Näytä suppeat kuvailutiedot

dc.contributor.authorZolotukhin, Mikhail
dc.contributor.authorHämäläinen, Timo
dc.contributor.authorKotilainen, Pyry
dc.contributor.editorLehto, Martti
dc.contributor.editorNeittaanmäki, Pekka
dc.date.accessioned2023-01-25T11:54:42Z
dc.date.available2023-01-25T11:54:42Z
dc.date.issued2022
dc.identifier.citationZolotukhin, M., Hämäläinen, T., & Kotilainen, P. (2022). Intelligent Solutions for Attack Mitigation in Zero-Trust Environments. In M. Lehto, & P. Neittaanmäki (Eds.), <i>Cyber Security : Critical Infrastructure Protection</i> (pp. 403-417). Springer. Computational Methods in Applied Sciences, 56. <a href="https://doi.org/10.1007/978-3-030-91293-2_17" target="_blank">https://doi.org/10.1007/978-3-030-91293-2_17</a>
dc.identifier.otherCONVID_117608196
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/85185
dc.description.abstractMany of today’s smart devices are rushed to market with little consideration for basic security and privacy protection, making them easy targets for various attacks. Therefore, IoT will benefit from adapting a zero-trust networking model which requires strict identity verification for every person and device trying to access resources on a private network, regardless of whether they are located within or outside of the network perimeter. Implementing such model can, however, become challenging, as the access policies have to be updated dynamically in the context of constantly changing network environment. In this research project, we are aiming to implement a prototype of intelligent defense framework relying on advanced technologies that have recently emerged in the area of software-defined networking and network function virtualization. The intelligent core of the system proposed is planned to employ several reinforcement machine learning agents which process current network state and mitigate both external attacker intrusions and stealthy advanced persistent threats acting from inside of the network environment.en
dc.format.extent484
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherSpringer
dc.relation.ispartofCyber Security : Critical Infrastructure Protection
dc.relation.ispartofseriesComputational Methods in Applied Sciences
dc.rightsIn Copyright
dc.subject.othernetwork security
dc.subject.otherdeep learning
dc.subject.otherreinforcement learning
dc.subject.othersoftware-defined networking
dc.titleIntelligent Solutions for Attack Mitigation in Zero-Trust Environments
dc.typebookPart
dc.identifier.urnURN:NBN:fi:jyu-202301251477
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTekniikkafi
dc.contributor.oppiaineEngineeringen
dc.type.urihttp://purl.org/eprint/type/BookItem
dc.relation.isbn978-3-030-91292-5
dc.type.coarhttp://purl.org/coar/resource_type/c_3248
dc.description.reviewstatuspeerReviewed
dc.format.pagerange403-417
dc.relation.issn1871-3033
dc.type.versionacceptedVersion
dc.rights.copyright© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
dc.rights.accesslevelopenAccessfi
dc.subject.ysosyväoppiminen
dc.subject.ysotietoturva
dc.subject.ysoesineiden internet
dc.subject.ysokoneoppiminen
dc.subject.ysotietoverkot
dc.subject.ysoverkkohyökkäykset
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p39324
jyx.subject.urihttp://www.yso.fi/onto/yso/p5479
jyx.subject.urihttp://www.yso.fi/onto/yso/p27206
jyx.subject.urihttp://www.yso.fi/onto/yso/p21846
jyx.subject.urihttp://www.yso.fi/onto/yso/p12936
jyx.subject.urihttp://www.yso.fi/onto/yso/p27466
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.relation.doi10.1007/978-3-030-91293-2_17
dc.type.okmA3


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

In Copyright
Ellei muuten mainita, aineiston lisenssi on In Copyright