fullrecord |
[{"key": "dc.contributor.advisor", "value": "M\u00f6nk\u00f6l\u00e4, Sanna", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Lappalainen, Kimmo", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2017-12-26T10:44:56Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2017-12-26T10:44:56Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2017", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/56544", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Palvelunestohy\u00f6kk\u00e4ysten nopeutuessa ja niiden k\u00e4ytt\u00e4mien menetelmien kehittyess\u00e4, on tarve tutkia menetelmi\u00e4 niiden torjumiseksi. Ohjelmisto-ohjattu teknologia mahdollistaa erilaisten menetelmien toteuttamisen. T\u00e4ss\u00e4 tutkimuksessa on tutkittu, mit\u00e4 palvelunestohy\u00f6kk\u00e4ysten torjuntamenetelmi\u00e4 on saatavilla ohjelmisto-ohjatuissa tietoverkoissa ja miten hyvin ne toimivat. Kirjallisuudesta l\u00f6ydettyj\u00e4 menetelmi\u00e4 olivat uudelleenohjausmenetelm\u00e4 ja IP:n vaihtomenetelm\u00e4 sek\u00e4 porttihyppy- ja sekoitusmenetelm\u00e4t. N\u00e4m\u00e4 menetelm\u00e4t soveltuvat tiettyjen hy\u00f6kk\u00e4ysmenetelmien torjumiseen. Vertailevaa lis\u00e4tutkimusta menetelmien suorituskyvyst\u00e4 ja keskin\u00e4isest\u00e4 paremmuudesta tarvitaan.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "As denial-of-service attacks increase in size and the utilized attack methods evolve research in mitigation methods is needed. Software-defined networking enables implementation different of denial-of-service mitigation methods. This study researches what methods are available in software-defined networking and how these methods perform. Methods found in literature were redirection, IP address change, port-hopping and shuffling methods. They were suited in mitigation of certain denial-of-service attacks. A comparative study about the performance of the methods is needed.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Kimmo Lappalainen (kitalapp) on 2017-12-26 10:44:55.428689. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2017-12-26T10:44:56Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201712264883.pdf: 186534 bytes, checksum: 63305248838d68c7162b6e301a7185ae (MD5)\nlicense.html: 4831 bytes, checksum: 79f3c8c8820943e0e41515c1b4ba1f1d (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2017-12-26T10:44:56Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201712264883.pdf: 186534 bytes, checksum: 63305248838d68c7162b6e301a7185ae (MD5)\nlicense.html: 4831 bytes, checksum: 79f3c8c8820943e0e41515c1b4ba1f1d (MD5)\n Previous issue date: 2017", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "21", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "ohjelmisto-ohjatut tietoverkot", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "palvelunestohy\u00f6kk\u00e4ys", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "liikkuvan kohteen puolustus", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Ohjelmisto-ohjatut tietoverkot ja palvelunestohy\u00f6kk\u00e4ysten torjuntamenetelm\u00e4t", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201712264883", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2017-12-26T10:44:56Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|