fullrecord |
[{"key": "dc.contributor.advisor", "value": "H\u00e4m\u00e4l\u00e4inen, Timo", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Frilander, Sonja", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2022-02-22T11:30:45Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2022-02-22T11:30:45Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2022", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/79887", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4n tutkielman tarkoituksena on selvitt\u00e4\u00e4 viimeaikaisimmat tietoverkko-palvelujen uhkat ja etsi\u00e4 Kali Linux-k\u00e4ytt\u00f6j\u00e4rjestelm\u00e4st\u00e4 v\u00e4lineit\u00e4 niiden tor-juntaan. Tutkielman kirjallisuuskatsauksessa keskityt\u00e4\u00e4n esittelem\u00e4\u00e4n kirjalli-suuden esiintuomia uhkia, sek\u00e4 haavoittuvuusanalyysia ja penetraatiotestausta. Edell\u00e4 mainittujen tarkoituksena on parantaa tietoverkkojen turvallisuutta. Tutkielma on tapaustutkimus, jossa k\u00e4ytet\u00e4\u00e4n konstruktiivista tutkimusotetta. Tarkoituksena on siis muodostaa ajatusrakennelma siit\u00e4 mitk\u00e4. ovat viimeai-kaisimmat uhkat ja kuinka torjua niit\u00e4 k\u00e4yt\u00e4nn\u00f6ss\u00e4 Kali Linuxin avulla. Tut-kielman tutkimus on kaksivaiheinen, ensin aiemman tutkimuksen perusteella m\u00e4\u00e4ritell\u00e4\u00e4n uhkat ja toisena, huomattua, ett\u00e4 erilaisia palvelunestohy\u00f6kk\u00e4yk-si\u00e4 mainitaan aineistossa ylivoimaisesti eniten, etsit\u00e4\u00e4n ja testataan Kali Li-nuxista ty\u00f6kaluja palvelunestohy\u00f6kk\u00e4ysten torjuntaan. T\u00e4m\u00e4n toisen vaiheen tarkoituksena on toimia analysoida ensimm\u00e4isen vaiheen l\u00f6yd\u00f6ksi\u00e4. Ty\u00f6kalut, joita testataan virtuaaliymp\u00e4rist\u00f6ss\u00e4 ovat Hping3, Metasploit framework, SlowHTTPtest ja GoldenEye. Kaksi ensimm\u00e4ist\u00e4 ty\u00f6kalua keskittyy verkko- ja kuljetuskerroksen palvelunestohy\u00f6kk\u00e4ysten simulointiin, kun taas kaksi vii-meist\u00e4 sovelluskerroksen HTTP-protokollan heikkouksia k\u00e4ytt\u00e4vien hy\u00f6kk\u00e4ys-ten simulointiin. Tutkielman loppup\u00e4\u00e4telm\u00e4n\u00e4 voidaan todeta, ett\u00e4 Kali Linux tarjoaa hyvi\u00e4 mahdollisuuksia simuloida sovelluskerroksen HTTP-protokollan heikkouksia k\u00e4ytt\u00e4vi\u00e4 palvelunestohy\u00f6kk\u00e4yksi\u00e4 \u2013 ja siten my\u00f6s torjua niit\u00e4, sen sijaan verkko- ja kuljetuskerroksen hy\u00f6kk\u00e4ysten simuloinnista tarvitaan lis\u00e4tutkimusta.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This master thesis concentrates on the latest threats of network services and how to prevent those threats with the help of Kali Linux platform. The litera-ture review of the study reviews the threats and introduces the vulnerability analysis and penetration testing for the reader. The purpose of the previous mentioned two is to reduce the risk of the threats. This is a case-study with constructive research approach, where the idea is to formulate a construction of the latest threats and how in practice diminish those threats with the help of Kali Linux. The research of the study has two steps. First step is two find out the latest threat, these are based on the previous research. In the second step, the results of the first steps are analysed. The purpose is to look for and test the tools found from Kali Linux. The used tools aim to simulate denial-of-service attacks in the virtual environment. The tools chosen for the test are Hping3, Metasploit framework, SlowHTTPtest and GoldenEye. The first two tools sim-ulate the denial-of-service attacks on network and transport layers, while the latter two simulate the denial-of-service attacks on the application layer. In conclusion can be said that Kali Linux platform provides suitable tools to simu-late application layer attacks that target on the weakness of the HTTP -protocol. However, the tools for network- and transport layer denial-of-service attack simulation requires further research.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2022-02-22T11:30:45Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2022-02-22T11:30:45Z (GMT). No. of bitstreams: 0\n Previous issue date: 2022", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "99", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoverkkopalvelut", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoverkkopalvelujen uhkat", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Kali Linux", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "penetraatiotes-taus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "palvelunestohy\u00f6kk\u00e4ys", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "hajautettu palvelunestohy\u00f6kk\u00e4ys", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Palvelunestohy\u00f6kk\u00e4ykset ja kuinka Kali Linux pystyy niihin vastaamaan?", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202202221623", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoverkot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Linux", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "verkkopalvelut", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "palvelimet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "torjunta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "The author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival workstation at Jyv\u00e4skyl\u00e4 University Library (https://kirjasto.jyu.fi/collections/archival-workstation).", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Tekij\u00e4 ei ole antanut lupaa avoimeen julkaisuun, joten aineisto on luettavissa vain Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6semalta. Ks. https://kirjasto.jyu.fi/kokoelmat/arkistotyoasema..", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|