fullrecord |
[{"key": "dc.contributor.advisor", "value": "Vuorinen, Jukka", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Kettunen, Atte", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-06-05T06:16:37Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-06-05T06:16:37Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/95518", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Kalasteluhuijaukset ovat yksi nykyajan vaarallisimmista kyberrikollisuuden muodoista. Kalasteluhuijaus on matalan kynnyksen kyberhy\u00f6kk\u00e4ys, jolla kohteelta voidaan huijata arkaluontoisia ja luottamuksellisia tietoja. Kalasteluhuijausten tunnistamiseen on kehitetty erilaisia ty\u00f6kaluja, joiden avulla k\u00e4ytt\u00e4j\u00e4 voi tunnistaa mahdollisia kalasteluhuijauksia. T\u00e4ss\u00e4 kandidaatintutkielmassa tutkitaan teko\u00e4lymallien hy\u00f6dynt\u00e4mist\u00e4 kalasteluhuijausten tunnistamisessa. Tutkielmassa keskityt\u00e4\u00e4n erityisesti kalasteluhuijausten verkkosivustojen tunnistamiseen niiden URL-osoitteen ja sis\u00e4ll\u00f6n perusteella. Tutkimuksen tarkoituksena on arvioida teko\u00e4lymallien tuomia hy\u00f6tyj\u00e4, sek\u00e4 niiden k\u00e4ytt\u00f6\u00f6n liittyvi\u00e4 haasteita kalasteluhuijausten tunnistamisessa. Tutkielma on toteutettu kirjallisuuskatsauksena. Kirjallisuus koostuu vertaisarvioiduista tutkielmista, kirjoista ja artikkeleista. Tutkielman perusteella teko\u00e4lymallien avulla kalasteluhuijausten tunnistamisen ty\u00f6kaluista voidaan tehd\u00e4 k\u00e4ytt\u00e4jien silmiss\u00e4 luotettavampia. Teko\u00e4lymalleja hy\u00f6dynt\u00e4m\u00e4ll\u00e4 tunnistamisen ty\u00f6kaluista saadaan tarkempia ja laadukkaampia. Teko\u00e4lymallien avulla voidaan my\u00f6s auttaa k\u00e4ytt\u00e4j\u00e4\u00e4 ymm\u00e4rt\u00e4m\u00e4\u00e4n ty\u00f6kalujen toimintaa paremmin, mik\u00e4 parantaa niiden k\u00e4ytett\u00e4vyytt\u00e4. Teko\u00e4lymallien suuret laskentakustannukset, ep\u00e4varma tietoturvallisuus, sek\u00e4 puutteellinen kyky sopeutua erilaisiin kalasteluhuijauksiin taas ovat esimerkkej\u00e4 n\u00e4ihin malleihin liittyvist\u00e4 ongelmista. Tutkimuksessa keskustellaan my\u00f6s k\u00e4ytt\u00e4j\u00e4n roolista kalasteluhuijausten torjumisessa. On huomattava, ett\u00e4 pelk\u00e4ll\u00e4 teknologialla ja tunnistamisen ty\u00f6kaluilla kalasteluhuijauksia ei koskaan voida v\u00e4ltt\u00e4\u00e4 t\u00e4ydellisesti.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Phishing attacks are one of the most dangerous forms of cybercrime. Phishing is an easily executable attack aimed at deceiving the target into revealing sensitive or confidential information. Various tools have been developed for phishing detection, so that users can identify phishing attempts more easily. This bachelor\u2019s thesis explores the utilization of artificial intelligence models in phishing detection. The thesis particularly focuses on identifying phishing websites based on their URL-address and content. The aim of this thesis is to assess the benefits and challenges related to using artificial intelligence in phishing detection. The thesis is conducted as a literature review. The literature in this thesis is comprised of peer reviewed articles and theses, gathered from various databases. Based on this literature, artificial intelligence models can improve the reliability of phishing detection tools in the eyes of the users. Artificial intelligence models can enhance the accuracy and quality of these tools. Artificial intelligence can also be used to improve the usability of phishing de-tection tools, by providing insights on classifications made between phishing- and legitimate websites. This in part improves the user experience and reliability of phishing detection tools. On the other hand, the thesis explores potential downsides in using artificial intelligence for this purpose. The high computa-tional costs, uncertainty around information security and limited capability to adapt to different phishing techniques are examples of these downsides. The study also discusses the role of users in combatting phishing attacks. It is essential to note that technology and detection tools by themselves will never be able to eliminate phishing.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2024-06-05T06:16:37Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-06-05T06:16:37Z (GMT). No. of bitstreams: 0\n Previous issue date: 2024", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "30", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kalastelu", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Teko\u00e4lymallien hy\u00f6dynt\u00e4minen kalasteluhuijaussivustojen tunnistamisen ty\u00f6kaluissa", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202406054279", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "verkkourkinta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "koneoppiminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "syv\u00e4oppiminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "teko\u00e4ly", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberrikollisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "huijaus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|