Defensive Machine Learning Methods and the Cyber Defence Chain
Turtiainen, H., Costin, A., & Hämäläinen, T. (2023). Defensive Machine Learning Methods and the Cyber Defence Chain. In T. Sipola, T. Kokkonen, & M. Karjalainen (Eds.), Artificial Intelligence and Cybersecurity : Theory and Applications (pp. 147-163). Springer. https://doi.org/10.1007/978-3-031-15030-2_7
Date
2023Copyright
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland
AG 2023
Cyberattacks are now occurring on a daily basis. As attacks and breaches are so frequent, and the fact that human work hours do not scale infinitely, the cybersecurity industry needs innovative and scalable tools and techniques to automate certain cybersecurity defensive tasks in order to keep up. The variety, the complex nature of the attacks, and the effectiveness of 0-day attacks mean that conventional tools are not adequate for securing complex networks with large numbers of users and endpoints with differing identities, behavior, and needs. Machine learning and artificial intelligence aid the creators of security tools in their tasks by introducing adaptive environment possibilities, customizability, and the ability to learn from past attacks and predict future attack attempts. In this chapter, we address innovations in machine learning, deep learning, and artificial intelligence within the defensive cybersecurity fields. We structure this chapter inline with the OWASP Cyber Defense Matrix in order to cover adequate grounds on this broad topic, and refer occasionally to the more granular MITRE D3FEND taxonomy whenever relevant.
...
Publisher
SpringerParent publication ISBN
978-3-031-15029-6Is part of publication
Artificial Intelligence and Cybersecurity : Theory and ApplicationsKeywords
Publication in research information system
https://converis.jyu.fi/converis/portal/detail/Publication/164483875
Metadata
Show full item recordCollections
License
Related items
Showing items with similar title or keywords.
-
Offensive Machine Learning Methods and the Cyber Kill Chain
Turtiainen, Hannu; Costin, Andrei; Polyakov, Alex; Hämäläinen, Timo (Springer, 2023)Cyberattacks are the “new normal” in the hyper-connected and all-digitized modern world, as breaches, denial-of-service, ransomware, and a myriad of other attacks occur every single day. As the attacks and breaches increase ... -
Adversarial Attack’s Impact on Machine Learning Model in Cyber-Physical Systems
Vähäkainu, Petri; Lehto, Martti; Kariluoto, Antti (Peregrine Technical Solutions, 2020)Deficiency of correctly implemented and robust defence leaves Internet of Things devices vulnerable to cyber threats, such as adversarial attacks. A perpetrator can utilize adversarial examples when attacking Machine ... -
On Attacking Future 5G Networks with Adversarial Examples : Survey
Zolotukhin, Mikhail; Zhang, Di; Hämäläinen, Timo; Miraghaei, Parsa (MDPI AG, 2023)The introduction of 5G technology along with the exponential growth in connected devices is expected to cause a challenge for the efficient and reliable network resource allocation. Network providers are now required to ... -
Countering Adversarial Inference Evasion Attacks Towards ML-Based Smart Lock in Cyber-Physical System Context
Vähäkainu, Petri; Lehto, Martti; Kariluoto, Antti (Springer, 2021)Machine Learning (ML) has been taking significant evolutionary steps and provided sophisticated means in developing novel and smart, up-to-date applications. However, the development has also brought new types of hazards ... -
Data Mining for the Security of Cyber Physical Systems Using Deep-Learning Methods
Nath, Bhagawan; Hämäläinen, Timo; Ezekiel, Soundararajan (Academic Conferences International Ltd, 2022)Cyber Physical Systems (CPSs) have become widely popular in recent years, and their applicability have been growing exponentially. A CPS is an advanced system that incorporates a computation unit along with a hardware unit, ...