Yleiskatsaus Botnetteihin ja C&C-liikenteeseen

Tässä kirjallisuuskatsauksessa luodaan yleiskatsaus botnetteihin ja niihin liittyviin ilmiöihin. Johdannossa perustellaan aiheen ajankohtaisuus. Luvussa 2 esitellään botnet pintapuolisena käsitteenä. Luvussa 3 esitellään tapoja luokitella botnettejä. Luvussa 4 esitetään botnettien hyödyntämiä tapoja...

Täydet tiedot

Bibliografiset tiedot
Päätekijä: Heinonen, Antti
Muut tekijät: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, University of Jyväskylä, Jyväskylän yliopisto
Aineistotyyppi: Kandityö
Kieli:fin
Julkaistu: 2016
Aiheet:
Linkit: https://jyx.jyu.fi/handle/123456789/50105
_version_ 1826225798747521025
author Heinonen, Antti
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology University of Jyväskylä Jyväskylän yliopisto
author_facet Heinonen, Antti Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology University of Jyväskylä Jyväskylän yliopisto Heinonen, Antti Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology University of Jyväskylä Jyväskylän yliopisto
author_sort Heinonen, Antti
datasource_str_mv jyx
description Tässä kirjallisuuskatsauksessa luodaan yleiskatsaus botnetteihin ja niihin liittyviin ilmiöihin. Johdannossa perustellaan aiheen ajankohtaisuus. Luvussa 2 esitellään botnet pintapuolisena käsitteenä. Luvussa 3 esitellään tapoja luokitella botnettejä. Luvussa 4 esitetään botnettien hyödyntämiä tapoja piilottaa omaa viestiliikennettään ja luvussa 5 esitellään tapoja havaita kyseistä liikennettä. Lopuksi luvussa 6 suoritetaan yhteenveto. This literature review focuses on providing an overview on botnets and phenomenoms related to botnets. The first chapter argues for the relevancy of the topic. The second chapter presents the basic structure of a botnet. The third chapter further expands on the subject and presents different ways to categorize botnets. The fourth chapter focuses on the means which botnets use to hide their communication methods, and the fifth chapter presents some ways to detect the traffic caused by this communication. The sixth chapter presents the conclusions of the literature review.
first_indexed 2016-06-04T20:00:13Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Hannakaisa Isom\u00e4ki", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Heinonen, Antti", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2016-06-04T13:05:03Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2016-06-04T13:05:03Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2016", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/50105", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4ss\u00e4 kirjallisuuskatsauksessa luodaan yleiskatsaus botnetteihin ja niihin liittyviin ilmi\u00f6ihin. Johdannossa perustellaan aiheen ajankohtaisuus. Luvussa 2 esitell\u00e4\u00e4n botnet pintapuolisena k\u00e4sitteen\u00e4. Luvussa 3 esitell\u00e4\u00e4n tapoja luokitella botnettej\u00e4. Luvussa 4 esitet\u00e4\u00e4n botnettien hy\u00f6dynt\u00e4mi\u00e4 tapoja piilottaa omaa viestiliikennett\u00e4\u00e4n ja luvussa 5 esitell\u00e4\u00e4n tapoja havaita kyseist\u00e4 liikennett\u00e4. Lopuksi luvussa 6 suoritetaan yhteenveto.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This literature review focuses on providing an overview on botnets and phenomenoms related to botnets. The first chapter argues for the relevancy of the topic. The second chapter presents the basic structure of a botnet. The third chapter further expands on the subject and presents different ways to categorize botnets. The fourth chapter focuses on the means which botnets use to hide their communication methods, and the fifth chapter presents some ways to detect the traffic caused by this communication. The sixth chapter presents the conclusions of the literature review.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Antti Heinonen (anvenehe) on 2016-06-04 13:05:03.131647. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2016-06-04T13:05:03Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201606042878.pdf: 418703 bytes, checksum: 7077aea0e118441755cbabe09f71a378 (MD5)\nlicense.html: 4790 bytes, checksum: 1e288b4c9ac0ed28c8492e01ac6c9bea (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2016-06-04T13:05:03Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201606042878.pdf: 418703 bytes, checksum: 7077aea0e118441755cbabe09f71a378 (MD5)\nlicense.html: 4790 bytes, checksum: 1e288b4c9ac0ed28c8492e01ac6c9bea (MD5)\n Previous issue date: 2016", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "38", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "Botnet", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "C&C", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "IDS", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "DGA", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "DNS", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Yleiskatsaus Botnetteihin ja C&C-liikenteeseen", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201606042878", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2016-06-04T13:05:04Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_50105
language fin
last_indexed 2025-02-18T10:55:12Z
main_date 2016-01-01T00:00:00Z
main_date_str 2016
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/413f44f9-d390-4881-af14-c4e552b2a728\/download","text":"URN:NBN:fi:jyu-201606042878.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2016
record_format qdc
source_str_mv jyx
spellingShingle Heinonen, Antti Yleiskatsaus Botnetteihin ja C&C-liikenteeseen Botnet C&C IDS DGA DNS Tietotekniikka Mathematical Information Technology
title Yleiskatsaus Botnetteihin ja C&C-liikenteeseen
title_full Yleiskatsaus Botnetteihin ja C&C-liikenteeseen
title_fullStr Yleiskatsaus Botnetteihin ja C&C-liikenteeseen Yleiskatsaus Botnetteihin ja C&C-liikenteeseen
title_full_unstemmed Yleiskatsaus Botnetteihin ja C&C-liikenteeseen Yleiskatsaus Botnetteihin ja C&C-liikenteeseen
title_short Yleiskatsaus Botnetteihin ja C&C-liikenteeseen
title_sort yleiskatsaus botnetteihin ja c c liikenteeseen
title_txtP Yleiskatsaus Botnetteihin ja C&C-liikenteeseen
topic Botnet C&C IDS DGA DNS Tietotekniikka Mathematical Information Technology
topic_facet Botnet C&C DGA DNS IDS Mathematical Information Technology Tietotekniikka
url https://jyx.jyu.fi/handle/123456789/50105 http://www.urn.fi/URN:NBN:fi:jyu-201606042878
work_keys_str_mv AT heinonenantti yleiskatsausbotnetteihinjaccliikenteeseen