A3 Book section, Chapters in research books
Offensive Machine Learning Methods and the Cyber Kill Chain (2023)


Turtiainen, H., Costin, A., Polyakov, A., & Hämäläinen, T. (2023). Offensive Machine Learning Methods and the Cyber Kill Chain. In T. Sipola, T. Kokkonen, & M. Karjalainen (Eds.), Artificial Intelligence and Cybersecurity : Theory and Applications (pp. 125-145). Springer. https://doi.org/10.1007/978-3-031-15030-2_6


JYU authors or editors


Publication details

All authors or editorsTurtiainen, Hannu; Costin, Andrei; Polyakov, Alex; Hämäläinen, Timo

Parent publicationArtificial Intelligence and Cybersecurity : Theory and Applications

Parent publication editorsSipola, Tuomo; Kokkonen, Tero; Karjalainen, Mika

ISBN978-3-031-15029-6

eISBN978-3-031-15030-2

Publication year2023

Publication date01/08/2022

Pages range125-145

Number of pages in the book301

PublisherSpringer

Place of PublicationCham

Publication countrySwitzerland

Publication languageEnglish

DOIhttps://doi.org/10.1007/978-3-031-15030-2_6

Publication open accessNot open

Publication channel open access

Publication is parallel published (JYX)https://jyx.jyu.fi/handle/123456789/92743


Abstract

Cyberattacks are the “new normal” in the hyper-connected and all-digitized modern world, as breaches, denial-of-service, ransomware, and a myriad of other attacks occur every single day. As the attacks and breaches increase in complexity, diversity, and frequency, cybersecurity actors (both ethical and cybercrime) turn to automating these attacks in various ways and for a variety of reasons, including the development of effective and superior cybersecurity defenses. In this chapter, we address innovations in machine learning, deep learning, and artificial intelligence within the offensive cybersecurity fields. We structure this chapter inline with the Lockheed Martin’s Cyber Kill Chain taxonomy in order to cover adequate grounds on this broad topic, and occasionally refer to the more granular MITRE ATT&CK taxonomy whenever relevant.


Keywordscyber securitydata securitycyber attacksmachine learningdeep learningartificial intelligence

Free keywordsmachine learning methods; cyber kill chain


Contributing organizations


Ministry reportingYes

VIRTA submission year2023

JUFO rating2


Last updated on 2025-06-03 at 00:26