Introduction to Cyberdeception

  • Neil C. Rowe
  • Julian Rrushi

Table of contents

  1. Front Matter
    Pages i-xiv
  2. Neil C. Rowe, Julian Rrushi
    Pages 1-8
  3. Neil C. Rowe, Julian Rrushi
    Pages 9-23
  4. Neil C. Rowe, Julian Rrushi
    Pages 25-38
  5. Neil C. Rowe, Julian Rrushi
    Pages 39-53
  6. Neil C. Rowe, Julian Rrushi
    Pages 55-62
  7. Neil C. Rowe, Julian Rrushi
    Pages 63-73
  8. Neil C. Rowe, Julian Rrushi
    Pages 75-96
  9. Neil C. Rowe, Julian Rrushi
    Pages 97-104
  10. Neil C. Rowe, Julian Rrushi
    Pages 105-119
  11. Neil C. Rowe, Julian Rrushi
    Pages 121-131
  12. Neil C. Rowe, Julian Rrushi
    Pages 133-159
  13. Neil C. Rowe, Julian Rrushi
    Pages 161-187
  14. Neil C. Rowe, Julian Rrushi
    Pages 189-213
  15. Neil C. Rowe, Julian Rrushi
    Pages 215-229
  16. Neil C. Rowe, Julian Rrushi
    Pages 231-239
  17. Neil C. Rowe, Julian Rrushi
    Pages 241-250
  18. Back Matter
    Pages 251-334

About this book

Introduction

This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots.  It contains features friendly for classroom use: (1) minimal use of programming details and mathematics, (2) modular chapters that can be covered in many orders, (3) exercises with each chapter, and (4) an extensive reference list.
Cyberattacks have grown serious enough that understanding and using deception is essential to safe operation in cyberspace. The deception techniques covered are impersonation, delays, fakes, camouflage, false excuses, and social engineering. Special attention is devoted to cyberdeception in industrial control systems and within operating systems. This material is supported by a detailed discussion of how to plan deceptions and calculate their detectability and effectiveness. Some of the chapters provide further technical details of specific deception techniques and their application. 
Cyberdeception can be conducted ethically and efficiently when necessary by following a few basic principles. This book is intended for advanced undergraduate students and graduate students, as well as computer professionals learning on their own. It will be especially useful for anyone who helps run important and essential computer systems such as critical-infrastructure and military systems.  

Keywords

deception computers networks digital devices defense offense honeypots impersonation fakes decoys camouflage excuses social engineering decision trees taxonomies target selection operating systems I/O devices industrial control systems measurement

Authors and affiliations

  • Neil C. Rowe
    • 1
  • Julian Rrushi
    • 2
  1. 1.US Naval Postgraduate SchoolMontereyUSA
  2. 2.Western Washington UniversityBellinghamUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-41187-3
  • Copyright Information Springer International Publishing Switzerland 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-41185-9
  • Online ISBN 978-3-319-41187-3
  • About this book
Industry Sectors
Pharma
Automotive
Electronics
Telecommunications
Consumer Packaged Goods
Aerospace