A3 Book section, Chapters in research books
Offensive Machine Learning Methods and the Cyber Kill Chain (2023)
Turtiainen, H., Costin, A., Polyakov, A., & Hämäläinen, T. (2023). Offensive Machine Learning Methods and the Cyber Kill Chain. In T. Sipola, T. Kokkonen, & M. Karjalainen (Eds.), Artificial Intelligence and Cybersecurity : Theory and Applications (pp. 125-145). Springer. https://doi.org/10.1007/978-3-031-15030-2_6
JYU authors or editors
Publication details
All authors or editors: Turtiainen, Hannu; Costin, Andrei; Polyakov, Alex; Hämäläinen, Timo
Parent publication: Artificial Intelligence and Cybersecurity : Theory and Applications
Parent publication editors: Sipola, Tuomo; Kokkonen, Tero; Karjalainen, Mika
ISBN: 978-3-031-15029-6
eISBN: 978-3-031-15030-2
Publication year: 2023
Publication date: 01/08/2022
Pages range: 125-145
Number of pages in the book: 301
Publisher: Springer
Place of Publication: Cham
Publication country: Switzerland
Publication language: English
DOI: https://doi.org/10.1007/978-3-031-15030-2_6
Publication open access: Not open
Publication channel open access:
Publication is parallel published (JYX): https://jyx.jyu.fi/handle/123456789/92743
Abstract
Cyberattacks are the “new normal” in the hyper-connected and all-digitized modern world, as breaches, denial-of-service, ransomware, and a myriad of other attacks occur every single day. As the attacks and breaches increase in complexity, diversity, and frequency, cybersecurity actors (both ethical and cybercrime) turn to automating these attacks in various ways and for a variety of reasons, including the development of effective and superior cybersecurity defenses. In this chapter, we address innovations in machine learning, deep learning, and artificial intelligence within the offensive cybersecurity fields. We structure this chapter inline with the Lockheed Martin’s Cyber Kill Chain taxonomy in order to cover adequate grounds on this broad topic, and occasionally refer to the more granular MITRE ATT&CK taxonomy whenever relevant.
Keywords: cyber security; data security; cyber attacks; machine learning; deep learning; artificial intelligence
Free keywords: machine learning methods; cyber kill chain
Contributing organizations
Ministry reporting: Yes
VIRTA submission year: 2023
JUFO rating: 2