5: Overview and challenges of human factors for cyber deception.- Chapter 6: Cognitive vulnerabilities.- Chapter 7: Human bounded rationality biases.- Chapter 8: Human modeling and data science.- Section 3: Design and Practice.- Chapter 9: Overview and challenges of design and practice.- Chapter 10: MITRE framework for cyber deception.- Chapter 11: Practical tools and experiments.- Chapter 12: Design considerations for cyber deception solutions.- Section 4: Convergent Scientific Foundations.- Chapter 13: Overview and the need for a convergent science.- Chapter 14: Convergent Foundation for defensive deception for industrial control systems.- Chapter 15: Convergent Foundation for automated deception of cyber malware.- Chapter 16: Convergent Foundation for defensive cognitive security.- Chapter 17: Conclusions and Perspectives.