fullrecord |
[{"key": "dc.contributor.advisor", "value": "H\u00e4m\u00e4l\u00e4inen, Timo", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Siironen, Sinikka", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2018-05-25T07:14:25Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2018-05-25T07:14:25Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2018", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/58090", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Software-defined networking (SDN) is used especially in cloud computing, because it is more flexible than traditional networks. In this study, first, vulnerabilities found in SDN controllers are described based on literature research. The vulnerabilities found are related to network fingerprinting, forged topology information, applications used by the controller and the interfaces between controller, switches and applications. Second, a comparative experiment is conducted, where three controllers are put under Denial-of-Service attack and their performance is measured. It was found that in the worst case the attack can crash the controller. During the attack the controller consumes more CPU time and memory and can\u2019t serve legit users of the network properly. The attack traffic strains also connections between network users. Out of the controllers used in this study, Floodlight\u2019s performance was the worst because the controller crashed and couldn\u2019t recover. OpenDaylight consumed quite a lot resources but performed effectively. Ryu used the least amount of CPU time. Comparing the controllers\u2019 results it was aknowledged that not all the tools picked for this experiment were up to the task. The good and bad choices in designing the experiment can be used infurther research to conduct better studies.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Ohjelmisto-ohjattu tietoverkkoarkkitehtuuri on erityisesti pilvipalveluissa hy\u00f6dynnett\u00e4v\u00e4, perinteist\u00e4 tietoverkkoa joustavampi arkkitehtuuri. Tutkielmassa esitell\u00e4\u00e4n kirjallisuuskartoituksessa l\u00f6ydettyj\u00e4 ohjelmisto-ohjatun tietoverkon ohjaimen haavoittuvuuksia. Haavoittuvuudet liittyiv\u00e4t verkon tietojen ker\u00e4\u00e4miseen, verkon topologiatietojen v\u00e4\u00e4rent\u00e4miseen, ohjaimen k\u00e4ytt\u00e4miin verkkosovelluksiin ja arkkitehtuurin rajapintoihin ohjaimen, sovellusten ja verkkolaitteiden v\u00e4lill\u00e4. Tutkimuksen toisena tavoitteena oli testata k\u00e4yt\u00e4nn\u00f6ss\u00e4, miten ohjelmisto-ohjatun tietoverkkoarkkitehtuurin ohjainohjelmistot selviytyv\u00e4t palvelunestohy\u00f6kk\u00e4yksest\u00e4. Tutkimus osoitti, ett\u00e4 pahimmassa tapauksessa hy\u00f6kk\u00e4ys voi kaataa ohjainohjelmiston. Hy\u00f6kk\u00e4yksen aikana ohjain kuluttaa enemm\u00e4n suoritintehoa ja muistia, eik\u00e4 se voi palvella oikeita verkon k\u00e4ytt\u00e4ji\u00e4 kunnolla. Hy\u00f6kk\u00e4ysliikenne kuormittaa my\u00f6s verkon k\u00e4ytt\u00e4jien v\u00e4lisi\u00e4 yhteyksi\u00e4. Tutkimuksessa k\u00e4ytetyist\u00e4 ohjaimista Floodlight suoriutui kokeista heikoiten, koska se kaatui eik\u00e4 palautunut toimintakykyiseksi. OpenDaylight k\u00e4ytti melko paljon resursseja, mutta my\u00f6s toimi tehokkaasti. Ryu k\u00e4ytti ohjaimista v\u00e4hiten suoritintehoa. Ohjainten tuloksia vertailtaessa todettiin, ett\u00e4 koetta suunniteltaessa valitut ty\u00f6kalut eiv\u00e4t kaikilta osin soveltuneet teht\u00e4v\u00e4\u00e4n. Tutkimuksen anti on vertailevan kokeen suunnittelusta tunnistetut hyv\u00e4t ja huonot valinnat ja niiden hy\u00f6dynt\u00e4minen jatkotutkimuksessa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2018-05-25T07:14:25Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2018-05-25T07:14:25Z (GMT). No. of bitstreams: 0\n Previous issue date: 2018", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "91", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "haavoittuvuus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "ohjain", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "ohjelmisto-ohjattu tietoverkko", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "palvelunestohy\u00f6kk\u00e4ys", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Palvelunestohy\u00f6kk\u00e4yksen vaikutukset ohjelmisto-ohjatun tietoverkon ohjaimiin", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201805252763", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoverkot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "ohjaimet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|