fullrecord |
[{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Rantam\u00e4ki, Ville", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-11-20T11:38:34Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-11-20T11:38:34Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/72707", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Ohjelmisto-ohjatut verkot ovat nykyaikainen, mutta viel\u00e4 verrattain pieness\u00e4 roolissa oleva verkkoteknologia. Modernilla taistelukent\u00e4ll\u00e4, jatkuvasti mukautuvan ryhmityksen ja n\u00e4in ollen fyysisesti muuttuvan verkkotopologian p\u00e4\u00e4asialliset haasteet on kyetty ratkaisemaan, mutta niihin kohdistuva kyberuhka on jatkuvasti kiihtym\u00e4ss\u00e4. Perinteiseen verkkoarkkitehtuuriin on jo vuosien ajan kehitetty jatkuvasti edistyneempi\u00e4 hy\u00f6kk\u00e4ysmenetelmi\u00e4 ja puolustuksellisissa skenaarioissa toteutettavat toimenpiteet ovat hitaita toteuttaa tai vaativat tarpeettoman paljon resursseja. T\u00e4ss\u00e4 tutkimuksessa tarkastellaan sit\u00e4, voisiko ohjelmisto-ohjattu verkkoteknologia tuoda muutoksen nykytilaan sujuvoittamalla \u00e4killisi\u00e4 konfiguraatiomuutoksia verkkoliikenteen rajoittamiseksi ja verkossa sijaitsevien laitteiden turvaamiseksi.\n\nTutkimus on toteutettu laadullisena tutkimuksena. Sen perustana on suunnittelututkimus, jossa l\u00e4ht\u00f6kohtatilanteen ongelmat on tunnistettu aiem-masta tutkimustiedosta ja sen j\u00e4lkeen teoriaosion tarjoamia menetelmi\u00e4 hy\u00f6dynt\u00e4en pyritty l\u00f6yt\u00e4m\u00e4\u00e4n ratkaisuja niihin. Tutkimus on rajattu siten, ett\u00e4 se ei ota kantaa esimerkiksi taisteluosaston alueella tapahtuvaan satelliittitiedonsiirtoon ja sen tarjoamiin uhkiin ja mahdollisuuksiin, eik\u00e4 my\u00f6sk\u00e4\u00e4n ohjelmisto-ohjattujen verkkojen kyberuhkiin, vaan keskittyy esitt\u00e4m\u00e4\u00e4n mahdollisuuksia. L\u00e4hdemateriaalina on pyritty k\u00e4ytt\u00e4m\u00e4\u00e4n mahdollisimman ajantasaista tutkimustietoa, koska teknologiakehitys on \u00e4\u00e4rimm\u00e4isen nopeaa.\n\nTutkimuksen selkein tulos on se, ett\u00e4 ohjelmisto-ohjatuilla verkoilla kyett\u00e4isiin ehdottomasti tarjoamaan joissakin k\u00e4ytt\u00f6tapauksissa etua verrattuna konventionaalisiin verkkolaitteisiin. H\u00e4iri\u00f6tilanteista aiheutuvat akuutit konfiguraatiomuutokset, joilla pystytt\u00e4isiin rajaamaan esimerkiksi hy\u00f6kk\u00e4yksen levi\u00e4miseen liittyvi\u00e4 tapahtumia, saataisiin toimitettua huomattavan nopeasti kohteisiinsa ilman verkon t\u00e4ydellist\u00e4 rampauttamista. T\u00e4t\u00e4 puoltaa erityisesti datakerroksen ja hallintakerroksen erittely omiksi, erillisiksi verkoikseen, jotka eiv\u00e4t mahdollista tavanomaisiin verkkolaitteisiin suunnitellun hy\u00f6kk\u00e4yksen toteuttamista. Tutkimuksen perusteella aihetta tulisi jatkotutkia k\u00e4yt\u00e4nn\u00f6n testauksen avulla, jotta saavutettaisiin selkeit\u00e4, mittauskelpoisia tuloksia esitetyist\u00e4 ratkaisuista.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Software-defined networks are a modern network technology that still holds a somewhat minor role. On the modern battlefield, the crucial challenges in the constantly shifting formation and constantly changing physical network topology have been solved, but the cyber threat directed at them is constantly accelerating. Attacks towards the traditional network architecture have been developed for years, and they are constantly evolving to be more complex. In a defensive scenario the defensive measures in such a network are either too slow or require a disproportionate amount of resources to execute. This thesis aims to consider whether software-defined network technology could bring a change to the current state by streamlining acute configuration changes required to restrict network traffic and protect the devices on the network. \n\nThe research has been executed as a qualitative study. It is based on the concept of design science, where the initial threat scenarios are based off earlier studies, and after that by applying the methods explained in the literature review are used to explore solutions to the scenarios. The research has been defined to disregard for example the opportunities or threats that satellite data transfer in a brigade combat team\u2019s area of responsibility offer, or the specific cyber threats aimed at software-defined networking. It focuses on presenting possibilities instead. The source material used is mostly as recent as available, due to the extreme speed of technological development.\n\nThe clearest conclusion of this study is that software-defined networking could definitely provide advantages over conventional networks in some use cases. Acute configuration changes caused by network incidents, that could be used to restrict the spreading of an attack could be delivered remarkably fast to their targets without entirely crippling the network. The main reason for this is the separation of a data layer and a control layer as two separate entities, which do not allow for attacks based on conventional network devices. The study shows that the subject should be researched further, especially in the form of practical empirical testing, to confirm the validity of the presented solutions by acquiring clear, measurable results.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2020-11-20T11:38:34Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-11-20T11:38:34Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "62", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "taisteluosasto", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kentt\u00e4viestij\u00e4rjestelm\u00e4", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberpuolustus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "SDN", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "ohjelmisto-ohjatut verkot", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Verkkotopologioiden muutokset puolustuksellisena elementtin\u00e4", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202011206704", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietojenk\u00e4sittelytiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Computer Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "verkkohy\u00f6kk\u00e4ykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoverkot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "reitittimet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|