Ohjelmisto-ohjatut verkot ja tunkeutumisen havainnointijärjestelmät

Tässä pro gradu -tutkielmassa tutkitaan ohjelmisto ohjattuja verkkojen kontrollerin ja hyökkäyksen havainnoin järjestelmien yhdessä toimimista, ja Mininet verkko emulaattorin asentamista ja käyttämistä. Tutkielmassa raapaistaan pintaa laajojen ohjelmisto ohjattujen verkkojen kontrollerien ja hyökkäy...

Full description

Bibliographic Details
Main Author: Huhtiniemi, Ismo
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, University of Jyväskylä, Jyväskylän yliopisto
Format: Master's thesis
Language:fin
Published: 2017
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/56229
_version_ 1826225680640114688
author Huhtiniemi, Ismo
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia University of Jyväskylä Jyväskylän yliopisto
author_facet Huhtiniemi, Ismo Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia University of Jyväskylä Jyväskylän yliopisto Huhtiniemi, Ismo Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia University of Jyväskylä Jyväskylän yliopisto
author_sort Huhtiniemi, Ismo
datasource_str_mv jyx
description Tässä pro gradu -tutkielmassa tutkitaan ohjelmisto ohjattuja verkkojen kontrollerin ja hyökkäyksen havainnoin järjestelmien yhdessä toimimista, ja Mininet verkko emulaattorin asentamista ja käyttämistä. Tutkielmassa raapaistaan pintaa laajojen ohjelmisto ohjattujen verkkojen kontrollerien ja hyökkäyksien havaitsemisjärjestelmien alustoille. Tulosten avulla saadaan myös esille se, että kuinka merkittävää on ohjelmistojen jatkuva ylläpito, kun alustat vanhenevat mm. Java versioinnin vanheneminen eli hyvätkään ohjelmat eivät ole ikuisia, jos niiden kehittäminen lakkautetaan. Software defined networking and intrusion detection systems. This Master's Thesis examines software defined network controller and Intrusion Detection Systems working together, and Mininet network emulator installation and use. The thesis explores the surface of extensive software on the platforms of wired network controllers and attack detection systems. The results also show how significant the continuous maintenance of the software is when the platforms are aging, for example. Expiration of the Java version. So even the programs are not eternal if their development is abolished.
first_indexed 2023-03-22T09:57:35Z
format Pro gradu
fullrecord [{"key": "dc.contributor.advisor", "value": "H\u00e4m\u00e4l\u00e4inen, Timo", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Huhtiniemi, Ismo", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2017-12-11T09:38:08Z", "language": "", "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2017-12-11T09:38:08Z", "language": "", "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2017", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.other", "value": "oai:jykdok.linneanet.fi:1810201", "language": null, "element": "identifier", "qualifier": "other", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/56229", "language": "", "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4ss\u00e4 pro gradu -tutkielmassa tutkitaan ohjelmisto ohjattuja verkkojen kontrollerin ja hy\u00f6kk\u00e4yksen havainnoin j\u00e4rjestelmien yhdess\u00e4 toimimista, ja Mininet verkko emulaattorin asentamista ja k\u00e4ytt\u00e4mist\u00e4. Tutkielmassa raapaistaan pintaa laajojen ohjelmisto ohjattujen verkkojen kontrollerien ja hy\u00f6kk\u00e4yksien havaitsemisj\u00e4rjestelmien alustoille. Tulosten avulla saadaan my\u00f6s esille se, ett\u00e4 kuinka merkitt\u00e4v\u00e4\u00e4 on ohjelmistojen jatkuva yll\u00e4pito, kun alustat vanhenevat mm. Java versioinnin vanheneminen eli hyv\u00e4tk\u00e4\u00e4n ohjelmat eiv\u00e4t ole ikuisia, jos niiden kehitt\u00e4minen lakkautetaan.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Software defined networking and intrusion detection systems.\r\n\r\nThis Master's Thesis examines software defined network controller and Intrusion Detection Systems working together, and Mininet network emulator installation and use. The thesis explores the surface of extensive software on the platforms of wired network controllers and attack detection systems. The results also show how significant the continuous maintenance of the software is when the platforms are aging, for example. Expiration of the Java version. So even the programs are not eternal if their development is abolished.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Ismo Huhtiniemi (isolhuht) on 2017-12-11 09:38:08.208395. Form: Pro gradu -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/pro-gradu-lomake). JyX data: [jyx_publishing-allowed (fi) =False]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2017-12-11T09:38:08Z\r\nNo. of bitstreams: 2\r\nURN:NBN:fi:jyu-201712114598.pdf: 1287369 bytes, checksum: 0ec5ff51cc94151bbd61aa00905f7ab9 (MD5)\r\nlicense.html: 1149 bytes, checksum: 9809dd95c6047820f847948bc3d8de7c (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2017-12-11T09:38:08Z (GMT). No. of bitstreams: 2\r\nURN:NBN:fi:jyu-201712114598.pdf: 1287369 bytes, checksum: 0ec5ff51cc94151bbd61aa00905f7ab9 (MD5)\r\nlicense.html: 1149 bytes, checksum: 9809dd95c6047820f847948bc3d8de7c (MD5)\r\n Previous issue date: 2017", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "1 verkkoaineisto (59 sivua)", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "SDN", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "IDS", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "OpenFlow", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Mininet", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "SDN controllers", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "intrusion detection systems", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Ohjelmisto-ohjatut verkot ja tunkeutumisen havainnointij\u00e4rjestelm\u00e4t", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201712114598", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.method", "value": "Empiirinen tutkimus", "language": null, "element": "subject", "qualifier": "method", "schema": "dc"}, {"key": "dc.date.updated", "value": "2017-12-11T09:38:09Z", "language": "", "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": null, "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoverkot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "verkonhallinta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "ohjelmistot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Aineistoon p\u00e4\u00e4sy\u00e4 on rajoitettu tekij\u00e4noikeussyist\u00e4. Aineisto on luettavissa Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6asemalta. Ks. https://kirjasto.jyu.fi/fi/tyoskentelytilat/laitteet-ja-tilat.", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "This material has a restricted access due to copyright reasons. It can be read at the workstation at Jyv\u00e4skyl\u00e4 University Library reserved for the use of archival materials: https://kirjasto.jyu.fi/en/workspaces/facilities.", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
id jyx.123456789_56229
language fin
last_indexed 2025-02-18T10:54:30Z
main_date 2017-01-01T00:00:00Z
main_date_str 2017
publishDate 2017
record_format qdc
source_str_mv jyx
spellingShingle Huhtiniemi, Ismo Ohjelmisto-ohjatut verkot ja tunkeutumisen havainnointijärjestelmät SDN IDS OpenFlow Mininet SDN controllers intrusion detection systems Tietotekniikka Mathematical Information Technology Empiirinen tutkimus 602 tietoverkot verkonhallinta tietoturva ohjelmistot
title Ohjelmisto-ohjatut verkot ja tunkeutumisen havainnointijärjestelmät
title_full Ohjelmisto-ohjatut verkot ja tunkeutumisen havainnointijärjestelmät
title_fullStr Ohjelmisto-ohjatut verkot ja tunkeutumisen havainnointijärjestelmät Ohjelmisto-ohjatut verkot ja tunkeutumisen havainnointijärjestelmät
title_full_unstemmed Ohjelmisto-ohjatut verkot ja tunkeutumisen havainnointijärjestelmät Ohjelmisto-ohjatut verkot ja tunkeutumisen havainnointijärjestelmät
title_short Ohjelmisto-ohjatut verkot ja tunkeutumisen havainnointijärjestelmät
title_sort ohjelmisto ohjatut verkot ja tunkeutumisen havainnointijärjestelmät
title_txtP Ohjelmisto-ohjatut verkot ja tunkeutumisen havainnointijärjestelmät
topic SDN IDS OpenFlow Mininet SDN controllers intrusion detection systems Tietotekniikka Mathematical Information Technology Empiirinen tutkimus 602 tietoverkot verkonhallinta tietoturva ohjelmistot
topic_facet 602 Empiirinen tutkimus IDS Mathematical Information Technology Mininet OpenFlow SDN SDN controllers Tietotekniikka intrusion detection systems ohjelmistot tietoturva tietoverkot verkonhallinta
url https://jyx.jyu.fi/handle/123456789/56229 http://www.urn.fi/URN:NBN:fi:jyu-201712114598
work_keys_str_mv AT huhtiniemiismo ohjelmistoohjatutverkotjatunkeutumisenhavainnointijärjestelmät