Tunkeutumisen laajentamisen havaitseminen koneoppimisella

Tunkeutumisen laajentaminen on kyberhyökkäyksen vaihe, jossa hyökkääjä laajentaa saamaansa jalansijaansa kohdeympäristössä hankkimalla haltuunsa lisää käyttäjätunnuksia ja koneita. Tämä tutkielma määrittelee mitä tunkeutumisen laajentaminen on sekä esittelee koneoppimisen menetelmiä, joilla sitä voi...

Full description

Bibliographic Details
Main Author: Anttilainen, Jani
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Bachelor's thesis
Language:fin
Published: 2024
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/93067
_version_ 1826225796655611905
author Anttilainen, Jani
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Anttilainen, Jani Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Anttilainen, Jani Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Anttilainen, Jani
datasource_str_mv jyx
description Tunkeutumisen laajentaminen on kyberhyökkäyksen vaihe, jossa hyökkääjä laajentaa saamaansa jalansijaansa kohdeympäristössä hankkimalla haltuunsa lisää käyttäjätunnuksia ja koneita. Tämä tutkielma määrittelee mitä tunkeutumisen laajentaminen on sekä esittelee koneoppimisen menetelmiä, joilla sitä voidaan havaita. Parhaimmillaan koneoppimisen luokittelijoilla pystytään tunnistamaan tunkeutumisen laajentaminen lähes aina. Malicious lateral movement is a phase in a cyber attack where the attacker extends their foothold in the target environment by acquiring additional user credentials and machines. This thesis defines what malicious lateral movement is and explores methods for detecting it with machine learning techniques. Classifier models based on machine learning exhibit the potential to identify lateral movement consistently.
first_indexed 2024-09-11T08:50:31Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Tiihonen, Timo", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Anttilainen, Jani", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-01-26T06:29:39Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-01-26T06:29:39Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/93067", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tunkeutumisen laajentaminen on kyberhy\u00f6kk\u00e4yksen vaihe, jossa hy\u00f6kk\u00e4\u00e4j\u00e4\nlaajentaa saamaansa jalansijaansa kohdeymp\u00e4rist\u00f6ss\u00e4 hankkimalla haltuunsa lis\u00e4\u00e4 k\u00e4ytt\u00e4j\u00e4tunnuksia\nja koneita. T\u00e4m\u00e4 tutkielma m\u00e4\u00e4rittelee mit\u00e4 tunkeutumisen laajentaminen on sek\u00e4\nesittelee koneoppimisen menetelmi\u00e4, joilla sit\u00e4 voidaan havaita. Parhaimmillaan koneoppimisen\nluokittelijoilla pystyt\u00e4\u00e4n tunnistamaan tunkeutumisen laajentaminen l\u00e4hes aina.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Malicious lateral movement is a phase in a cyber attack where the attacker extends\ntheir foothold in the target environment by acquiring additional user credentials and\nmachines. This thesis defines what malicious lateral movement is and explores methods for\ndetecting it with machine learning techniques. Classifier models based on machine learning\nexhibit the potential to identify lateral movement consistently.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2024-01-26T06:29:39Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-01-26T06:29:39Z (GMT). No. of bitstreams: 0\n Previous issue date: 2024", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "24", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "tunkeutumisen laajentaminen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "APT", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Tunkeutumisen laajentamisen havaitseminen koneoppimisella", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202401261555", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "verkkohy\u00f6kk\u00e4ykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "koneoppiminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoj\u00e4rjestelm\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_93067
language fin
last_indexed 2025-02-18T10:56:29Z
main_date 2024-01-01T00:00:00Z
main_date_str 2024
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/5435dc0e-1723-47d8-99be-3a9ccd2805aa\/download","text":"URN:NBN:fi:jyu-202401261555.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2024
record_format qdc
source_str_mv jyx
spellingShingle Anttilainen, Jani Tunkeutumisen laajentamisen havaitseminen koneoppimisella tunkeutumisen laajentaminen APT Tietotekniikka Mathematical Information Technology 602 verkkohyökkäykset koneoppiminen tietojärjestelmät
title Tunkeutumisen laajentamisen havaitseminen koneoppimisella
title_full Tunkeutumisen laajentamisen havaitseminen koneoppimisella
title_fullStr Tunkeutumisen laajentamisen havaitseminen koneoppimisella Tunkeutumisen laajentamisen havaitseminen koneoppimisella
title_full_unstemmed Tunkeutumisen laajentamisen havaitseminen koneoppimisella Tunkeutumisen laajentamisen havaitseminen koneoppimisella
title_short Tunkeutumisen laajentamisen havaitseminen koneoppimisella
title_sort tunkeutumisen laajentamisen havaitseminen koneoppimisella
title_txtP Tunkeutumisen laajentamisen havaitseminen koneoppimisella
topic tunkeutumisen laajentaminen APT Tietotekniikka Mathematical Information Technology 602 verkkohyökkäykset koneoppiminen tietojärjestelmät
topic_facet 602 APT Mathematical Information Technology Tietotekniikka koneoppiminen tietojärjestelmät tunkeutumisen laajentaminen verkkohyökkäykset
url https://jyx.jyu.fi/handle/123456789/93067 http://www.urn.fi/URN:NBN:fi:jyu-202401261555
work_keys_str_mv AT anttilainenjani tunkeutumisenlaajentamisenhavaitseminenkoneoppimisella