Intelligent Solutions for Attack Mitigation in Zero-Trust Environments
Zolotukhin, M., Hämäläinen, T., & Kotilainen, P. (2022). Intelligent Solutions for Attack Mitigation in Zero-Trust Environments. In M. Lehto, & P. Neittaanmäki (Eds.), Cyber Security : Critical Infrastructure Protection (pp. 403-417). Springer. Computational Methods in Applied Sciences, 56. https://doi.org/10.1007/978-3-030-91293-2_17
Published in
Computational Methods in Applied SciencesDate
2022Copyright
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
Many of today’s smart devices are rushed to market with little consideration for basic security and privacy protection, making them easy targets for various attacks. Therefore, IoT will benefit from adapting a zero-trust networking model which requires strict identity verification for every person and device trying to access resources on a private network, regardless of whether they are located within or outside of the network perimeter. Implementing such model can, however, become challenging, as the access policies have to be updated dynamically in the context of constantly changing network environment. In this research project, we are aiming to implement a prototype of intelligent defense framework relying on advanced technologies that have recently emerged in the area of software-defined networking and network function virtualization. The intelligent core of the system proposed is planned to employ several reinforcement machine learning agents which process current network state and mitigate both external attacker intrusions and stealthy advanced persistent threats acting from inside of the network environment.
...
Publisher
SpringerParent publication ISBN
978-3-030-91292-5Is part of publication
Cyber Security : Critical Infrastructure ProtectionISSN Search the Publication Forum
1871-3033Keywords
Publication in research information system
https://converis.jyu.fi/converis/portal/detail/Publication/117608196
Metadata
Show full item recordCollections
License
Related items
Showing items with similar title or keywords.
-
Reinforcement Learning for Attack Mitigation in SDN-enabled Networks
Zolotukhin, Mikhail; Kumar, Sanjay; Hämäläinen, Timo (IEEE, 2020)With the recent progress in the development of low-budget sensors and machine-to-machine communication, the Internet-of-Things has attracted considerable attention. Unfortunately, many of today's smart devices are rushed ... -
Adversarial Attack’s Impact on Machine Learning Model in Cyber-Physical Systems
Vähäkainu, Petri; Lehto, Martti; Kariluoto, Antti (Peregrine Technical Solutions, 2020)Deficiency of correctly implemented and robust defence leaves Internet of Things devices vulnerable to cyber threats, such as adversarial attacks. A perpetrator can utilize adversarial examples when attacking Machine ... -
Security aspects of service chaining in software-defined networking environments
Räty, Atte (2018)Ohjelmistojohtoinen tietoverkkojen hallinta on uusi lähestymistapa tietoverkkojen hallintaan ja se tuo mukanaan uusia mahdollisuuksia. Eräitä näistä mahdollisuuksista ovat monipuolisemmat ja dynaamisemmat mahdollisuudet ... -
IoT -based adversarial attack's effect on cloud data platform services in a smart building context
Vähäkainu, Petri; Lehto, Martti; Kariluoto, Antti (Academic Conferences International, 2020)IoT sensors and sensor networks are widely employed in businesses. The common problem is a remarkable number of IoT device transactions are unencrypted. Lack of correctly implemented and robust defense leaves the organization's ... -
On Attacking Future 5G Networks with Adversarial Examples : Survey
Zolotukhin, Mikhail; Zhang, Di; Hämäläinen, Timo; Miraghaei, Parsa (MDPI AG, 2023)The introduction of 5G technology along with the exponential growth in connected devices is expected to cause a challenge for the efficient and reliable network resource allocation. Network providers are now required to ...