Command and Control: Monitoring, defending and exploiting critical infrastructure
Julkaistu sarjassa
JYU DissertationsTekijät
Päivämäärä
2021Tekijänoikeudet
© The Author & University of Jyväskylä
For securing critical infrastructure, this thesis aims to develop a common operating picture system, establish methods for detecting targeted cyberattacks, and investigate exploits against machine learning -based decision making. A design-science research framework is used, in which the validity is assessed through practical applicability of the solution artifact, and through an iterative requirements–evaluation cycle in close cooperation with key stakeholders.
The included studies address three topics: i) common operating picture systems, with emphasis on modeling and analysis methods, ii) neural network -based detection of encrypted malware command and control channels, and iii) one-pixel attacks targeting a neural network -based computer-aided cancer diagnosis. The studies made extensive use of raw data obtained through stakeholder collaboration. In addition, malware network traffic data generated through cybertraining activities on cyber-range environments, and tools used in targeted APT-malware attacks were utilized. A tissue sample -based tool, utilizing neural network technology, for computeraided diagnosis of breast cancer, and associated digitized light microscope samples were used in vulnerability research.
The main results include ascertaining the applicability of the design-science research framework to the individual problem fields, and noting the necessity of raw data and stakeholder cooperation. Considering the results by topic, the required modeling and analysis methods could be implemented as a part of a common operating picture system, suitable neural network architectures with validation methods were created in malware traffic detection studies, and a method for producing hostile samples could be found in the study concerning one-pixel attacks.
The practical results of the common operating picture -study include an VN TEAS report, produced to support state-level decision making, in which the results of the studies were utilized extensively. With regard to cyberattack detection methods, their suitability for SUNBURSTbackdoor detection was established. With regard to the one-pixel attack, the feasibility of the attack was demonstrated and the first publication considering the attack in a computer-aided diagnostic setting was produced.
...
Julkaisija
Jyväskylän yliopistoISBN
978-951-39-8755-8ISSN Hae Julkaisufoorumista
2489-9003Julkaisuun sisältyy osajulkaisuja
- Artikkeli I: Puuska S. et al. (2015). Modelling and real-time analysis of critical infrastructure using discrete eventsystems on graph. In 2015 IEEE International Symposium on Technologies for Homeland Security (HST), 2015, pp. 1–5. DOI: 10.1109/THS.2015.7225330
- Artikkeli II: Puuska S. et al. (2017) Integrated platform for critical infrastructure analysis and common operating picture solutions. In 2017 IEEE Internationa lSymposium on Technologies for Homeland Security (HST), 2017, 1–6. DOI: 10.1109/THS.2017.8093737
- Artikkeli III: Puuska S. et al. (2018). Nationwide critical infrastructure monitoring using a common operating picture framework. International Journal of Critical Infrastructure Protection, vol. 20, 28–47. DOI: 10.1016/j.ijcip.2017.11.005
- Artikkeli IV: Kokkonen T. and Puuska S. (2018). Blue Team Communication and Reporting for Enhancing Situational Awareness from White Team Perspective in Cyber Security Exercises. In Internet of Things, Smart Spaces, and Next Generation Networks and Systems, O. Galinina et al., Eds.. Cham: Springer International Publishing, 277–288. DOI: 10.1007/978-3-030-01168-0_26
- Artikkeli V: Puuska S. et al. (2019). Anomaly-Based Network Intrusion Detection Using Wavelets and Adversarial Autoencoders. In Innovative Security Solutions for Information Technology and Communications, J.-L. Lanet and C. Toma, Eds., Cham: Springer International Publishing, 234–246. DOI: 10.1007/978-3-030-12942-2_18
- Artikkeli VI: Kokkonen T. et al. (2019). Network Anomaly Detection Based on WaveNet. In Internet of Things, Smart Spaces, and Next Generation Networks and Systems, O. Galinina et al., Eds., Cham:Springer International Publishing, 424–433. DOI: 10.1007/978-3-030-30859-9_36
- Artikkeli VII: Puuska S. et al. (2020). Statistical Evaluation of Artificial Intelligence -Based Intrusion Detection System. In Trends and Innovations in Information Systems and Technologies, Á. Rocha et al., Eds. Cham: Springer International Publishing, 464–470. DOI: 10.1007/978-3-030-45691-7_43
- Artikkeli VIII: Sipola T. et al. (2020). Model Fooling Attacks Against Medical Imaging: A Short Survey. Information & Security: An International Journal, vol. 46, no. 2, 215–224. DOI: 10.11610/isij.4615
- Artikkeli IX: Korpihalkola J. et al. (2020). One-pixel Attack Deceives Automatic Detection of Breast Cancer. Computers & Security, under review.
Asiasanat
critical infrastructure protection mathematical modeling advanced persistent threat intrusion detection one-pixel attack computer-aided diagnosis kriittinen infrastruktuuri matemaattinen mallinnus APT-uhka kyberhyökkäysten havaitseminen yhden pikselin hyökkäys tietokoneavusteinen diagnoosi neural networks (information technology) data security cyber attacks cyber security cancerous diseases neuroverkot tietoturva verkkohyökkäykset kyberturvallisuus syöpätaudit
Metadata
Näytä kaikki kuvailutiedotKokoelmat
- JYU Dissertations [867]
- Väitöskirjat [3598]
Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
One-Pixel Attack Deceives Computer-Assisted Diagnosis of Cancer
Korpihalkola, Joni; Sipola, Tuomo; Puuska, Samir; Kokkonen, Tero (ACM, 2021)Computer vision and machine learning can be used to automate various tasks in cancer diagnostic and detection. If an attacker can manipulate the automated processing, the results can be devastating and in the worst case ... -
Cyber-Attacks Against Critical Infrastructure
Lehto, Martti (Springer, 2022)In the cyber world, the most important threat focuses on critical infrastructure (CI). CI encompasses the structures and functions that are vital to society’s uninterrupted functioning. It comprises physical facilities and ... -
The potential of convolutional neural network in the evaluation of tumor-stroma ratio from colorectal cancer histopathological images
Petäinen, Liisa (2022)Tässä Pro gradu-työssä tutkitaan konvoluutioneuroverkkojen käyttömahdollisuuksia histopatologisista kuvista tehtävässä kasvain-strooma suhdeluvun arvioinnissa. Tarkoituksena on selvittää, mikä on siirto-opettamisen vaikutus, ... -
Unsupervised network intrusion detection systems for zero-day fast-spreading network attacks and botnets
Vahdani Amoli, Payam (University of Jyväskylä, 2015)Today, the occurrence of zero-day and complex attacks in high-speed networks is increasingly common due to the high number vulnerabilities in the cyber world. As a result, intrusions become more sophisticated and fast ... -
Lack of association between screening interval and cancer stage in Lynch syndrome may be accounted for by over-diagnosis; a prospective Lynch syndrome database report
Seppälä, Toni T.; Ahadova, Aysel; Dominguez-Valentin, Mev; Macrae, Finlay; Evans, D. Gareth; Therkildsen, Christina; Sampson, Julian; Scott, Rodney; Burn, John; Möslein, Gabriela; Bernstein, Inge; Holinski-Feder, Elke; Pylvänäinen, Kirsi; Renkonen-Sinisalo, Laura; Lepistö, Anna; Lautrup, Charlotte Kvist; Lindblom, Annika; Plazzer, John-Paul; Winship, Ingrid; Tjandra, Douglas; Katz, Lior H.; Aretz, Stefan; Hüneburg, Robert; Holzapfel, Stefanie; Heinimann, Karl; Valle, Adriana Della; Neffa, Florencia; Gluck, Nathan; Cappel, Wouter H. de Vos tot Nederveen; Vasen, Hans; Morak, Monika; Steinke-Lange, Verena; Engel, Christoph; Rahner, Nils; Schmiegel, Wolff; Vangala, Deepak; Thomas, Huw; Green, Kate; Lalloo, Fiona; Crosbie, Emma J.; Hill, James; Capella, Gabriel; Pineda, Marta; Navarro, Matilde; Blanco, Ignacio; Broeke, Sanne ten; Nielsen, Maartje; Ljungmann, Ken; Nakken, Sigve; Lindor, Noralane; Frayling, Ian; Hovig, Eivind; Sunde, Lone; Kloor, Matthias; Mecklin, Jukka-Pekka; Kalager, Mette; Møller, Pål (BioMed Central Ltd., 2019)Background Recent epidemiological evidence shows that colorectal cancer (CRC) continues to occur in carriers of pathogenic mismatch repair (path_MMR) variants despite frequent colonoscopy surveillance in expert centres. ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.