dc.contributor.author | Vähäkainu, Petri | |
dc.contributor.author | Lehto, Martti | |
dc.contributor.author | Kariluoto, Antti | |
dc.contributor.editor | Lehto, Martti | |
dc.contributor.editor | Neittaanmäki, Pekka | |
dc.date.accessioned | 2023-02-02T12:35:53Z | |
dc.date.available | 2023-02-02T12:35:53Z | |
dc.date.issued | 2022 | |
dc.identifier.citation | Vähäkainu, P., Lehto, M., & Kariluoto, A. (2022). Cyberattacks Against Critical Infrastructure Facilities and Corresponding Countermeasures. In M. Lehto, & P. Neittaanmäki (Eds.), <i>Cyber Security : Critical Infrastructure Protection</i> (pp. 255-292). Springer. Computational Methods in Applied Sciences, 56. <a href="https://doi.org/10.1007/978-3-030-91293-2_11" target="_blank">https://doi.org/10.1007/978-3-030-91293-2_11</a> | |
dc.identifier.other | CONVID_117606286 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/85319 | |
dc.description.abstract | Critical infrastructure (CI) is a vital asset for the economy and society’s functioning, covering sectors such as energy, finance, healthcare, transport, and water supply. Governments around the world invest a lot of effort in continuous operation, maintenance, performance, protection, reliability, and safety of CI. However, the vulnerability of CI to cyberattacks and technical failures has become a major concern nowadays. Sophisticated and novel cyberattacks, such as adversarial attacks, may deceive physical security controls providing a perpetrator an illicit entry to the smart critical facility. Adversarial attacks can be used to deceive a classifier based on predictive machine learning (ML) that automatically adjusts the heating, ventilation, and air conditioning (HVAC) of a smart building. False data injection attacks have also been used against smart grids. Traditional and widespread cyberattacks using malicious code can cause remarkable physical damage, such as blackouts and disruptions in power production, as attack vectors to manipulate critical infrastructure. To detect incoming attacks and mitigate the performance of those attacks, we introduce defensive mechanisms to provide additional detection and defense capabilities to enhance the inadequate protection of a smart critical facility from external. | en |
dc.format.extent | 484 | |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Springer | |
dc.relation.ispartof | Cyber Security : Critical Infrastructure Protection | |
dc.relation.ispartofseries | Computational Methods in Applied Sciences | |
dc.rights | In Copyright | |
dc.subject.other | adversarial attacks | |
dc.subject.other | critical infrastructure | |
dc.subject.other | cyberattacks | |
dc.subject.other | cyber-physical system | |
dc.subject.other | defensive mechanisms | |
dc.title | Cyberattacks Against Critical Infrastructure Facilities and Corresponding Countermeasures | |
dc.type | book part | |
dc.identifier.urn | URN:NBN:fi:jyu-202302021601 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Secure Communications Engineering and Signal Processing | fi |
dc.contributor.oppiaine | Tekniikka | fi |
dc.contributor.oppiaine | Empirical Cyber Security and Software Engineering | fi |
dc.contributor.oppiaine | Tietojärjestelmätiede | fi |
dc.contributor.oppiaine | Secure Communications Engineering and Signal Processing | en |
dc.contributor.oppiaine | Engineering | en |
dc.contributor.oppiaine | Empirical Cyber Security and Software Engineering | en |
dc.contributor.oppiaine | Information Systems Science | en |
dc.type.uri | http://purl.org/eprint/type/BookItem | |
dc.relation.isbn | 978-3-030-91292-5 | |
dc.type.coar | http://purl.org/coar/resource_type/c_3248 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 255-292 | |
dc.relation.issn | 1871-3033 | |
dc.type.version | acceptedVersion | |
dc.rights.copyright | © 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | bookPart | |
dc.subject.yso | kyberturvallisuus | |
dc.subject.yso | infrastruktuurit | |
dc.subject.yso | verkkohyökkäykset | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p17539 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27466 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |
dc.relation.doi | 10.1007/978-3-030-91293-2_11 | |
dc.type.okm | A3 | |