Näytä suppeat kuvailutiedot

dc.contributor.authorTurtiainen, Hannu
dc.contributor.authorCostin, Andrei
dc.contributor.authorPolyakov, Alex
dc.contributor.authorHämäläinen, Timo
dc.contributor.editorSipola, Tuomo
dc.contributor.editorKokkonen, Tero
dc.contributor.editorKarjalainen, Mika
dc.date.accessioned2024-01-12T08:02:31Z
dc.date.available2024-01-12T08:02:31Z
dc.date.issued2023
dc.identifier.citationTurtiainen, H., Costin, A., Polyakov, A., & Hämäläinen, T. (2023). Offensive Machine Learning Methods and the Cyber Kill Chain. In T. Sipola, T. Kokkonen, & M. Karjalainen (Eds.), <i>Artificial Intelligence and Cybersecurity : Theory and Applications</i> (pp. 125-145). Springer. <a href="https://doi.org/10.1007/978-3-031-15030-2_6" target="_blank">https://doi.org/10.1007/978-3-031-15030-2_6</a>
dc.identifier.otherCONVID_164482646
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/92743
dc.description.abstractCyberattacks are the “new normal” in the hyper-connected and all-digitized modern world, as breaches, denial-of-service, ransomware, and a myriad of other attacks occur every single day. As the attacks and breaches increase in complexity, diversity, and frequency, cybersecurity actors (both ethical and cybercrime) turn to automating these attacks in various ways and for a variety of reasons, including the development of effective and superior cybersecurity defenses. In this chapter, we address innovations in machine learning, deep learning, and artificial intelligence within the offensive cybersecurity fields. We structure this chapter inline with the Lockheed Martin’s Cyber Kill Chain taxonomy in order to cover adequate grounds on this broad topic, and occasionally refer to the more granular MITRE ATT&CK taxonomy whenever relevant.en
dc.format.extent301
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherSpringer
dc.relation.ispartofArtificial Intelligence and Cybersecurity : Theory and Applications
dc.rightsIn Copyright
dc.subject.othermachine learning methods
dc.subject.othercyber kill chain
dc.titleOffensive Machine Learning Methods and the Cyber Kill Chain
dc.typebook part
dc.identifier.urnURN:NBN:fi:jyu-202401121244
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTekniikkafi
dc.contributor.oppiaineTietotekniikkafi
dc.contributor.oppiaineSecure Communications Engineering and Signal Processingfi
dc.contributor.oppiaineEngineeringen
dc.contributor.oppiaineMathematical Information Technologyen
dc.contributor.oppiaineSecure Communications Engineering and Signal Processingen
dc.type.urihttp://purl.org/eprint/type/BookItem
dc.relation.isbn978-3-031-15029-6
dc.type.coarhttp://purl.org/coar/resource_type/c_3248
dc.description.reviewstatuspeerReviewed
dc.format.pagerange125-145
dc.type.versionacceptedVersion
dc.rights.copyright© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
dc.rights.accesslevelopenAccessfi
dc.type.publicationbookPart
dc.subject.ysosyväoppiminen
dc.subject.ysokyberturvallisuus
dc.subject.ysotekoäly
dc.subject.ysoverkkohyökkäykset
dc.subject.ysokoneoppiminen
dc.subject.ysotietoturva
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p39324
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
jyx.subject.urihttp://www.yso.fi/onto/yso/p2616
jyx.subject.urihttp://www.yso.fi/onto/yso/p27466
jyx.subject.urihttp://www.yso.fi/onto/yso/p21846
jyx.subject.urihttp://www.yso.fi/onto/yso/p5479
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.relation.doi10.1007/978-3-031-15030-2_6
dc.type.okmA3


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

In Copyright
Ellei muuten mainita, aineiston lisenssi on In Copyright