dc.contributor.author | Turtiainen, Hannu | |
dc.contributor.author | Costin, Andrei | |
dc.contributor.author | Polyakov, Alex | |
dc.contributor.author | Hämäläinen, Timo | |
dc.contributor.editor | Sipola, Tuomo | |
dc.contributor.editor | Kokkonen, Tero | |
dc.contributor.editor | Karjalainen, Mika | |
dc.date.accessioned | 2024-01-12T08:02:31Z | |
dc.date.available | 2024-01-12T08:02:31Z | |
dc.date.issued | 2023 | |
dc.identifier.citation | Turtiainen, H., Costin, A., Polyakov, A., & Hämäläinen, T. (2023). Offensive Machine Learning Methods and the Cyber Kill Chain. In T. Sipola, T. Kokkonen, & M. Karjalainen (Eds.), <i>Artificial Intelligence and Cybersecurity : Theory and Applications</i> (pp. 125-145). Springer. <a href="https://doi.org/10.1007/978-3-031-15030-2_6" target="_blank">https://doi.org/10.1007/978-3-031-15030-2_6</a> | |
dc.identifier.other | CONVID_164482646 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/92743 | |
dc.description.abstract | Cyberattacks are the “new normal” in the hyper-connected and all-digitized modern world, as breaches, denial-of-service, ransomware, and a myriad of other attacks occur every single day. As the attacks and breaches increase in complexity, diversity, and frequency, cybersecurity actors (both ethical and cybercrime) turn to automating these attacks in various ways and for a variety of reasons, including the development of effective and superior cybersecurity defenses. In this chapter, we address innovations in machine learning, deep learning, and artificial intelligence within the offensive cybersecurity fields. We structure this chapter inline with the Lockheed Martin’s Cyber Kill Chain taxonomy in order to cover adequate grounds on this broad topic, and occasionally refer to the more granular MITRE ATT&CK taxonomy whenever relevant. | en |
dc.format.extent | 301 | |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Springer | |
dc.relation.ispartof | Artificial Intelligence and Cybersecurity : Theory and Applications | |
dc.rights | In Copyright | |
dc.subject.other | machine learning methods | |
dc.subject.other | cyber kill chain | |
dc.title | Offensive Machine Learning Methods and the Cyber Kill Chain | |
dc.type | book part | |
dc.identifier.urn | URN:NBN:fi:jyu-202401121244 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tekniikka | fi |
dc.contributor.oppiaine | Tietotekniikka | fi |
dc.contributor.oppiaine | Secure Communications Engineering and Signal Processing | fi |
dc.contributor.oppiaine | Engineering | en |
dc.contributor.oppiaine | Mathematical Information Technology | en |
dc.contributor.oppiaine | Secure Communications Engineering and Signal Processing | en |
dc.type.uri | http://purl.org/eprint/type/BookItem | |
dc.relation.isbn | 978-3-031-15029-6 | |
dc.type.coar | http://purl.org/coar/resource_type/c_3248 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 125-145 | |
dc.type.version | acceptedVersion | |
dc.rights.copyright | © 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | bookPart | |
dc.subject.yso | syväoppiminen | |
dc.subject.yso | kyberturvallisuus | |
dc.subject.yso | tekoäly | |
dc.subject.yso | verkkohyökkäykset | |
dc.subject.yso | koneoppiminen | |
dc.subject.yso | tietoturva | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p39324 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p2616 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27466 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p21846 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5479 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |
dc.relation.doi | 10.1007/978-3-031-15030-2_6 | |
dc.type.okm | A3 | |