fullrecord |
[{"key": "dc.contributor.advisor", "value": "Sepp\u00e4nen, Ville", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Alaper\u00e4, Johannes", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-03-27T07:04:08Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-03-27T07:04:08Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2023", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/86118", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Esineiden internet on noussut suureksi ilmi\u00f6ksi ja se jatkaa kasvamista. T\u00e4m\u00e4 kasvu tuo mukanaan my\u00f6s uusia haasteita esineiden internetin kyberturvallisuudelle. Esineiden internetin kyberturvallisuuden suuret puutteet vaativat uudenlaisia ja tehokkaita ratkaisuja. T\u00e4m\u00e4n kandidaattitutkielman tarkoituksena on systemaattisen kirjallisuuskatsauksen avulla tarkastella koneoppimisen algoritmien ja mallien mahdollisuuksia esineiden internetin kyberturvallisuuden kehitt\u00e4miseen sek\u00e4 parantamiseen ja luoda kokonaiskuva koneoppimisen sovelluksen esineiden internetin kyberturvallisuuden ratkaisuissa. Tutkielmassa esitell\u00e4\u00e4n erilaisia koneoppimisen menetelmi\u00e4, joilla yritet\u00e4\u00e4n vastata mahdollisilla ratkaisuilla esineiden internetin esitetyille kyberturvallisuushaasteille ja -ongelmille. Opinn\u00e4ytety\u00f6 perehtyy my\u00f6s koneopin menetelmien kohtaamiin ongelmiin niit\u00e4 sovellettaessa esineiden internetin j\u00e4rjestelmiin ja laitteisiin. Tutkielma esitt\u00e4\u00e4 esineiden internetin k\u00e4sitteen ja sen eri kerrokset, sek\u00e4 esineiden internetin kohtaamat kyberhy\u00f6kk\u00e4ystyypit ja ainutlaatuiset haasteet kyberturvallisuuden varmistamisessa. Koneoppimisen menetelmien k\u00e4yt\u00f6n suurimpia kyberturvallisuusetuja esineiden internetiss\u00e4 ovat sen kyky k\u00e4sitell\u00e4 esineiden internetin tuottamaa massiivista datam\u00e4\u00e4r\u00e4\u00e4 ja luoda siit\u00e4 \u00e4lykk\u00e4\u00e4sti keinoja havaita tunkeutumisia esineiden internetin j\u00e4rjestelmiss\u00e4 ja ennaltaehk\u00e4ist\u00e4 niiden mahdollisuutta aiheuttaa laajamittaista h\u00e4iri\u00f6t\u00e4 esineiden internetin toiminnassa, ja herkk\u00e4luonteisen sek\u00e4 yksityisen datan p\u00e4\u00e4semist\u00e4 hy\u00f6kk\u00e4\u00e4jien ja tuntemattomien osapuolten k\u00e4siin.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The Internet of Things has become a massive phenomenon that keeps growing. This growth brings about new challenges for the cybersecurity of the Internet of Things. The vastly lacking security on the Internet of Things means new and efficient solutions are required. The aim of this bachelor\u2019s thesis is to inspect and create an overview of the possibilities to develop and improve the cybersecurity of the Internet of Things with machine learning methods through a systematic literature review. This literature review presents different machine learning methods to try to answer the challenges and problems that the Internet of Things face through possible solutions. The dissertation also delves into the problems faced when applying machine learning methods to the Internet of Things. The literature review defines the concept of the Internet of Things, its\u2019 the different layers, the different types of cybersecurity attacks that the Internet of Things faces, and the unique challenges of ensuring the cybersecurity for the Internet of Things. The greatest advantages of the methods of machine learning in the Internet of Things is how it\u2019s able to process massive amounts of the data generated by the Internet of Things and use it to create intelligent ways of detecting intrusions in Internet of Things systems and prevent the possibility of them causing widespread disturbance of the functionality of the Internet of Things as well as to prevent sensitive and private data from getting in the hands of attackers and unknown parties.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2023-03-27T07:04:08Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-03-27T07:04:08Z (GMT). No. of bitstreams: 0\n Previous issue date: 2023", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "39", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberhy\u00f6kk\u00e4ys", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Koneoppimisen mahdollisuudet esineiden internetin kyberturvallisuuden kehitt\u00e4misess\u00e4", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202303272266", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "esineiden internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "koneoppiminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|