Skip to main content
Login | Suomeksi | På svenska | In English

Browsing by Subject "security"

Sort by: Order: Results:

  • Kahilakoski, Marko (2022)
    Various Denial of Service (DoS) attacks are common phenomena in the Internet. They can consume resources of servers, congest networks, disrupt services, or even halt systems. There are many machine learning approaches that attempt to detect and prevent attacks on multiple levels of abstraction. This thesis examines and reports different aspects of creating and using a dataset for machine learning purposes to detect attacks in a web server environment. We describe the problem field, origins and reasons behind the attacks, typical characteristics, and various types of attacks. We detail ways to mitigate the attacks and provide a review of current benchmark datasets. For the dataset used in this thesis, network traffic was captured in a real-world setting, and flow records were labeled. Experiments performed include selecting important features, comparing two supervised learning algorithms, and observing how a classifier model trained on network traffic on a specific date performs in detecting new malicious records over time in the same environment. The model was also tested with a recent benchmark dataset.
  • Virtanen, Lasse (2023)
    The multi-armed bandit is a sequential decision making problem where an agent chooses actions and receives rewards. The agent faces an explore-exploit dilemma: it has to balance exploring its options to find the optimal actions, and exploiting choosing the empirically best actions. This problem can also be solved by multiple agents who collaborate in a federated learning setting, where agents do not share their raw data samples. Instead, small updates containing learned parameters are shared. In this setting, the learning process can happen with a central server that coordinates the agents to learn the global model, or in a fully decentralized fashion where agents communicate with each other to collaborate. The distribution of rewards may be heterogeneous, meaning that the agents face distributions with local biases. Depending on the context, this can be handled by cancelling the biases by averaging, or by personalizing the global model to fit each individual agent’s local biases. Another common characteristic of federated multi-armed bandits is preserving privacy. Even though only parameter updates are shared, they can be used to infer the original data. To privatize the data, a method known as differential privacy is applied by adding enough random noise to mask the effect of a single contribution. The newest area of interest for federated multi-armed bandits is security. Collaboration between multiple agents means more opportunities for attacks. Achieving robust security means defending against Byzantine attacks that inject arbitrary data into the learning process to affect the model accuracy in an undesirable way. This thesis is a literature review that explores how the federated multi-armed bandit problem is solved, and how privacy and security for it is achieved.
  • Ketola, Johannes (2022)
    During recent years, concerns have been expressed about foreign investors, especially state-owned enterprises, acquiring companies in Europe due to strategic motives. In October 2020, Regulation (EU) 2019/452 entered into force, establishing a framework for the screening of foreign direct investments into the Union. Despite these developments, foreign direct investment screening is largely left to the Member States discretion. In Finland, the Act on the Screening of Foreign Corporate Acquisitions (172/2012) applies to acquisitions of defence industry enterprises, companies that produce or supply critical products or services related to the statutory duties of Finnish authorities essential to the security of society and organisations or business undertakings that are considered critical in terms of securing functions vital to society on the basis of their field, business or commitments. Essentially, the objective of the Act is to screen, and, should a key national interest so require, restrict the transfer of influence to foreigners in the entities subject to screening. The purpose of this study consists of three elements. First, the purpose of the study is to provide a review of the EU framework for the screening of foreign direct investment and the national foreign direct investment screening mechanism. In essence, the review will thoroughly cover the key elements of the applicable EU regulation and the national act, supported by various illustrations and summaries. Secondly, the purpose of the study is to provide an analysis of the legal grounds for the screening and restriction of foreign direct investment. The analysis will cover the grounds 'security or public order' included in the EU framework, as well as the ground 'key national interest' included in the national act. Thirdly, the study will provide observations on the application of the foreign direct investment screening mechanisms. The observations will provide practical information on how the respective mechanisms have been used during recent years, as well as a time-bound account of the types of investments that have been subject to screening.
  • Ketola, Johannes (2022)
    During recent years, concerns have been expressed about foreign investors, especially state-owned enterprises, acquiring companies in Europe due to strategic motives. In October 2020, Regulation (EU) 2019/452 entered into force, establishing a framework for the screening of foreign direct investments into the Union. Despite these developments, foreign direct investment screening is largely left to the Member States discretion. In Finland, the Act on the Screening of Foreign Corporate Acquisitions (172/2012) applies to acquisitions of defence industry enterprises, companies that produce or supply critical products or services related to the statutory duties of Finnish authorities essential to the security of society and organisations or business undertakings that are considered critical in terms of securing functions vital to society on the basis of their field, business or commitments. Essentially, the objective of the Act is to screen, and, should a key national interest so require, restrict the transfer of influence to foreigners in the entities subject to screening. The purpose of this study consists of three elements. First, the purpose of the study is to provide a review of the EU framework for the screening of foreign direct investment and the national foreign direct investment screening mechanism. In essence, the review will thoroughly cover the key elements of the applicable EU regulation and the national act, supported by various illustrations and summaries. Secondly, the purpose of the study is to provide an analysis of the legal grounds for the screening and restriction of foreign direct investment. The analysis will cover the grounds 'security or public order' included in the EU framework, as well as the ground 'key national interest' included in the national act. Thirdly, the study will provide observations on the application of the foreign direct investment screening mechanisms. The observations will provide practical information on how the respective mechanisms have been used during recent years, as well as a time-bound account of the types of investments that have been subject to screening.
  • Eestilä, Sari Tuuli Kristiina (2021)
    In recent years, loneliness has been talked about in the media relatively often. There are multiple studies about harmfulness of loneliness for one's health and safety both nationally and internationally. The aim of this master's thesis is to find out how the loneliness discourse has changed in the Finnish parliamentary discussions and why. The main research questions are: How often has loneliness been brought up between the years 1980 and 2019 in the Finnish governmental documents and which actor groups and themes can be identified in the discussion. In addition, the thesis will look at by whom have the actor groups and themes been brought up. The data of this thesis are governmental documents: governmental proposals, expert opinions and debate initiatives. The used methods are both quantitative and qualitative. In the first part, the data is analyzed using quantitative content analysis, more specifically categorization. By processing the data this way, one gets an answer to the first two research questions: how often has loneliness been brought up and which actor groups and themes can be identified in the discussion. In the second part of the thesis, the findings are analyzed using narrative analysis as a qualitative method. This reveals what kind of narratives are linked to findings and in which context and by whom they have been brought up. In the third part of the thesis, there is a brief review on the wider Finnish (socio)political environment and how it might have affected the results. The most important findings in this thesis are that the loneliness discussion has increased and peaked only in the 2010s. The most often mentioned group is child loneliness. Loneliness as a subjective feeling is relatively new topic in the parliamentary discussions. It started to emerge only in the 2000s and peaked after 2015. In the 2000s, organizations used the prevention of loneliness as an argument to get funding or to justify the importance of their work. This proves that in the 2000s loneliness had become something that is considered harmful. Security is a new viewpoint in the loneliness discussion: in 2010s it has started to emerge in the media as a security problem, partly because of school shootings and radical lone operators. In the 2020, the Finnish Security and Intelligence Service (Supo) mentions that lone operators are among the biggest security threats in Finland. While the demands towards the state has increased, loneliness in the Parliament has always been talked about through something else, or as a "side effect" of another problem.
  • Eestilä, Sari Tuuli Kristiina (2021)
    In recent years, loneliness has been talked about in the media relatively often. There are multiple studies about harmfulness of loneliness for one's health and safety both nationally and internationally. The aim of this master's thesis is to find out how the loneliness discourse has changed in the Finnish parliamentary discussions and why. The main research questions are: How often has loneliness been brought up between the years 1980 and 2019 in the Finnish governmental documents and which actor groups and themes can be identified in the discussion. In addition, the thesis will look at by whom have the actor groups and themes been brought up. The data of this thesis are governmental documents: governmental proposals, expert opinions and debate initiatives. The used methods are both quantitative and qualitative. In the first part, the data is analyzed using quantitative content analysis, more specifically categorization. By processing the data this way, one gets an answer to the first two research questions: how often has loneliness been brought up and which actor groups and themes can be identified in the discussion. In the second part of the thesis, the findings are analyzed using narrative analysis as a qualitative method. This reveals what kind of narratives are linked to findings and in which context and by whom they have been brought up. In the third part of the thesis, there is a brief review on the wider Finnish (socio)political environment and how it might have affected the results. The most important findings in this thesis are that the loneliness discussion has increased and peaked only in the 2010s. The most often mentioned group is child loneliness. Loneliness as a subjective feeling is relatively new topic in the parliamentary discussions. It started to emerge only in the 2000s and peaked after 2015. In the 2000s, organizations used the prevention of loneliness as an argument to get funding or to justify the importance of their work. This proves that in the 2000s loneliness had become something that is considered harmful. Security is a new viewpoint in the loneliness discussion: in 2010s it has started to emerge in the media as a security problem, partly because of school shootings and radical lone operators. In the 2020, the Finnish Security and Intelligence Service (Supo) mentions that lone operators are among the biggest security threats in Finland. While the demands towards the state has increased, loneliness in the Parliament has always been talked about through something else, or as a "side effect" of another problem.
  • Lehtinen, Sonja (2017)
    Every four years, the U.S. presidential elections and the political campaigns are intensely followed by the media both nationally and globally. The primary elections precede the general election and are to determine who the presidential nominee of each party will be. To aid in the selection of the nominee, multiple debates are held for the candidates. This election cycle was perhaps a bit more intriguing than usual, as one of the Republican primary candidates came from outside established politics. This person was businessman Donald Trump, who challenged the political status quo with his often-provocative comments. It became evident that his unconventional style appealed to many: Trump seized the office in January of 2017. Many of the comments the Republican candidates made about immigration gained plenty of media attention. In this thesis, the focus is on the Republican candidates’ immigration-related rhetoric throughout the primary season. The goal to distinguish the discourses immigration is linked with in the debates and examine the rhetorical methods employed by the candidates as they attempt to convince and persuade their audiences on the topic of immigration. The data used in this thesis consists of twelve Republican debates arranged during the primary season. The rhetoric is examined through various rhetorical devices as well as Aristotle’s three modes of persuasion—ethos, pathos and logos. Ethos attempts to make the speaker appear trustworthy and respectable to the audience: pathos is used to appeal to the audiences’ emotions; and logos is used to appeal to the audience’s senses and intellect. The analysis method applied in this thesis is rhetorical discourse analysis. The immigration-based history of the United States, its social, racial, and ethnic composition as well as its ever-changing demographics lay a very interesting backdrop to the entire topic. The U.S. is a country built by immigrants, yet its relationship with immigration has always been difficult. Many newcomers have traditionally been disliked or even feared, be it because of their exotic appearance, their religion, or their unfamiliar language. American nativists have throughout history attempted to keep America white and Christian and rejected those who do not easily fall into these categories. Originally even Catholics were shunned. Whiteness and Christianity are two features that have long prevailed as the most depictive characteristics of the United States, even if the white population is on the decline and soon no racial group will alone form racial majority. The twelve primary debates are analyzed through rhetorical discourse analysis. The goal is to distinguish the central discourses and the rhetoric that the candidates apply when discussing immigration. A total of five discourses were discovered. These are named the problem discourse, the legality discourse, the security discourse, the economic discourse and Americanness as a discourse. The problem discourse as well as Americanness as a discourse can be found within all of the other discourses. Within the problem discourse, immigration is generally depicted as a problem; immigration is portrayed as an issue pertaining to law within the legality discourse: the security discourse is founded on the idea of immigration as a security matter; within the economic discourse, immigration appears an economic problem; and lastly, Americanness as a discourse builds around the age-old discussion on who is American. The economy discourse appears the most dominant, but the security discourse is found to be intensified by candidates Donald Trump and Ted Cruz. The candidates’ rhetoric most often aims to increase their popularity in the race and the audience’s support. This is understandable as the crux of a presidential primary is to select one candidate as the party nominee for the general election. As could be then expected, of Aristotle’s three modes of persuasion—ethos, pathos, and logos—ethos is most commonly used.
  • Pärni, Miika (2023)
    Self-Sovereign Identity is a new concept of managaging digital identities in the digital services. The purpose of the Self-Sovereign Identity is to place the user in the center and move towards decentralized model of identity management. Verifiable Credentials, Verifiable Presentations, Identity Wallets and Decentralized Identifiers are part of the Self-Sovereign Identity model. They have also been recently included in the OpenID Connect specifications to be used with the widely used authentication layer built on OAuth 2.0. The OpenID Connect authentication can now be leveraged with the Decetralized Identifiers (DIDs) and the public keys contained in DID Documents. This work assessed the feasibility of integrating the Verifiable Credentials, Verifiable Presentations and Decentralized Identifiers with OpenID Connect in the context of two use cases. The first use case is to integrate the Verifiable Credentials and Presentations into an OpenID Connect server and utilise Single Sign-On in federated environment. The second use case is to ignore the OpenID Provider and enable the Relying Party to authenticate directly with the Identity Wallet. Custom software components, the Relying Party, the Identity Wallet and the Verifiable Credential Issuer were built to support the assessments. Two new authorization flows were designed for the two use cases. The Federated Verifiable Presentation Flow describes the protocol of Relying Party authenticating with OpenID Provider which receives the user information from the Wallet. The flow does not require any changes for any Relying Party using the same OpenID Provider to authenticate and utilise Single Sign-On. The Verifiable Presentation Flow enables the Relying Party to authenticate directly with the Wallet. However, this flow requires multiple changes to Relying Party and benefits of federated environment are not available, e.g., the Single Sign-On. Both of the flows are useful for their own specific use cases. The new flows are utilising the new segments of the Self-Sovereign Identity and are promising steps towards self-sovereignty.
  • Häggblom, Erasmus (2022)
    The diverse range of threats to contemporary states mean that a high level of commitment to national defence is required effectively implement defensive doctrine. States need an accurate picture of the commitment to national defence among their citizens. However, research on the topic has been sparse. There is also limited knowledge regarding the factors that can be used to predict expressed commitment to national defence. This thesis examines data from the 2020 Advisory Board for Defence Information (ABDI) survey (N = 1169) on Finnish opinions on national defence using binary logistic regression. The survey consisted of in-person interviews (N = 500) and an online questionnaire (N = 669). The response rate for the survey was 21.8% for online participants and not reported for in-person interviews. Commitment to national defence is operationalised through questions on general and personal will to defend the country, which are examined separately and combined to represent the concept of national defence thought. The rate of positive responses to the dependent variables is examined by hierarchically constructing four regression models for each dependent variable followed by a final, simplified model. The chosen predictors are organised thematically and utilise demographic, socioeconomic, personal circumstance and geographic background information on the respondents. The primary predictors are the participants’ gender (53.9% male, 46.1% female) and age (age range 15-79). The thesis finds that the respondents’ gender and age are key predictors of expressed commitment to national defence. Men and older participants express higher levels of commitment compared to women and younger respondents. The respondents’ socioeconomic status, personal circumstance and geographic location are inconsistently associated with their expressed commitment to national defence. The association between commitment to national defence and gender does not change when additional predictors are added to the model. The respondents’ age is found be more strongly associated with their personal will to defend the country when controlling for their retirement status. This effect has not previously been identified in the literature and warrants examination in future research. The key finding of the study is the important role of gender and age as predictors of commitment to national defence.
  • Häggblom, Erasmus (2022)
    The diverse range of threats to contemporary states mean that a high level of commitment to national defence is required effectively implement defensive doctrine. States need an accurate picture of the commitment to national defence among their citizens. However, research on the topic has been sparse. There is also limited knowledge regarding the factors that can be used to predict expressed commitment to national defence. This thesis examines data from the 2020 Advisory Board for Defence Information (ABDI) survey (N = 1169) on Finnish opinions on national defence using binary logistic regression. The survey consisted of in-person interviews (N = 500) and an online questionnaire (N = 669). The response rate for the survey was 21.8% for online participants and not reported for in-person interviews. Commitment to national defence is operationalised through questions on general and personal will to defend the country, which are examined separately and combined to represent the concept of national defence thought. The rate of positive responses to the dependent variables is examined by hierarchically constructing four regression models for each dependent variable followed by a final, simplified model. The chosen predictors are organised thematically and utilise demographic, socioeconomic, personal circumstance and geographic background information on the respondents. The primary predictors are the participants’ gender (53.9% male, 46.1% female) and age (age range 15-79). The thesis finds that the respondents’ gender and age are key predictors of expressed commitment to national defence. Men and older participants express higher levels of commitment compared to women and younger respondents. The respondents’ socioeconomic status, personal circumstance and geographic location are inconsistently associated with their expressed commitment to national defence. The association between commitment to national defence and gender does not change when additional predictors are added to the model. The respondents’ age is found be more strongly associated with their personal will to defend the country when controlling for their retirement status. This effect has not previously been identified in the literature and warrants examination in future research. The key finding of the study is the important role of gender and age as predictors of commitment to national defence.
  • Snellman, Felix (2022)
    Leveraging new satellite communication technology, the European Commission published in February 2022 a proposal for a regulation which would facilitate the creation of a European space-based secure communication system serving EU institutions and agencies, Member States as well as EU citizens. In terms of Member States intra-governmental use, several public and private entities in the EU have expressed interest in supplementing national public authority networks with the technology that the proposed system uses. However, public authority networks are strictly regulated due their critical function in terms of safety and national security. An issue of regulatory and policy compatibility thus arises. After demonstrating why Finland is a relevant object to study, this thesis proceeds to analyse and compare relevant national legislation and policy with the proposed regulation and related documents, in order to assess whether, and to what extent, the proposed system is compatible, particularly in the context of control, security and ownership. While the research identified several issues relating to transparency, procurement, financing, ownership, access and control, the thesis ultimately finds that these concerns do not merit a conclusion of incompatibility.
  • Jaakkola, Kristella (2023)
    The EU integration has been spreading into the area of security. One of the most recent actions by the EU in this area is Directive (EU) 2022/2557 on the resilience of critical entities (the CER Directive). However, the EU’s competence to act in this area has been called into question as the Treaties do not provide an express competence. Similarly to several other security measures, the CER Directive was adopted using Art 114 TFEU as its legal basis. This thesis focuses on the topic of using Art 114 TFEU as a legal basis for security measures. It will be argued that although framed as a market measure, the background, context, and content of the CER Directive point towards a security aim. However, it seems that problems related to other potential legal bases, such as Art 196 TFEU on civil protection, left Art 114 TFEU effectively being the only available option for a measure such as the CER Directive. It is noted that the case law on Art 114 TFEU indicates that there are very few limits to its use, and therefore, it seems that it provides a valid legal basis also for the CER Directive. This thesis argues that while Art 114 TFEU may provide a lucrative shortcut to avoid competence and legal basis problems, its use for security measures is another example of the phenomenon called competence creep and may lead to some negative implications regarding. It will also be argued that the EU’s actions limit Member States' sovereignty, while also noticing that there are signs that the Member States have silently approved this development. In the end, it will be argued that masking security measures as market measures may negatively affect the effectiveness of protection and may send an unfortunate message that markets are regarded as a priority over the well-being of people.
  • Jaakkola, Kristella (2023)
    The EU integration has been spreading into the area of security. One of the most recent actions by the EU in this area is Directive (EU) 2022/2557 on the resilience of critical entities (the CER Directive). However, the EU’s competence to act in this area has been called into question as the Treaties do not provide an express competence. Similarly to several other security measures, the CER Directive was adopted using Art 114 TFEU as its legal basis. This thesis focuses on the topic of using Art 114 TFEU as a legal basis for security measures. It will be argued that although framed as a market measure, the background, context, and content of the CER Directive point towards a security aim. However, it seems that problems related to other potential legal bases, such as Art 196 TFEU on civil protection, left Art 114 TFEU effectively being the only available option for a measure such as the CER Directive. It is noted that the case law on Art 114 TFEU indicates that there are very few limits to its use, and therefore, it seems that it provides a valid legal basis also for the CER Directive. This thesis argues that while Art 114 TFEU may provide a lucrative shortcut to avoid competence and legal basis problems, its use for security measures is another example of the phenomenon called competence creep and may lead to some negative implications regarding. It will also be argued that the EU’s actions limit Member States' sovereignty, while also noticing that there are signs that the Member States have silently approved this development. In the end, it will be argued that masking security measures as market measures may negatively affect the effectiveness of protection and may send an unfortunate message that markets are regarded as a priority over the well-being of people.
  • Setälä, Iiris (2010)
    The purpose of this study is to find out weather or not the users of internet bank are aware of the security threats concerning the use of the service. The intention is to find out also if the interviewees have created some methods of their own to raise the security level of their use of internet bank. Still, the purpose of the study is to clarify the interviewees’ opinions about the economically responsible party in case of economic losses. Research material consists of eight internet bank users’ interviews. The statements of the interviewees are considered from factual point of view and analysed by dividing them under certain themes and types. In addition to the interviews of consumers, also two experts were interviewed. This material works more like source of information and it is not analysed like the other interviews. These two interviews were carried out to get information about the security level of Finnish internet banks. Phishing is criminal activity by which the criminals’ objective is to gather confidential information, such as access codes for internet bank, from the victims. This research revealed that the interviewees were quite unaware of the different forms of phishing attacks. However, almost everyone had heard of the phishing e-mails. They were not seen as a threat because the interviewees knew how to identify those e-mails and also that they should never be answered but deleted immediately. Consumers can enhance the security of internet transactions by their own behaviour. The interviewees seemed to be quite careful when using internet bank even though they had not gotten much directions from the bank. The different parts of internet bank access codes were kept separately and the fixed parts were mostly known by heart. Some interviewees used internet bank merely at home or at work place and public computers were broadly avoided for that purpose. The interviewees thought that the economically responsible party in the case of economical losses depends on the situation. Bank could not be held responsible if the access codes were given to outsiders by self. In other cases however the interviewees saw bank as the responsible party. Greater awareness of security threats seems in this research material to increase the responsibility of consumer. Consumers’ responsibility would also increase if banks would increasingly inform consumers about these security threats.