Näytä suppeat kuvailutiedot

dc.contributor.authorSimola, Jussi
dc.contributor.authorTakala, Arttu
dc.contributor.authorLehkonen, Riku
dc.contributor.authorFrantti, Tapio
dc.contributor.authorSavola, Reijo
dc.contributor.editorLehto, Martti
dc.contributor.editorKarjalainen, Mika
dc.date.accessioned2024-06-27T12:12:13Z
dc.date.available2024-06-27T12:12:13Z
dc.date.issued2024
dc.identifier.citationSimola, J., Takala, A., Lehkonen, R., Frantti, T., & Savola, R. (2024). Improving Detection Capabilities in OT Environments Through Multisource Data Sensors. In M. Lehto, & M. Karjalainen (Eds.), <i>Proceedings of the 23rd European Conference on Cyber Warfare and Security</i> (23, pp. 496-505). Academic Conferences International Ltd. Proceedings of the European Conference on Cyber Warfare and Security. <a href="https://doi.org/10.34190/eccws.23.1.2339" target="_blank">https://doi.org/10.34190/eccws.23.1.2339</a>
dc.identifier.otherCONVID_220871965
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/96196
dc.description.abstractThis research focuses on implementing cyber threat detection in OT environments by combining data from IT and OT sensors and logs to enhance SOC's situational awareness. OT environment is challenging to monitor and includes various sensors. We deal with the key concepts and differences of the industrial operating environment, which create challenges compared to the traditional IT environment. This is important because the policies defined at the European level for the NIS2 regulation will affect all member countries. Hostile actors cause security challenges highlighting the importance of critical infrastructure protection. Cyber security solutions have often solely focused on IT threats, but similar investments have yet to be made in response to the challenges of the OT environment. The security solutions of OT operators rely heavily on solutions from the IT side. Here, we delve into whether it is possible to find threats in the IT/OT ecosystem by combining data from the IT and OT sides. All threats are not found by monitoring data separately from IT or OT sources but we identified hidden threats by monitoring and comparing IT and OT data. This paper shows the importance of detecting OT threats. The study proposes how the detection of cyber threat capabilities should be developed.en
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherAcademic Conferences International Ltd
dc.relation.ispartofProceedings of the 23rd European Conference on Cyber Warfare and Security
dc.relation.ispartofseriesProceedings of the European Conference on Cyber Warfare and Security
dc.rightsCC BY-NC-ND 4.0
dc.subject.otheroperational technology
dc.subject.othertestbed
dc.subject.othersecurity operations center
dc.subject.otherthreat detection
dc.subject.othersituational awareness
dc.titleImproving Detection Capabilities in OT Environments Through Multisource Data Sensors
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-202406275038
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.format.pagerange496-505
dc.relation.issn2048-8602
dc.relation.numberinseries1
dc.relation.volume23
dc.type.versionpublishedVersion
dc.rights.copyright© 2024 European Conference on Cyber Warfare and Security
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceEuropean Conference on Cyber Warfare and Security
dc.relation.grantnumber10/31/2022
dc.subject.ysokyberturvallisuus
dc.subject.ysoturvallisuus
dc.subject.ysouhkakuvat
dc.subject.ysotilannekuva
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
jyx.subject.urihttp://www.yso.fi/onto/yso/p7349
jyx.subject.urihttp://www.yso.fi/onto/yso/p10844
jyx.subject.urihttp://www.yso.fi/onto/yso/p25187
dc.rights.urlhttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.relation.doi10.34190/eccws.23.1.2339
dc.relation.funderBusiness Finlanden
dc.relation.funderBusiness Finlandfi
jyx.fundingprogramCo-Innovation, BFen
jyx.fundingprogramCo-Innovation, BFfi
jyx.fundinginformationThe research was supported by Business Finland (grant number 10/31/2022) and the University of Jyväskylä.
dc.type.okmA4


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

CC BY-NC-ND 4.0
Ellei muuten mainita, aineiston lisenssi on CC BY-NC-ND 4.0