fullrecord |
[{"key": "dc.contributor.advisor", "value": "Sepp\u00e4nen, Ville", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Luukkanen, Topi", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2018-06-28T12:07:18Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2018-06-28T12:07:18Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2018", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/58772", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4ss\u00e4 kirjallisuuskatsauksessa tarkastellaan koneoppimisen hy\u00f6dynt\u00e4mist\u00e4 kyberturvallisuuden kontekstissa kyberhy\u00f6kk\u00e4ysten n\u00e4k\u00f6kulmasta. Koneoppimisella on lukuisia ja paljon tutkittuja sovelluksia kyberturvallisuuden edist\u00e4j\u00e4n\u00e4, joten tutkielma keskittyy v\u00e4hemm\u00e4n tiedostettuun varjopuoleen kyberuhkien mahdollistajana, eli kuinka koneoppimista voidaan k\u00e4ytt\u00e4\u00e4 kyberhy\u00f6kk\u00e4yksen apuv\u00e4lineen\u00e4 ja millaisia hy\u00f6dynnett\u00e4vi\u00e4 haavoittuvuuksia koneoppimiseen tukeutuvissa j\u00e4rjestelmiss\u00e4 on. Yksi t\u00e4rkeimmist\u00e4 l\u00f6yd\u00f6ist\u00e4 tutkimuksessa oli taksonominen luokittelu koneoppimiseen kohdennettuihin kyberhy\u00f6kk\u00e4yksiin. Luokittelu erottelee kolme vaikuttavaa tekij\u00e4\u00e4 hy\u00f6kk\u00e4ykseen: hy\u00f6kk\u00e4\u00e4j\u00e4n mahdollisuuden vaikuttaa mallin harjoitusdataan, tietoturvaloukkauksen tyyppi ja hy\u00f6kk\u00e4yksen tarkkuus. Edistyneit\u00e4 koneoppimismenetelmi\u00e4 voidaan k\u00e4ytt\u00e4\u00e4 kohteena olevan koneoppimismallin varastamiseen sek\u00e4 haavoittuvuuksien l\u00f6yt\u00e4miseen jo hyvin pienill\u00e4kin m\u00e4\u00e4rill\u00e4 harjoitusdataa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This bachelor\u2019s thesis inspects the usage of machine learning in cybersecurity domain from an attack perspective. Machine learning has established its position as a vital part of every cybersecurity system and its applications in cyber defense are well-researched. Therefore, this literature review focuses on makyberchine learning\u2019s less acknowledged side as an enabler of certain cyberthreats. Ergo, how machine learning can be utilized as a tool for cyberattacks and what types of vulnerabilities machine learning systems are prone to. One of the main findings of the literature review was a taxonomy for attacks against machine learning systems. The three axes defined for classifying cyberattacks include the attacker\u2019s ability to affect the model\u2019s training data, quality of information security violation and intended scope of the attack. The attacker can benefit from using advanced machine learning methods to discover vulnerabilities and infer vital aspects of the model with minimal amounts of model\u2019s training data.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Riitta Pitk\u00e4nen (rpitkane@jyu.fi) on 2018-06-28T12:07:18Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2018-06-28T12:07:18Z (GMT). No. of bitstreams: 0\n Previous issue date: 2018", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "26", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberuhka", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberhy\u00f6kk\u00e4ys", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "vihamielinen koneoppiminen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Koneoppiminen kyberhy\u00f6kk\u00e4yksiss\u00e4", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201806283394", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "koneoppiminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "verkkohy\u00f6kk\u00e4ykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|