Tekniikat internet-reititysten kaappaamisen estämiseksi

Tutkielmassa tarkastellaan Border Gateway Protocollan tietoturvaongelmia, sekä kuinka nämä ongelmat mahdollistavat Internet-reitityksen kaappaamisen. Tietoturvaongelmiin etsitään ratkaisuja vertailemalla kirjallisuudessa esitettyjä parannuksia Border Gateway Protocollaan, ja selvitetään syitä miksi...

Full description

Bibliographic Details
Main Author: Jussila, Henri
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Bachelor's thesis
Language:fin
Published: 2020
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/68916
_version_ 1826225804732792832
author Jussila, Henri
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Jussila, Henri Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Jussila, Henri Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Jussila, Henri
datasource_str_mv jyx
description Tutkielmassa tarkastellaan Border Gateway Protocollan tietoturvaongelmia, sekä kuinka nämä ongelmat mahdollistavat Internet-reitityksen kaappaamisen. Tietoturvaongelmiin etsitään ratkaisuja vertailemalla kirjallisuudessa esitettyjä parannuksia Border Gateway Protocollaan, ja selvitetään syitä miksi mitään parannusta ei ole otettu laajasti käyttöön. Parannuksia vertailtaessa havaitaan, että kaikilla vertailtavilla ratkaisuilla on omat heikkoutensa ja vahvuutensa, minkä seurauksena yksittäinen ratkaisu ei kykene täyttämään kaikkien tahojen tarpeita, vaan joudutaan tekemään kompromissi. The thesis looks at the Border Gateway Protocol and the security problems it has, and how these problems allow the hijacking of internet-routing. The thesis looks at possible solutions to these problems by comparing improvements to the Border Gateway protocol that have been proposed in research literature, and why none of the proposed solutions has reached widespread adoption. During the comparision it is found that all the proposed solutions have their strengths and weaknesses. This leads to the implication that there is not a single solution that would fix the security problems in Border Gateway Protocol, instead if there is to be a solution it needs to be a compromise.
first_indexed 2020-05-11T20:00:39Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Tiihonen, Timo", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Jussila, Henri", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-05-11T06:34:31Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-05-11T06:34:31Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/68916", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tutkielmassa tarkastellaan Border Gateway Protocollan tietoturvaongelmia, sek\u00e4 kuinka n\u00e4m\u00e4 ongelmat mahdollistavat Internet-reitityksen kaappaamisen. Tietoturvaongelmiin etsit\u00e4\u00e4n ratkaisuja vertailemalla kirjallisuudessa esitettyj\u00e4 parannuksia Border Gateway Protocollaan, ja selvitet\u00e4\u00e4n syit\u00e4 miksi mit\u00e4\u00e4n parannusta ei ole otettu laajasti k\u00e4ytt\u00f6\u00f6n. Parannuksia vertailtaessa havaitaan, ett\u00e4 kaikilla vertailtavilla ratkaisuilla on omat heikkoutensa ja vahvuutensa, mink\u00e4 seurauksena yksitt\u00e4inen ratkaisu ei kykene t\u00e4ytt\u00e4m\u00e4\u00e4n kaikkien tahojen tarpeita, vaan joudutaan tekem\u00e4\u00e4n kompromissi.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The thesis looks at the Border Gateway Protocol and the security problems it has, and how these problems allow the hijacking of internet-routing. The thesis looks at possible solutions to these problems by comparing improvements to the Border Gateway protocol that have been proposed in research literature, and why none of the proposed solutions has reached widespread adoption. During the comparision it is found that all the proposed solutions have their strengths and weaknesses. This leads to the implication that there is not a single solution that would \ufb01x the security problems in Border Gateway Protocol, instead if there is to be a solution it needs to be a compromise.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2020-05-11T06:34:31Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-05-11T06:34:31Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "25", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "BGP", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "S-BGP", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "ROVER", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "PGBGP", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "ARGUS", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Tekniikat internet-reititysten kaappaamisen est\u00e4miseksi", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202005113122", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_68916
language fin
last_indexed 2025-02-18T10:54:24Z
main_date 2020-01-01T00:00:00Z
main_date_str 2020
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/7694cc62-82a7-44e9-9f6b-e347ed9e5a7c\/download","text":"URN:NBN:fi:jyu-202005113122.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2020
record_format qdc
source_str_mv jyx
spellingShingle Jussila, Henri Tekniikat internet-reititysten kaappaamisen estämiseksi BGP S-BGP ROVER PGBGP ARGUS Tietotekniikka Mathematical Information Technology 602 tietoturva Internet
title Tekniikat internet-reititysten kaappaamisen estämiseksi
title_full Tekniikat internet-reititysten kaappaamisen estämiseksi
title_fullStr Tekniikat internet-reititysten kaappaamisen estämiseksi Tekniikat internet-reititysten kaappaamisen estämiseksi
title_full_unstemmed Tekniikat internet-reititysten kaappaamisen estämiseksi Tekniikat internet-reititysten kaappaamisen estämiseksi
title_short Tekniikat internet-reititysten kaappaamisen estämiseksi
title_sort tekniikat internet reititysten kaappaamisen estämiseksi
title_txtP Tekniikat internet-reititysten kaappaamisen estämiseksi
topic BGP S-BGP ROVER PGBGP ARGUS Tietotekniikka Mathematical Information Technology 602 tietoturva Internet
topic_facet 602 ARGUS BGP Internet Mathematical Information Technology PGBGP ROVER S-BGP Tietotekniikka tietoturva
url https://jyx.jyu.fi/handle/123456789/68916 http://www.urn.fi/URN:NBN:fi:jyu-202005113122
work_keys_str_mv AT jussilahenri tekniikatinternetreititystenkaappaamisenestämiseksi