fullrecord |
[{"key": "dc.contributor.advisor", "value": "H\u00e4m\u00e4l\u00e4inen, Timo", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Huuskonen, Vesa", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-06-17T10:06:33Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-06-17T10:06:33Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/70023", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tutkielmassa k\u00e4ytiin l\u00e4pi palvelunestohy\u00f6kk\u00e4yksiin liittyvi\u00e4 protokollia sek\u00e4 er\u00e4it\u00e4 tunnettuja hy\u00f6kk\u00e4ysmenetelmi\u00e4. Teoriaosuudessa perehdyttiin my\u00f6s aiheesta jo\ntehtyihin tutkimuksiin. Hy\u00f6kk\u00e4yksien havaitsemismenetelmi\u00e4 k\u00e4ytiin l\u00e4pi niin teoriatasolla kuin k\u00e4yt\u00e4nn\u00f6ss\u00e4kin. Hy\u00f6kk\u00e4yksilt\u00e4 suojautumista tutkittiin pilvipalveluiden osalta kirjallisuuskatsauksena k\u00e4ym\u00e4ll\u00e4 l\u00e4pi palveluiden materiaalia ja k\u00e4yt\u00e4nn\u00f6n osuudessa pystytt\u00e4m\u00e4ll\u00e4 oma virtuaaliymp\u00e4rist\u00f6. Ymp\u00e4rist\u00f6 koostui kahdesta komentorivipohjaisesta Ubuntupalvelimesta, Ubuntun ty\u00f6p\u00f6yt\u00e4versiota k\u00e4ytt\u00e4vist\u00e4 asiakaskoneista ja kolmesta Kali Linuxia\nk\u00e4ytt\u00e4v\u00e4st\u00e4 hy\u00f6kk\u00e4\u00e4v\u00e4st\u00e4 koneesta. Puolustus- ja havaitsemisj\u00e4rjestelmin\u00e4 testauksessa k\u00e4ytettiin Linuxin iptables palomuuria sek\u00e4 Snort tunkeutumisen havaitsemisj\u00e4rjestelm\u00e4\u00e4. Snortia testattiin sek\u00e4 tunkeutumisen havaitsemistilassa ett\u00e4 tunkeutumisen estotilassa. Tutkimuksessa havaittiin, ett\u00e4 mahdollisuudet paikalliseen puolustautumiseen riippuvat paljon hy\u00f6kk\u00e4yksen tyypist\u00e4 ja etenkin volumetristen hy\u00f6kk\u00e4ysten osalta ulkopuolisten pilvipohjaisten\nratkaisujen k\u00e4ytt\u00f6 tai Internetoperaattorin apu ovat v\u00e4ltt\u00e4m\u00e4tt\u00f6mi\u00e4. Toisaalta hitaita sovelluskerrosten hy\u00f6kk\u00e4yksi\u00e4 vastaan puolustautuminen onnistui yll\u00e4tt\u00e4v\u00e4n hyvin avoimen l\u00e4hdekoodin ohjelmistoilla.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This study reviewed the protocols related to denial of service attacks as well as some known attack methods. The theoretical part also examined the research already done on\nithe topic. Attack detection methods were reviewed both at the theoretical level and in practice. Protection against attacks was studied in the case of cloud services as a literature review\nby reviewing the material of the services and in the practical part by setting up its own virtual\nenvironment. The environment consisted of two command-line-based Ubuntu servers, client\ncomputers running the desktop version of Ubuntu, and three attack machines running Kali\nLinux. The Linux iptables firewall and the Snort intrusion detection system were used as defense and detection systems in the testing. Snort was tested in both the intrusion detection\nmode and the intrusion prevention mode. The study found that the potential for local defense\ndepends largely on the type of attack, and especially for volumetric attacks, the use of external cloud-based solutions or the assistance of an Internet operator is essential. On the other\nhand, defending against slow application layer attacks was surprisingly successful with open\nsource software.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2020-06-17T10:06:33Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-06-17T10:06:33Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "85", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "bottiverkko", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "DDoS", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "palvelunestohy\u00f6kk\u00e4ys", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Palvelimen suojaaminen DDoS-hy\u00f6kk\u00e4yksilt\u00e4", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202006174240", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "protokollat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "hy\u00f6kk\u00e4ys", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoliikenne", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|