Command and Control: Monitoring, defending and exploiting critical infrastructure
For securing critical infrastructure, this thesis aims to develop a common operating picture system, establish methods for detecting targeted cyberattacks, and investigate exploits against machine learning -based decision making. A design-science research framework is used, in which the validity is assessed through practical applicability of the solution artifact, and through an iterative requirements–evaluation cycle in close cooperation with key stakeholders.
The included studies address three topics: i) common operating picture systems, with emphasis on modeling and analysis methods, ii) neural network -based detection of encrypted malware command and control channels, and iii) one-pixel attacks targeting a neural network -based computer-aided cancer diagnosis. The studies made extensive use of raw data obtained through stakeholder collaboration. In addition, malware network traffic data generated through cybertraining activities on cyber-range environments, and tools used in targeted APT-malware attacks were utilized. A tissue sample -based tool, utilizing neural network technology, for computeraided diagnosis of breast cancer, and associated digitized light microscope samples were used in vulnerability research.
The main results include ascertaining the applicability of the design-science research framework to the individual problem fields, and noting the necessity of raw data and stakeholder cooperation. Considering the results by topic, the required modeling and analysis methods could be implemented as a part of a common operating picture system, suitable neural network architectures with validation methods were created in malware traffic detection studies, and a method for producing hostile samples could be found in the study concerning one-pixel attacks.
The practical results of the common operating picture -study include an VN TEAS report, produced to support state-level decision making, in which the results of the studies were utilized extensively. With regard to cyberattack detection methods, their suitability for SUNBURSTbackdoor detection was established. With regard to the one-pixel attack, the feasibility of the attack was demonstrated and the first publication considering the attack in a computer-aided diagnostic setting was produced.
...
Kriittisen infrastruktuurin turvaamiseksi pyritään kehittämään tilannekuvajärjestelmä, luomaan kohdistettujen verkkohyökkäyksien havainnontimenetelmiä sekä tutkimaan vihamielistä vaikuttamista koneoppimismenetelmäpohjaiseen päätöksentekoon. Tähän tarkoitukseen käytetään kehittämistutkimuksellista (design-science research) kehikkoa, jonka puitteissa validiteettiä arvioidaan sekä ratkaisuartefaktin käytännön soveltuvuuden, että iteratiivisen vaatimusmäärittely–evaluaatiosyklin kautta läheisessä yhteistyössä keskeisten sidosryhmien kanssa.
Osatutkimukset käsittelevät kolmea aihepiiriä: yhdistetyn tilannekuvan järjestelmää mallinnus ja analyysimenetelmineen, haittaohjelmien salattujen komentokanavien neuroverkkopohjaista paljastamista sekä vihamielistä yhden kuvapisteen erheytyshyökkäystä neuroverkkopohjaiseen syövän tietokoneavusteisen diagnoosin työkaluun. Osatutkimuksissa hyödynnettiin laajasti sidosryhmäyhteistyön kautta hankittua raakadataa, kyberharjoitustoiminnan ja -ympäristön avulla tuotettua haittaohjelmien verkkoliikennedataa, kohdistetuissa APT-ryhmien haittaohjelmahyökkäyksissä käytettyjä kyberoperaatiotyökaluja sekä kudosnäytepohjaista rintasyövän tietokoneavusteisen diagnoosin neuroverkkoteknologiaa hyödyntävää työkalua ja digitalisoituja valomikroskooppinäytteitä.
Tutkimuksen päätuloksina voidaan osaltaan pitää valitun kehikon sovelluskelpoisuutta osatutkimusten ongelmakenttiin, sekä tutkimusten osoittamaa raakadatan ja sidosryhmäyhteistyön välttämättömyyttä. Tilannekuvajärjestelmän osatutkimuksissa kyettiin toteuttamaan vaaditut mallinnus- ja analyysimenetelmät, havainnointimenetelmien osuudessa luotiin soveltuvat neuroverkkoarkkitehtuurit validointimenetelmineen sekä erheytyksen osatutkimuksessa löytämään menetelmä vihamielisten näytteiden tuottamiseksi. Tutkimuksen käytännöllisinä tuloksina voidaan tilannekuvajärjestelmän osalta pitää valtiollisen päätöksenteon tueksi tuotettua VN TEAS -raporttia, jossa osatutkimusten tuloksia hyödynnettiin laajasti. Verkkohyökkäyksien havainnointimenetelmien osalta voidaan todeta niiden soveltuvuus SUNBURST-takaoven havainnointiin. Erheytyshyökkäyksen osalta voidaan tuloksiksi lukea käyttökelpoisuuden osoitus sekä aiemmin julkaisematon kuvaus hyökkäystyypin kohdistamisesta tietokoneavusteisen diagnoosin sovellutuksiin.
...




ISBN
978-951-39-8755-8ISSN Search the Publication Forum
2489-9003Contains publications
- Artikkeli I: Puuska S. et al. (2015). Modelling and real-time analysis of critical infrastructure using discrete eventsystems on graph. In 2015 IEEE International Symposium on Technologies for Homeland Security (HST), 2015, pp. 1–5. DOI: 10.1109/THS.2015.7225330
- Artikkeli II: Puuska S. et al. (2017) Integrated platform for critical infrastructure analysis and common operating picture solutions. In 2017 IEEE Internationa lSymposium on Technologies for Homeland Security (HST), 2017, 1–6. DOI: 10.1109/THS.2017.8093737
- Artikkeli III: Puuska S. et al. (2018). Nationwide critical infrastructure monitoring using a common operating picture framework. International Journal of Critical Infrastructure Protection, vol. 20, 28–47. DOI: 10.1016/j.ijcip.2017.11.005
- Artikkeli IV: Kokkonen T. and Puuska S. (2018). Blue Team Communication and Reporting for Enhancing Situational Awareness from White Team Perspective in Cyber Security Exercises. In Internet of Things, Smart Spaces, and Next Generation Networks and Systems, O. Galinina et al., Eds.. Cham: Springer International Publishing, 277–288. DOI: 10.1007/978-3-030-01168-0_26
- Artikkeli V: Puuska S. et al. (2019). Anomaly-Based Network Intrusion Detection Using Wavelets and Adversarial Autoencoders. In Innovative Security Solutions for Information Technology and Communications, J.-L. Lanet and C. Toma, Eds., Cham: Springer International Publishing, 234–246. DOI: 10.1007/978-3-030-12942-2_18
- Artikkeli VI: Kokkonen T. et al. (2019). Network Anomaly Detection Based on WaveNet. In Internet of Things, Smart Spaces, and Next Generation Networks and Systems, O. Galinina et al., Eds., Cham:Springer International Publishing, 424–433. DOI: 10.1007/978-3-030-30859-9_36
- Artikkeli VII: Puuska S. et al. (2020). Statistical Evaluation of Artificial Intelligence -Based Intrusion Detection System. In Trends and Innovations in Information Systems and Technologies, Á. Rocha et al., Eds. Cham: Springer International Publishing, 464–470. DOI: 10.1007/978-3-030-45691-7_43
- Artikkeli VIII: Sipola T. et al. (2020). Model Fooling Attacks Against Medical Imaging: A Short Survey. Information & Security: An International Journal, vol. 46, no. 2, 215–224. DOI: 10.11610/isij.4615
- Artikkeli IX: Korpihalkola J. et al. (2020). One-pixel Attack Deceives Automatic Detection of Breast Cancer. Computers & Security, under review.
Keywords
critical infrastructure protection kriittinen infrastruktuuri mathematical modeling matemaattinen mallinnus advanced persistent threat APT-uhka intrusion detection kyberhyökkäysten havaitseminen one-pixel attack yhden pikselin hyökkäys computer-aided diagnosis tietokoneavusteinen diagnoosi neuroverkot neural networks (information technology) data security tietoturva cyber attacks verkkohyökkäykset cyber security kyberturvallisuus cancerous diseases syöpätaudit
Metadata
Show full item recordCollections
- JYU Dissertations [694]
- Väitöskirjat [3298]
Related items
Showing items with similar title or keywords.
-
One-Pixel Attack Deceives Computer-Assisted Diagnosis of Cancer
Korpihalkola, Joni; Sipola, Tuomo; Puuska, Samir; Kokkonen, Tero (ACM, 2021)Computer vision and machine learning can be used to automate various tasks in cancer diagnostic and detection. If an attacker can manipulate the automated processing, the results can be devastating and in the worst case ... -
Cyber-Attacks Against Critical Infrastructure
Lehto, Martti (Springer, 2022)In the cyber world, the most important threat focuses on critical infrastructure (CI). CI encompasses the structures and functions that are vital to society’s uninterrupted functioning. It comprises physical facilities and ... -
Unsupervised network intrusion detection systems for zero-day fast-spreading network attacks and botnets
Vahdani Amoli, Payam (University of Jyväskylä, 2015)Today, the occurrence of zero-day and complex attacks in high-speed networks is increasingly common due to the high number vulnerabilities in the cyber world. As a result, intrusions become more sophisticated and fast ... -
Lack of association between screening interval and cancer stage in Lynch syndrome may be accounted for by over-diagnosis; a prospective Lynch syndrome database report
Seppälä, Toni T.; Ahadova, Aysel; Dominguez-Valentin, Mev; Macrae, Finlay; Evans, D. Gareth; Therkildsen, Christina; Sampson, Julian; Scott, Rodney; Burn, John; Möslein, Gabriela; Bernstein, Inge; Holinski-Feder, Elke; Pylvänäinen, Kirsi; Renkonen-Sinisalo, Laura; Lepistö, Anna; Lautrup, Charlotte Kvist; Lindblom, Annika; Plazzer, John-Paul; Winship, Ingrid; Tjandra, Douglas; Katz, Lior H.; Aretz, Stefan; Hüneburg, Robert; Holzapfel, Stefanie; Heinimann, Karl; Valle, Adriana Della; Neffa, Florencia; Gluck, Nathan; Cappel, Wouter H. de Vos tot Nederveen; Vasen, Hans; Morak, Monika; Steinke-Lange, Verena; Engel, Christoph; Rahner, Nils; Schmiegel, Wolff; Vangala, Deepak; Thomas, Huw; Green, Kate; Lalloo, Fiona; Crosbie, Emma J.; Hill, James; Capella, Gabriel; Pineda, Marta; Navarro, Matilde; Blanco, Ignacio; Broeke, Sanne ten; Nielsen, Maartje; Ljungmann, Ken; Nakken, Sigve; Lindor, Noralane; Frayling, Ian; Hovig, Eivind; Sunde, Lone; Kloor, Matthias; Mecklin, Jukka-Pekka; Kalager, Mette; Møller, Pål (BioMed Central Ltd., 2019)Background Recent epidemiological evidence shows that colorectal cancer (CRC) continues to occur in carriers of pathogenic mismatch repair (path_MMR) variants despite frequent colonoscopy surveillance in expert centres. ... -
Mortality by age, gene and gender in carriers of pathogenic mismatch repair gene variants receiving surveillance for early cancer diagnosis and treatment : a report from the prospective Lynch syndrome database
Dominguez-Valentin, Mev; Haupt, Saskia; Seppälä, Toni T.; Sampson, Julian R.; Sunde, Lone; Bernstein, Inge; Jenkins, Mark A.; Engel, Christoph; Aretz, Stefan; Nielsen, Maartje; Capella, Gabriel; Balaguer, Francesc; Evans, Dafydd Gareth; Burn, John; Holinski-Feder, Elke; Bertario, Lucio; Bonanni, Bernardo; Lindblom, Annika; Levi, Zohar; Macrae, Finlay; Winship, Ingrid; Plazzer, John-Paul; Sijmons, Rolf; Laghi, Luigi; Della Valle, Adriana; Heinimann, Karl; Dębniak, Tadeusz; Fruscio, Robert; Lopez-Koestner, Francisco; Alvarez-Valenzuela, Karin; Katz, Lior H.; Laish, Ido; Vainer, Elez; Vaccaro, Carlos; Carraro, Dirce Maria; Monahan, Kevin; Half, Elizabeth; Stakelum, Aine; Winter, Des; Kennelly, Rory; Gluck, Nathan; Sheth, Harsh; Abu-Freha, Naim; Greenblatt, Marc; Rossi, Benedito Mauro; Bohorquez, Mabel; Cavestro, Giulia Martina; Lino-Silva, Leonardo S.; Horisberger, Karoline; Tibiletti, Maria Grazia; do Nascimento, Ivana; Thomas, Huw; Rossi, Norma Teresa; Apolinário da Silva, Leandro; Zaránd, Attila; Ruiz-Bañobre, Juan; Heuveline, Vincent; Mecklin, Jukka-Pekka; Pylvänäinen, Kirsi; Renkonen-Sinisalo, Laura; Lepistö, Anna; Peltomäki, Päivi; Therkildsen, Christina; Madsen, Mia Gebauer; Burgdorf, Stefan Kobbelgaard; Hopper, John L.; Win, Aung Ko; Haile, Robert W.; Lindor, Noralane; Gallinger, Steven; Le Marchand, Loïc; Newcomb, Polly A.; Figueiredo, Jane; Buchanan, Daniel D.; Thibodeau, Stephen N.; von Knebel Doeberitz, Magnus; Loeffler, Markus; Rahner, Nils; Schröck, Evelin; Steinke-Lange, Verena; Schmiegel, Wolff; Vangala, Deepak; Perne, Claudia; Hüneburg, Robert; Redler, Silke; Büttner, Reinhard; Weitz, Jürgen; Pineda, Marta; Duenas, Nuria; Vidal, Joan Brunet; Moreira, Leticia; Sánchez, Ariadna; Hovig, Eivind; Nakken, Sigve; Green, Kate; Lalloo, Fiona; Hill, James; Crosbie, Emma; Mints, Miriam; Goldberg, Yael; Tjandra, Douglas; ten Broeke, Sanne W.; Kariv, Revital; Rosner, Guy; Advani, Suresh H.; Thomas, Lidiya; Shah, Pankaj; Shah, Mithun; Neffa, Florencia; Esperon, Patricia; Pavicic, Walter; Torrezan, Giovana Tardin; Bassaneze, Thiago; Martin, Claudia Alejandra; Moslein, Gabriela; Moller, Pål (Elsevier BV, 2023)Background The Prospective Lynch Syndrome Database (PLSD) collates information on carriers of pathogenic or likely pathogenic MMR variants (path_MMR) who are receiving medical follow-up, including colonoscopy surveillance, ...