fullrecord |
[{"key": "dc.contributor.advisor", "value": "Lakanen, Antti-Jussi", "language": "", "element": "contributor", "schema": "dc", "qualifier": "advisor"}, {"key": "dc.contributor.author", "value": "Toppi, Samuli", "language": "", "element": "contributor", "schema": "dc", "qualifier": "author"}, {"key": "dc.date.accessioned", "value": "2024-05-16T06:54:01Z", "language": null, "element": "date", "schema": "dc", "qualifier": "accessioned"}, {"key": "dc.date.available", "value": "2024-05-16T06:54:01Z", "language": null, "element": "date", "schema": "dc", "qualifier": "available"}, {"key": "dc.date.issued", "value": "2024", "language": "", "element": "date", "schema": "dc", "qualifier": "issued"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/94878", "language": null, "element": "identifier", "schema": "dc", "qualifier": "uri"}, {"key": "dc.description.abstract", "value": "DDoS-hy\u00f6kk\u00e4ykset est\u00e4v\u00e4t k\u00e4ytt\u00e4jien p\u00e4\u00e4syn jaettuihin palveluihin, ja ne toteutetaan useasti hajautetun IoT-laiteverkon avulla. IoT-laitteiden tietoturva on puutteellinen, joten hy\u00f6kk\u00e4\u00e4j\u00e4t hy\u00f6dynt\u00e4v\u00e4t niit\u00e4 DDoS-hy\u00f6kk\u00e4ysten toteuttamiseen. Tutkielmassa tarkastellaan kone- ja syv\u00e4oppimisen k\u00e4ytt\u00f6\u00e4 DDoS-hy\u00f6kk\u00e4ysten havaitsemisessa ja torjunnassa IoT-ymp\u00e4rist\u00f6ss\u00e4. Kone- ja syv\u00e4oppimismenetelmi\u00e4 k\u00e4ytet\u00e4\u00e4n tunkeutumisen havaitsemisj\u00e4rjestelmien rakentamisessa.", "language": "fi", "element": "description", "schema": "dc", "qualifier": "abstract"}, {"key": "dc.description.abstract", "value": "DDoS attacks deny users access to shared services and are often carried out using a distributed network of IoT devices. The security of IoT devices is inadequate, so attackers exploit them to carry out DDoS attacks. The thesis examines the use of machine- and deep learning in detecting and mitigating DDoS attacks in an IoT environment. Machine- and deep learning methods are used to build intrusion detection systems.", "language": "en", "element": "description", "schema": "dc", "qualifier": "abstract"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2024-05-16T06:54:01Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "schema": "dc", "qualifier": "provenance"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-05-16T06:54:01Z (GMT). No. of bitstreams: 0\n Previous issue date: 2024", "language": "en", "element": "description", "schema": "dc", "qualifier": "provenance"}, {"key": "dc.format.extent", "value": "30", "language": "", "element": "format", "schema": "dc", "qualifier": "extent"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "schema": "dc", "qualifier": "iso"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "schema": "dc", "qualifier": null}, {"key": "dc.subject.other", "value": "palvelunestohy\u00f6kk\u00e4ykset", "language": "", "element": "subject", "schema": "dc", "qualifier": "other"}, {"key": "dc.subject.other", "value": "DDoS", "language": "", "element": "subject", "schema": "dc", "qualifier": "other"}, {"key": "dc.subject.other", "value": "bottiverkko", "language": "", "element": "subject", "schema": "dc", "qualifier": "other"}, {"key": "dc.subject.other", "value": "IDS", "language": "", "element": "subject", "schema": "dc", "qualifier": "other"}, {"key": "dc.title", "value": "Kone- ja syv\u00e4oppiminen IoT-laitteiden DDoS-hy\u00f6kk\u00e4yksiss\u00e4", "language": "", "element": "title", "schema": "dc", "qualifier": null}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "schema": "dc", "qualifier": null}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202405163647", "language": "", "element": "identifier", "schema": "dc", "qualifier": "urn"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "schema": "dc", "qualifier": "ontasot"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "schema": "dc", "qualifier": "ontasot"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "schema": "dc", "qualifier": "faculty"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "schema": "dc", "qualifier": "faculty"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "schema": "dc", "qualifier": "department"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "schema": "dc", "qualifier": "department"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "schema": "dc", "qualifier": "organization"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "schema": "dc", "qualifier": "organization"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "schema": "dc", "qualifier": "discipline"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "schema": "dc", "qualifier": "discipline"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "schema": "yvv", "qualifier": "funding"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "schema": "dc", "qualifier": "coar"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "schema": "dc", "qualifier": "accesslevel"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "schema": "dc", "qualifier": "publication"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "schema": "dc", "qualifier": "oppiainekoodi"}, {"key": "dc.subject.yso", "value": "esineiden internet", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "tietotekniikka", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "tietoverkot", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "tieto- ja viestint\u00e4tekniikka", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "koneoppiminen", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "syv\u00e4oppiminen", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "schema": "dc", "qualifier": "url"}, {"key": "dc.description.accessibilityfeature", "value": "unknown accessibility", "language": "en", "element": "description", "schema": "dc", "qualifier": "accessibilityfeature"}, {"key": "dc.description.accessibilityfeature", "value": "ei tietoa saavutettavuudesta", "language": "fi", "element": "description", "schema": "dc", "qualifier": "accessibilityfeature"}]
|