fullrecord |
[{"key": "dc.contributor.advisor", "value": "Clements, Kati", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Suvilehto, Oskari", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-12-23T10:52:48Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-12-23T10:52:48Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/99205", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Hajautetut palveluestohy\u00f6kk\u00e4ykset eli DDoS-hy\u00f6kk\u00e4ykset pystyv\u00e4t aiheuttamaan merkitt\u00e4vi\u00e4 vahinkoja, kun palvelujen tai laitteiden toimintakyky estet\u00e4\u00e4n ruuhkauttamalla verkkoliikenne. Ongelmana t\u00e4ss\u00e4 on, ett\u00e4 perinteiset DDoS havaitsemismenetelm\u00e4t eiv\u00e4t riit\u00e4 en\u00e4\u00e4 uusiin mukautuviin hy\u00f6kk\u00e4yksiin. T\u00e4m\u00e4n tutkielman tarkoituksena oli l\u00f6yt\u00e4\u00e4 k\u00e4ytt\u00e4en t\u00e4m\u00e4n p\u00e4iv\u00e4n kehittynytt\u00e4 teko\u00e4ly\u00e4 mahdollisiin ratkaisuihin havaita DDoS-hy\u00f6kk\u00e4yksi\u00e4. Tutkielma oli toteutettu kirjallisuuskatsauksena, jossa hy\u00f6dynnetty alan tieteellisi\u00e4 artikkeleita ja kirjallisuutta. Kirjallisuuskatsauksessa ratkaisuna tutkimusongelmaan l\u00f6ytyi erilaisia teko\u00e4lymenetelmi\u00e4, joita pystyt\u00e4\u00e4n k\u00e4ytt\u00e4m\u00e4\u00e4n DDoS-hy\u00f6kk\u00e4ysten havaitsemiseen. Osa k\u00e4sitellyist\u00e4 menetelmist\u00e4 pystyi hyvin tarkkoihin tuloksiin. T\u00e4rke\u00e4\u00e4 on kumminkin huomioida oikeanlaisen menetelm\u00e4n valikointi, jotta voidaan p\u00e4\u00e4st\u00e4 tarpeeksi tarkkaan tulokseen DDoS-hy\u00f6kk\u00e4ysten havaitsemiseen. Tutkimus korosti, ett\u00e4 teko\u00e4lymenetelmien onnistunut toiminta edellytt\u00e4\u00e4 riitt\u00e4v\u00e4n ajantasaisen opetusdatan hy\u00f6dynt\u00e4mist\u00e4, jotta n\u00e4m\u00e4 menetelm\u00e4t voivat torjua my\u00f6s uusia ja kehittyneempi\u00e4 DDoS-hy\u00f6kk\u00e4yksi\u00e4.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Distributed Denial of Service attacks, or DDoS attacks, can cause significant damage by disrupting the functionality of services or devices through network traffic congestion. The problem lies in the fact that traditional DDoS detection methods are no longer sufficient to counter new, adaptive attacks. The purpose of this thesis was to explore potential solutions for detecting DDoS attacks using today\u2019s advanced artificial intelligence. The study was conducted as a literature review, utilizing scientific articles and literature from the field. In the literature review, various artificial intelligence methods were found as a solution to the research problem, which can be used to detect DDoS attacks. As solutions, various artificial intelligence methods can be used to detect DDoS attacks. Some of the methods reviewed demonstrated very high levels of accuracy. However, it is important to consider selecting method in order to achieve a sufficiently accurate result for detecting DDoS attacks. The study highlighted that the successful performance of AI methods relies on utilizing sufficiently up-to-date training data to ensure these methods can also counter new and more advanced DDoS attacks.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2024-12-23T10:52:48Z\r\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-12-23T10:52:48Z (GMT). No. of bitstreams: 0\r\n Previous issue date: 2024", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "21", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "DDoS", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "hajautettu palvelunestohy\u00f6kk\u00e4ys", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Teko\u00e4lyn hy\u00f6dynt\u00e4minen hajautettujen palveluestohy\u00f6kk\u00e4ysten havaitsemisessa", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202412238008", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": null, "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": null, "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "teko\u00e4ly", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "algoritmit", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|