fullrecord |
[{"key": "dc.contributor.advisor", "value": "Heimb\u00fcrger, Anneli", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Moisio, Juha", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2015-06-04T04:51:32Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2015-06-04T04:51:32Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2015", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/46191", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Palvelunestohy\u00f6kk\u00e4ykset ovat ajankohtaisena ongelmana t\u00e4rke\u00e4 tutkimuksen kohde. Palvelunestohy\u00f6kk\u00e4ysten torjumiseen tarvitaan menetelmi\u00e4, joilla palvelua kuormittava hy\u00f6kk\u00e4ysliikenne voidaan erottaa tavallisesta verkkoliikenteest\u00e4. T\u00e4m\u00e4n tutkimuksen tavoitteena on perehty\u00e4 palvelunestohy\u00f6kk\u00e4ysten toimintaan ja selvitt\u00e4\u00e4, mit\u00e4 tilastollisia torjumismenetelmi\u00e4 hy\u00f6kk\u00e4ysten torjumiseen k\u00e4ytet\u00e4\u00e4n. Tutkimuksessa selvitettiin palvelunestohy\u00f6kk\u00e4ysten yleiset p\u00e4\u00e4piirteet ja luokiteltiin hy\u00f6kk\u00e4ykset kahteen p\u00e4\u00e4luokkaan. Lis\u00e4ksi tutkimuksessa tunnistettiin nelj\u00e4 eri tilastollista torjumismenetelm\u00e4\u00e4. Palvelunestohy\u00f6kk\u00e4ysten torjuminen on haasteellista, eik\u00e4 yleisk\u00e4ytt\u00f6ist\u00e4 torjumismenetelm\u00e4\u00e4 ole kehitetty. Siksi uusien menetelmien jatkotutkimukselle on tarvetta.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Denial-of-service attacks are important area of research. Methods that can separate normal network traffic from the overloading traffic coming from the attack source are needed. The object of this research is to study about denial-of-service attacks and to survey what statistical methods are used for the detection and prevention of such attacks. This study summarises general main aspects of denial-of-service attacks and categorises attacks to two main groups. Furthermore, in this study, four statistical methods were found. The prevention of denial-of-service attacks is a challenging problem. An universal prevention method is not known. Therefore, there is ongoing need for research for new prevention methods.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Juha Moisio (jupearmo) on 2015-06-04 04:51:32.048593. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2015-06-04T04:51:32Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201506042181.pdf: 246858 bytes, checksum: 56824d53c3203e9ee20aa308f1a30f5e (MD5)\nlicense.html: 4820 bytes, checksum: 461d39881bd5984d255d161979b8e463 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2015-06-04T04:51:32Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201506042181.pdf: 246858 bytes, checksum: 56824d53c3203e9ee20aa308f1a30f5e (MD5)\nlicense.html: 4820 bytes, checksum: 461d39881bd5984d255d161979b8e463 (MD5)\n Previous issue date: 2015", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "22", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "palvelunestohy\u00f6kk\u00e4ys", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tilastollinen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "denial-of-service attack", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "statistical", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Palvelunestohy\u00f6kk\u00e4ysten havainnointi ja torjuminen tilastollisilla menetelmill\u00e4", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201506042181", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.dcmitype", "value": "Text", "language": "en", "element": "type", "qualifier": "dcmitype", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2015-06-04T04:51:33Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|