dc.contributor.author | Bodström, Tero | |
dc.contributor.author | Hämäläinen, Timo | |
dc.date.accessioned | 2019-04-04T08:23:06Z | |
dc.date.available | 2019-04-04T08:23:06Z | |
dc.date.issued | 2019 | |
dc.identifier.citation | Bodström, T., & Hämäläinen, T. (2019). A Novel Deep Learning Stack for APT Detection. <i>Applied Sciences</i>, <i>9</i>(6), Article 1055. <a href="https://doi.org/10.3390/app9061055" target="_blank">https://doi.org/10.3390/app9061055</a> | |
dc.identifier.other | CONVID_28975218 | |
dc.identifier.other | TUTKAID_80987 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/63384 | |
dc.description.abstract | We present a novel Deep Learning (DL) stack for detecting Advanced Persistent threat
(APT) attacks. This model is based on a theoretical approach where an APT is observed as a
multi-vector multi-stage attack with a continuous strategic campaign. To capture these attacks,
the entire network flow and particularly raw data must be used as an input for the detection process.
By combining different types of tailored DL-methods, it is possible to capture certain types of
anomalies and behaviour. Our method essentially breaks down a bigger problem into smaller tasks,
tries to solve these sequentially and finally returns a conclusive result. This concept paper outlines,
for example, the problems and possible solutions for the tasks. Additionally, we describe how we
will be developing, implementing and testing the method in the near future. | fi |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | MDPI AG | |
dc.relation.ispartofseries | Applied Sciences | |
dc.rights | CC BY 4.0 | |
dc.subject.other | Advanced Persistent Thread (APT) | |
dc.subject.other | Deep Learning (DL) | |
dc.subject.other | network anomaly detection | |
dc.title | A Novel Deep Learning Stack for APT Detection | |
dc.type | article | |
dc.identifier.urn | URN:NBN:fi:jyu-201903201916 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tietotekniikka | fi |
dc.contributor.oppiaine | Mathematical Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.date.updated | 2019-03-20T10:15:17Z | |
dc.type.coar | http://purl.org/coar/resource_type/c_2df8fbb1 | |
dc.description.reviewstatus | peerReviewed | |
dc.relation.issn | 2076-3417 | |
dc.relation.numberinseries | 6 | |
dc.relation.volume | 9 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © 2019 by The Authors. Licensee MDPI, Basel, Switzerland. | |
dc.rights.accesslevel | openAccess | fi |
dc.subject.yso | tietoturva | |
dc.subject.yso | verkkohyökkäykset | |
dc.subject.yso | koneoppiminen | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5479 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27466 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p21846 | |
dc.rights.url | https://creativecommons.org/licenses/by/4.0/ | |
dc.relation.doi | 10.3390/app9061055 | |
dc.type.okm | A1 | |