Palvelunestohyökkäysten toiminta ja torjunta

Tässä tutkielmassa perehdytään palvelunestohyökkäyksiin ja niiden eri hyökkäys- ja torjuntakeinoihin. Tutkielman tavoitteena on antaa lukijalle yleiskuva palvelunestohyökkäyksistä ja niiden toiminnasta. Tutkielmassa esitellään protokollapinon mukaisesti ensin kuljetus- ja verkkokerroksen hyökkäys- j...

Full description

Bibliographic Details
Main Author: Ojanen, Arttu
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Bachelor's thesis
Language:fin
Published: 2024
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/94830
_version_ 1826225795560898560
author Ojanen, Arttu
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Ojanen, Arttu Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Ojanen, Arttu Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Ojanen, Arttu
datasource_str_mv jyx
description Tässä tutkielmassa perehdytään palvelunestohyökkäyksiin ja niiden eri hyökkäys- ja torjuntakeinoihin. Tutkielman tavoitteena on antaa lukijalle yleiskuva palvelunestohyökkäyksistä ja niiden toiminnasta. Tutkielmassa esitellään protokollapinon mukaisesti ensin kuljetus- ja verkkokerroksen hyökkäys- ja torjuntakeinoja. Tämän jälkeen esitellään myös sovelluskerroksen hyökkäys- ja torjuntakeinoja. This thesis aims to provide an overview of denial of service attacks and defense methods available against them. Attack and defense methods are presented according to the protocol stack, starting from network/transport layer flooding attacks and defense methods. Afterwards, application layer attack and defense methods are showcased.
first_indexed 2024-05-15T20:04:39Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Lakanen, Antti-Jussi", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Ojanen, Arttu", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-05-15T07:04:45Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-05-15T07:04:45Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/94830", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4ss\u00e4 tutkielmassa perehdyt\u00e4\u00e4n palvelunestohy\u00f6kk\u00e4yksiin ja niiden eri hy\u00f6kk\u00e4ys- ja torjuntakeinoihin. Tutkielman tavoitteena on antaa lukijalle yleiskuva palvelunestohy\u00f6kk\u00e4yksist\u00e4 ja niiden toiminnasta. Tutkielmassa esitell\u00e4\u00e4n protokollapinon mukaisesti ensin kuljetus- ja verkkokerroksen hy\u00f6kk\u00e4ys- ja torjuntakeinoja. T\u00e4m\u00e4n j\u00e4lkeen esitell\u00e4\u00e4n my\u00f6s sovelluskerroksen hy\u00f6kk\u00e4ys- ja torjuntakeinoja.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This thesis aims to provide an overview of denial of service attacks and defense methods available against them. Attack and defense methods are presented according to the protocol stack, starting from network/transport layer flooding attacks and defense methods. Afterwards, application layer attack and defense methods are showcased.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2024-05-15T07:04:45Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-05-15T07:04:45Z (GMT). No. of bitstreams: 0\n Previous issue date: 2024", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "21", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Palvelunestohy\u00f6kk\u00e4ysten toiminta ja torjunta", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202405153601", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "verkkohy\u00f6kk\u00e4ykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoliikenne", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_94830
language fin
last_indexed 2025-02-18T10:54:05Z
main_date 2024-01-01T00:00:00Z
main_date_str 2024
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/f58af819-fc44-451c-8ea4-d19bd2de03d5\/download","text":"URN:NBN:fi:jyu-202405153601.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2024
record_format qdc
source_str_mv jyx
spellingShingle Ojanen, Arttu Palvelunestohyökkäysten toiminta ja torjunta Tietotekniikka Mathematical Information Technology 602 verkkohyökkäykset Internet tietoturva tietoliikenne
title Palvelunestohyökkäysten toiminta ja torjunta
title_full Palvelunestohyökkäysten toiminta ja torjunta
title_fullStr Palvelunestohyökkäysten toiminta ja torjunta Palvelunestohyökkäysten toiminta ja torjunta
title_full_unstemmed Palvelunestohyökkäysten toiminta ja torjunta Palvelunestohyökkäysten toiminta ja torjunta
title_short Palvelunestohyökkäysten toiminta ja torjunta
title_sort palvelunestohyökkäysten toiminta ja torjunta
title_txtP Palvelunestohyökkäysten toiminta ja torjunta
topic Tietotekniikka Mathematical Information Technology 602 verkkohyökkäykset Internet tietoturva tietoliikenne
topic_facet 602 Internet Mathematical Information Technology Tietotekniikka tietoliikenne tietoturva verkkohyökkäykset
url https://jyx.jyu.fi/handle/123456789/94830 http://www.urn.fi/URN:NBN:fi:jyu-202405153601
work_keys_str_mv AT ojanenarttu palvelunestohyökkäystentoimintajatorjunta