fullrecord |
[{"key": "dc.contributor.advisor", "value": "H\u00e4m\u00e4l\u00e4inen, Timo", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Rautiainen, Ilkka", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2016-11-28T14:38:01Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2016-11-28T14:38:01Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2016", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.other", "value": "oai:jykdok.linneanet.fi:1643946", "language": null, "element": "identifier", "qualifier": "other", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/52048", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tietokoneverkoissa toimivat hy\u00f6kk\u00e4\u00e4j\u00e4t yritt\u00e4v\u00e4t jatkuvasti ohittaa k\u00e4yt\u00f6ss\u00e4 olevia turvaj\u00e4rjestelmi\u00e4, ja pyrkiv\u00e4t kehitt\u00e4m\u00e4\u00e4n uusia tapoja kohteidensa vahingoittamiseen. N\u00e4it\u00e4 hy\u00f6kk\u00e4yksi\u00e4 voidaan havaita tunkeilijan havaitsemisj\u00e4rjestelm\u00e4ll\u00e4 (engl. intrusion detection system eli IDS). Yleisesti k\u00e4ytettyjen v\u00e4\u00e4rink\u00e4yt\u00f6spohjaisten menetelmien lis\u00e4ksi hy\u00f6kk\u00e4yksi\u00e4 voidaan havaita anomaliapohjaisilla eli tiedonlouhinnan ja koneoppimisen menetelmill\u00e4. N\u00e4m\u00e4 menetelm\u00e4t kykenev\u00e4t teoriassa havaitsemaan my\u00f6s aiemmin tuntemattomat hy\u00f6kk\u00e4ykset. Tiedonlouhinnan ja koneoppisen menetelmien hy\u00f6dynt\u00e4minen IDS-j\u00e4rjestelmiss\u00e4 on laajalti tutkittu alue, mutta useat ongelmat ovat viel\u00e4 vailla ratkaisua. T\u00e4ss\u00e4 tutkielmassa esitell\u00e4\u00e4n alan taustoja, menetelmi\u00e4 ja ongelmia. Lopuksi tarkastellaan ja vertaillaan k-means-klusterointia, tukivektorikonetta ja keinotekoisia neuroverkkoja k\u00e4yt\u00e4nn\u00f6ss\u00e4. K\u00e4yt\u00e4nn\u00f6n osiossa hy\u00f6dynnet\u00e4\u00e4n vuonna 2015 julkaistua synteettist\u00e4 UNSW-NB15-verkkodataa. Tutkielman tulokset vahvistavat k\u00e4sityst\u00e4, jonka mukaan yksitt\u00e4inen menetelm\u00e4 ei voi tehokkaasti l\u00f6yt\u00e4\u00e4 kaikkien ryhmien verkkohy\u00f6kk\u00e4yksi\u00e4. Parhaimmat tulokset saavutetaankin erilaisten menetelmien tehokkaalla yhdist\u00e4misell\u00e4.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Attackers in computer networks are constantly trying to bypass existing network security systems and developing new ways to harm their targets. An intrusion detection system (IDS) can be used to detect these attacks. In addition to commonly used signature-based detection it is also possible to implement anomaly-based methods of data mining and machine learning to detect the attacks. In theory, these methods should be able to detect also previously unknown attacks. The field of anomaly-based detection has been widely studied, but some problems remain unsolved. This thesis discusses the background, methods and problems present in the field of study. It also examines and compares $k$-means clustering, support vector machine and artificial neural networks empirically. The methods are implemented with an aim to find the malicious traffic from a public UNSW-NB15 dataset released in 2015. The thesis confirms that a single anomaly-based method is not able to detect all types of network attacks reliably. An ideal solution for intrusion detection would be to efficiently combine several different detection methods.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Ilkka Rautiainen (iltaraut) on 2016-11-28 14:38:00.640359. Form: Pro gradu -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/pro-gradu-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2016-11-28T14:38:01Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201611284806.pdf: 2015917 bytes, checksum: de787aed22e83b254970a7c411a9b200 (MD5)\nlicense.html: 4843 bytes, checksum: 238589f905a0a466a318e81c58d77348 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2016-11-28T14:38:01Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201611284806.pdf: 2015917 bytes, checksum: de787aed22e83b254970a7c411a9b200 (MD5)\nlicense.html: 4843 bytes, checksum: 238589f905a0a466a318e81c58d77348 (MD5)\n Previous issue date: 2016", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "1 verkkoaineisto (134 sivua)", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "IDS-j\u00e4rjestelm\u00e4t", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tukivektorikone", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Tiedonlouhinnan ja koneoppimisen menetelm\u00e4t verkkohy\u00f6kk\u00e4ysten havaitsemisessa", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201611284806", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Tietotekniikan laitos", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Department of Mathematical Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2016-11-28T14:38:01Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": null, "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": null, "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tiedonlouhinta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "koneoppiminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "klusterit", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "neuroverkot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|