Tekoälyn sovelluskohteet kyberturvallisuudessa

Tekoälyn harppaukset viime vuosina ja uusien tekniikoiden soveltaminen kyberhyökkäyksissä ovat johtamassa siihen, että vanhat keinot eivät enää riitä hyökkäysten torjumiseksi. Tekoälyä hyödyntävien turvajärjestelmien avulla voidaan suojautua uusilta uhkilta. Tärkeitä ominaisuuksia tällaiselle järjes...

Full description

Bibliographic Details
Main Author: Keränen, Oona
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Bachelor's thesis
Language:fin
Published: 2020
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/73292
_version_ 1826225796073652224
author Keränen, Oona
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Keränen, Oona Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Keränen, Oona Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Keränen, Oona
datasource_str_mv jyx
description Tekoälyn harppaukset viime vuosina ja uusien tekniikoiden soveltaminen kyberhyökkäyksissä ovat johtamassa siihen, että vanhat keinot eivät enää riitä hyökkäysten torjumiseksi. Tekoälyä hyödyntävien turvajärjestelmien avulla voidaan suojautua uusilta uhkilta. Tärkeitä ominaisuuksia tällaiselle järjestelmälle ovat adaptiivisuus ja kyky toimia reaaliaikaisesti. Toisaalta tekoälyn käyttöön itsessään liittyy myös riskejä ja sitä voidaan käyttää haitallisiin tarkoituksiin. Tässä tutkielmassa pyritään selvittämään, mitä tekoälyllä tarkoitetaan ja kuinka sitä voidaan hyödyntää kyberturvallisuudessa. Tutkielman keskeisimpinä tuloksina ovat tekoälyn soveltamisella turvallisuusuhkien havaitsemisessa ja torjumisessa saatavat hyödyt. Näitä sovelluskohteita ovat esimerkiksi erilaiset keinoimmuunijärjestelmät ja tunkeutumisen havaitsemisjärjestelmät. Tutkielman toteutustapana on kirjallisuuskatsaus. Artificial intelligence (AI) has seen significant advances in the recent years. These advances and the use of new techniques with regards to cyber-attacks seem to be leading to the point where old cyber security measures are no longer adequate. By using AI-based security systems, it is possible to defend against these new threats. Desired features of these kinds of systems include adaptivity and the ability to operate in real-time. On the other hand, the use of AI-based systems is a risk per se. This bachelor’s thesis discusses artificial intelligence and its potential applications in cyber security. The aim of the thesis is to explore what is meant by artificial intelligence, and how it can be applied in the field of cyber security. The main findings are that the application of AI has some benefits, es-pecially in detecting and preventing cyber-attacks. These applications include various artificial immune systems (AIS) and intrusion detection systems (IDS). The thesis was conducted as a literature review.
first_indexed 2020-12-17T21:01:24Z
format Kandityö
fullrecord [{"key": "dc.contributor.advisor", "value": "Taipalus, Toni", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Ker\u00e4nen, Oona", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-12-17T11:22:59Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-12-17T11:22:59Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/73292", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Teko\u00e4lyn harppaukset viime vuosina ja uusien tekniikoiden soveltaminen kyberhy\u00f6kk\u00e4yksiss\u00e4 ovat johtamassa siihen, ett\u00e4 vanhat keinot eiv\u00e4t en\u00e4\u00e4 riit\u00e4 hy\u00f6kk\u00e4ysten torjumiseksi. Teko\u00e4ly\u00e4 hy\u00f6dynt\u00e4vien turvaj\u00e4rjestelmien avulla voidaan suojautua uusilta uhkilta. T\u00e4rkeit\u00e4 ominaisuuksia t\u00e4llaiselle j\u00e4rjestelm\u00e4lle ovat adaptiivisuus ja kyky toimia reaaliaikaisesti. Toisaalta teko\u00e4lyn k\u00e4ytt\u00f6\u00f6n itsess\u00e4\u00e4n liittyy my\u00f6s riskej\u00e4 ja sit\u00e4 voidaan k\u00e4ytt\u00e4\u00e4 haitallisiin tarkoituksiin. T\u00e4ss\u00e4 tutkielmassa pyrit\u00e4\u00e4n selvitt\u00e4m\u00e4\u00e4n, mit\u00e4 teko\u00e4lyll\u00e4 tarkoitetaan ja kuinka sit\u00e4 voidaan hy\u00f6dynt\u00e4\u00e4 kyberturvallisuudessa. Tutkielman keskeisimpin\u00e4 tuloksina ovat teko\u00e4lyn soveltamisella turvallisuusuhkien havaitsemisessa ja torjumisessa saatavat hy\u00f6dyt. N\u00e4it\u00e4 sovelluskohteita ovat esimerkiksi erilaiset keinoimmuunij\u00e4rjestelm\u00e4t ja tunkeutumisen havaitsemisj\u00e4rjestelm\u00e4t. Tutkielman toteutustapana on kirjallisuuskatsaus.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Artificial intelligence (AI) has seen significant advances in the recent years. These advances and the use of new techniques with regards to cyber-attacks seem to be leading to the point where old cyber security measures are no longer adequate. By using AI-based security systems, it is possible to defend against these new threats. Desired features of these kinds of systems include adaptivity and the ability to operate in real-time. On the other hand, the use of AI-based systems is a risk per se. This bachelor\u2019s thesis discusses artificial intelligence and its potential applications in cyber security. The aim of the thesis is to explore what is meant by artificial intelligence, and how it can be applied in the field of cyber security. The main findings are that the application of AI has some benefits, es-pecially in detecting and preventing cyber-attacks. These applications include various artificial immune systems (AIS) and intrusion detection systems (IDS). The thesis was conducted as a literature review.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2020-12-17T11:22:59Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-12-17T11:22:59Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "23", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "syv\u00e4oppiminen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberuhkat", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberhy\u00f6kk\u00e4ykset", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Teko\u00e4lyn sovelluskohteet kyberturvallisuudessa", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202012177228", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "teko\u00e4ly", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "koneoppiminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "neuroverkot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "The author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival workstation at Jyv\u00e4skyl\u00e4 University Library (https://kirjasto.jyu.fi/en/workspaces/facilities).", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Tekij\u00e4 ei ole antanut lupaa avoimeen julkaisuun, joten aineisto on luettavissa vain Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6semalta. Ks. https://kirjasto.jyu.fi/fi/tyoskentelytilat/laitteet-ja-tilat..", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}]
id jyx.123456789_73292
language fin
last_indexed 2025-02-18T10:55:31Z
main_date 2020-01-01T00:00:00Z
main_date_str 2020
publishDate 2020
record_format qdc
source_str_mv jyx
spellingShingle Keränen, Oona Tekoälyn sovelluskohteet kyberturvallisuudessa syväoppiminen kyberuhkat kyberhyökkäykset Tietojärjestelmätiede Information Systems Science 601 tekoäly kyberturvallisuus koneoppiminen neuroverkot
title Tekoälyn sovelluskohteet kyberturvallisuudessa
title_full Tekoälyn sovelluskohteet kyberturvallisuudessa
title_fullStr Tekoälyn sovelluskohteet kyberturvallisuudessa Tekoälyn sovelluskohteet kyberturvallisuudessa
title_full_unstemmed Tekoälyn sovelluskohteet kyberturvallisuudessa Tekoälyn sovelluskohteet kyberturvallisuudessa
title_short Tekoälyn sovelluskohteet kyberturvallisuudessa
title_sort tekoälyn sovelluskohteet kyberturvallisuudessa
title_txtP Tekoälyn sovelluskohteet kyberturvallisuudessa
topic syväoppiminen kyberuhkat kyberhyökkäykset Tietojärjestelmätiede Information Systems Science 601 tekoäly kyberturvallisuus koneoppiminen neuroverkot
topic_facet 601 Information Systems Science Tietojärjestelmätiede koneoppiminen kyberhyökkäykset kyberturvallisuus kyberuhkat neuroverkot syväoppiminen tekoäly
url https://jyx.jyu.fi/handle/123456789/73292 http://www.urn.fi/URN:NBN:fi:jyu-202012177228
work_keys_str_mv AT keränenoona tekoälynsovelluskohteetkyberturvallisuudessa