Tiedonlouhinta kyberterrorismin torjuntakeinona

Terrorismi on teknologian kehittyessä siirtynyt kyberavaruuteen ja muuntau-tunut kyberterrorismiksi. Terrorismin uhka ei enää ole vain fyysinen, sillä ky-beravaruus mahdollistaa tietoverkkojen monipuolisen käytön terroristisiin tarpeisiin. Kyberterrorismin uhka on synnyttänyt tarpeen luoda uudenlais...

Täydet tiedot

Bibliografiset tiedot
Päätekijä: Suhonen, Tatu
Muut tekijät: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, University of Jyväskylä, Jyväskylän yliopisto
Aineistotyyppi: Kandityö
Kieli:fin
Julkaistu: 2017
Aiheet:
Linkit: https://jyx.jyu.fi/handle/123456789/53393
_version_ 1826225816419172352
author Suhonen, Tatu
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology University of Jyväskylä Jyväskylän yliopisto
author_facet Suhonen, Tatu Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology University of Jyväskylä Jyväskylän yliopisto Suhonen, Tatu Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology University of Jyväskylä Jyväskylän yliopisto
author_sort Suhonen, Tatu
datasource_str_mv jyx
description Terrorismi on teknologian kehittyessä siirtynyt kyberavaruuteen ja muuntau-tunut kyberterrorismiksi. Terrorismin uhka ei enää ole vain fyysinen, sillä ky-beravaruus mahdollistaa tietoverkkojen monipuolisen käytön terroristisiin tarpeisiin. Kyberterrorismin uhka on synnyttänyt tarpeen luoda uudenlaisia torjuntakeinoja. Yksi kyberterrorismin torjuntaan käytetyistä menetelmistä on tiedonlouhinta, jonka avulla pystytään tehokkaasti löytämään ennestään tun-tematonta tietoa suurista datamäärästä. Tässä tutkielmassa tutkitaan kyberter-rorismia ilmiönä sekä tiedonlouhinnan menetelmiä ja sovelluksia kyberterro-rismin torjuntaan. Tutkielma on kirjallisuuskatsaus, joka pohjautuu alan tie-teelliseen tutkimukseen, sekä niitä tukeviin julkaisuihin. Tutkielman tulokse-na voidaan todeta, että tiedonlouhinnan avulla voidaan pyrkiä estämään ky-berterroristien iskuja sekä etsimään kyberterroristeja ja heidän toimintaansa verkosta. Tiedonlouhintaa voidaan hyödyntää kriittisen infrastruktuurin suo-jaamiseen tarkoitetuissa tunkeutumisen havainnointijärjestelmissä järjestel-mien havainnointikyvyn parantamiseen. Verkossa tiedonlouhintaa voidaan hyödyntää kyberterroristien ja kyberterrorismiin viittaavan materiaalin etsi-miseen. Tiedonlouhinta on kuitenkin ensisijaisesti vain päätöksentekoa edis-tävä työkalu, joka ei estä kyberiskuja tapahtumasta. Tiedonlouhinnalla voi-daan silti saavuttaa ennaltaehkäisevä vaikutus ja vähentää kyberterrorismin riskejä. Datamäärien kasvaessa datan automaattisen käsittelyn ja analysoinnin merkitys korostuu, joten tiedonlouhinnalle löytyy tulevaisuudessa vielä enemmän käyttöä. Due to technological advancements terrorism has moved to cyberspace and it has transformed into cyberterrorism. The threat of terrorism is no longer pure-ly physical because cyberspace allows versatile use of networks for terrorist use. The threat has generated the need for new kinds of methods to fight against cyberterrorism. One of the used methods is data mining which allows the discovery of new knowledge from large datasets. The goal of this thesis is to examine cyberterrorism as a phenomenon and to discover the different methods and applications where data mining could be used against cyberter-rorism. This thesis is a literature review and it is based on the scientific re-search and other supporting publications. The result of this thesis is that data mining is used to prevent cyberterrorist attacks and to find cyberterrorists and their activities on the web. Data mining can be used to enhance the detection capabilities of intrusion detection systems that are used to protect the nation’s critical infrastructure. On the web data mining can be used to find cyberterror-ists and cyberterrorist related content. However, data mining is primarily a tool for decision making and it does not prevent cyberterrorism from happen-ing. Still it can reduce the risk of cyberterrorism acts and can give valuable information to prevent cyberterrorism. As the amount of data keeps on grow-ing the automatic processing and analyzing of data will be more significant and therefore data mining will have lots of use in the future.
first_indexed 2017-03-28T20:37:34Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Per\u00e4l\u00e4, Piia", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "Taipalus, Toni", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Suhonen, Tatu", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2017-03-28T18:53:38Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2017-03-28T18:53:38Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2017", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/53393", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Terrorismi on teknologian kehittyess\u00e4 siirtynyt kyberavaruuteen ja muuntau-tunut kyberterrorismiksi. Terrorismin uhka ei en\u00e4\u00e4 ole vain fyysinen, sill\u00e4 ky-beravaruus mahdollistaa tietoverkkojen monipuolisen k\u00e4yt\u00f6n terroristisiin tarpeisiin. Kyberterrorismin uhka on synnytt\u00e4nyt tarpeen luoda uudenlaisia torjuntakeinoja. Yksi kyberterrorismin torjuntaan k\u00e4ytetyist\u00e4 menetelmist\u00e4 on tiedonlouhinta, jonka avulla pystyt\u00e4\u00e4n tehokkaasti l\u00f6yt\u00e4m\u00e4\u00e4n ennest\u00e4\u00e4n tun-tematonta tietoa suurista datam\u00e4\u00e4r\u00e4st\u00e4. T\u00e4ss\u00e4 tutkielmassa tutkitaan kyberter-rorismia ilmi\u00f6n\u00e4 sek\u00e4 tiedonlouhinnan menetelmi\u00e4 ja sovelluksia kyberterro-rismin torjuntaan. Tutkielma on kirjallisuuskatsaus, joka pohjautuu alan tie-teelliseen tutkimukseen, sek\u00e4 niit\u00e4 tukeviin julkaisuihin. Tutkielman tulokse-na voidaan todeta, ett\u00e4 tiedonlouhinnan avulla voidaan pyrki\u00e4 est\u00e4m\u00e4\u00e4n ky-berterroristien iskuja sek\u00e4 etsim\u00e4\u00e4n kyberterroristeja ja heid\u00e4n toimintaansa verkosta. Tiedonlouhintaa voidaan hy\u00f6dynt\u00e4\u00e4 kriittisen infrastruktuurin suo-jaamiseen tarkoitetuissa tunkeutumisen havainnointij\u00e4rjestelmiss\u00e4 j\u00e4rjestel-mien havainnointikyvyn parantamiseen. Verkossa tiedonlouhintaa voidaan hy\u00f6dynt\u00e4\u00e4 kyberterroristien ja kyberterrorismiin viittaavan materiaalin etsi-miseen. Tiedonlouhinta on kuitenkin ensisijaisesti vain p\u00e4\u00e4t\u00f6ksentekoa edis-t\u00e4v\u00e4 ty\u00f6kalu, joka ei est\u00e4 kyberiskuja tapahtumasta. Tiedonlouhinnalla voi-daan silti saavuttaa ennaltaehk\u00e4isev\u00e4 vaikutus ja v\u00e4hent\u00e4\u00e4 kyberterrorismin riskej\u00e4. Datam\u00e4\u00e4rien kasvaessa datan automaattisen k\u00e4sittelyn ja analysoinnin merkitys korostuu, joten tiedonlouhinnalle l\u00f6ytyy tulevaisuudessa viel\u00e4 enemm\u00e4n k\u00e4ytt\u00f6\u00e4.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Due to technological advancements terrorism has moved to cyberspace and it has transformed into cyberterrorism. The threat of terrorism is no longer pure-ly physical because cyberspace allows versatile use of networks for terrorist use. The threat has generated the need for new kinds of methods to fight against cyberterrorism. One of the used methods is data mining which allows the discovery of new knowledge from large datasets. The goal of this thesis is to examine cyberterrorism as a phenomenon and to discover the different methods and applications where data mining could be used against cyberter-rorism. This thesis is a literature review and it is based on the scientific re-search and other supporting publications. The result of this thesis is that data mining is used to prevent cyberterrorist attacks and to find cyberterrorists and their activities on the web. Data mining can be used to enhance the detection capabilities of intrusion detection systems that are used to protect the nation\u2019s critical infrastructure. On the web data mining can be used to find cyberterror-ists and cyberterrorist related content. However, data mining is primarily a tool for decision making and it does not prevent cyberterrorism from happen-ing. Still it can reduce the risk of cyberterrorism acts and can give valuable information to prevent cyberterrorism. As the amount of data keeps on grow-ing the automatic processing and analyzing of data will be more significant and therefore data mining will have lots of use in the future.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Tatu Suhonen (tatosasu) on 2017-03-28 18:53:37.625586. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2017-03-28T18:53:38Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201703281785.pdf: 624762 bytes, checksum: 4ae0799a632340bd54de64391dcfa682 (MD5)\nlicense.html: 4788 bytes, checksum: 9087d3d40e80fa1d31dd9fe0d4e069a9 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2017-03-28T18:53:38Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201703281785.pdf: 624762 bytes, checksum: 4ae0799a632340bd54de64391dcfa682 (MD5)\nlicense.html: 4788 bytes, checksum: 9087d3d40e80fa1d31dd9fe0d4e069a9 (MD5)\n Previous issue date: 2017", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "35", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kyber", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "terrorismi", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberpuolustus", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tiedonlouhinta", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Tiedonlouhinta kyberterrorismin torjuntakeinona", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201703281785", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2017-03-28T18:53:38Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_53393
language fin
last_indexed 2025-02-18T10:55:14Z
main_date 2017-01-01T00:00:00Z
main_date_str 2017
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/a6546cc2-d686-4b9e-b54f-d8e25cf26a0b\/download","text":"URN:NBN:fi:jyu-201703281785.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2017
record_format qdc
source_str_mv jyx
spellingShingle Suhonen, Tatu Tiedonlouhinta kyberterrorismin torjuntakeinona kyber terrorismi kyberpuolustus tiedonlouhinta Tietojärjestelmätiede Information Systems Science
title Tiedonlouhinta kyberterrorismin torjuntakeinona
title_full Tiedonlouhinta kyberterrorismin torjuntakeinona
title_fullStr Tiedonlouhinta kyberterrorismin torjuntakeinona Tiedonlouhinta kyberterrorismin torjuntakeinona
title_full_unstemmed Tiedonlouhinta kyberterrorismin torjuntakeinona Tiedonlouhinta kyberterrorismin torjuntakeinona
title_short Tiedonlouhinta kyberterrorismin torjuntakeinona
title_sort tiedonlouhinta kyberterrorismin torjuntakeinona
title_txtP Tiedonlouhinta kyberterrorismin torjuntakeinona
topic kyber terrorismi kyberpuolustus tiedonlouhinta Tietojärjestelmätiede Information Systems Science
topic_facet Information Systems Science Tietojärjestelmätiede kyber kyberpuolustus terrorismi tiedonlouhinta
url https://jyx.jyu.fi/handle/123456789/53393 http://www.urn.fi/URN:NBN:fi:jyu-201703281785
work_keys_str_mv AT suhonentatu tiedonlouhintakyberterrorismintorjuntakeinona