Ohjelmisto-ohjatut verkot ja tunkeutumisen havainnointijärjestelmät
Authors
Date
2017Access restrictions
This material has a restricted access due to copyright reasons. It can be read at the workstation at Jyväskylä University Library reserved for the use of archival materials: https://kirjasto.jyu.fi/en/workspaces/facilities.
Tässä pro gradu -tutkielmassa tutkitaan ohjelmisto ohjattuja verkkojen kontrollerin ja hyökkäyksen havainnoin järjestelmien yhdessä toimimista, ja Mininet verkko emulaattorin asentamista ja käyttämistä. Tutkielmassa raapaistaan pintaa laajojen ohjelmisto ohjattujen verkkojen kontrollerien ja hyökkäyksien havaitsemisjärjestelmien alustoille. Tulosten avulla saadaan myös esille se, että kuinka merkittävää on ohjelmistojen jatkuva ylläpito, kun alustat vanhenevat mm. Java versioinnin vanheneminen eli hyvätkään ohjelmat eivät ole ikuisia, jos niiden kehittäminen lakkautetaan. Software defined networking and intrusion detection systems.
This Master's Thesis examines software defined network controller and Intrusion Detection Systems working together, and Mininet network emulator installation and use. The thesis explores the surface of extensive software on the platforms of wired network controllers and attack detection systems. The results also show how significant the continuous maintenance of the software is when the platforms are aging, for example. Expiration of the Java version. So even the programs are not eternal if their development is abolished.
Keywords
Metadata
Show full item recordCollections
- Pro gradu -tutkielmat [29556]
Related items
Showing items with similar title or keywords.
-
Anomaly-based online intrusion detection system as a sensor for cyber security situational awareness system
Kokkonen, Tero (University of Jyväskylä, 2016)Almost all the organisations and even individuals rely on complex structures of data networks and networked computer systems. That complex data ensemble, the cyber domain, provides great opportunities, but at the same ... -
SDN controllers security issues
Imran, Ayesha (2017)Software-Defined Networking (SDN) is essentially varying the way we design and manage networks, which makes a communication network programmable. In SDN, a logically centralized controller has straight control over the ... -
Unsupervised network intrusion detection systems for zero-day fast-spreading network attacks and botnets
Vahdani Amoli, Payam (University of Jyväskylä, 2015)Today, the occurrence of zero-day and complex attacks in high-speed networks is increasingly common due to the high number vulnerabilities in the cyber world. As a result, intrusions become more sophisticated and fast ... -
Dimensionality reduction framework for detecting anomalies from network logs
Sipola, Tuomo; Juvonen, Antti; Lehtonen, Joel (CRL Publishing, 2012)Dynamic web services are vulnerable to multitude of intrusions that could be previously unknown. Server logs contain vast amounts of information about network traffic, and finding attacks from these logs improves the ... -
Combining conjunctive rule extraction with diffusion maps for network intrusion detection
Juvonen, Antti; Sipola, Tuomo (IEEE, 2013)Network security and intrusion detection are important in the modern world where communication happens via information networks. Traditional signature-based intrusion detection methods cannot find previously unknown ...