• Title/Summary/Keyword: 네트워크 시각화

Search Result 359, Processing Time 0.029 seconds

The State of the Art in Visualizing Large Graph Data (대용량 그래프 데이터를 효율적으로 시각화하는 방법에 대한 최신 연구 조사)

  • Kwak, Useok;Na, In-Ju;Kim, Hyeonji;Lee, Kyeong-Jun;Seo, In;Han, Wook-Shin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.802-803
    • /
    • 2017
  • 소셜 네트워크, 웹 시멘틱, 협력 네트워크 등과 같이 다양한 응용에서 대용량 그래프 데이터를 이용한다. 최근 이러한 데이터를 분석하기 위해 대용량 그래프 데이터를 효율적으로 시각화 하는 연구가 제안되었다. 이에 본 연구에서는 대용량 그래프 데이터를 효율적으로 시각화 하는 방법에 대한 최신 연구 동향을 조사한다.

A Framework Based on A Semantic Graph for Visualization of Influence On A Social Network (시멘틱 그래프 기반의 사회연결망 영향력 시각화를 위한 연구)

  • Jang, Seok-Hyun;Lee, Kyung-Won;Jang, Sun-Hee
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02b
    • /
    • pp.432-438
    • /
    • 2007
  • 이 연구는 정보 간의 관계에서 도출되는 특징을 적합하게 보여줄 수 있는 시각화를 위한 선행연구이다. 정보의 관계에 주목하는 이유는 관계 구조를 통해 정보의 성격과 특징을 파악할 수 있기 때문이다. 정보의 관계는 사회연결망 분석을 통해서 파악할 수 있다. 정보를 구성하는 개체와 개체 사이의 관계는 다양한 요소를 지니고 있으며, 연결망의 관계 분석 지표를 통해 관계의 성격과 특징을 도출해 낼 수 있다. 이 연구에서는 사회연결망에서 관계의 성격을 도출하는데 중요한 지표로 다뤄지는 영향력을 연구범위로 설정하고, 연결망 내의 관계의 요인과 영향력의 지표를 분류하고 연결한다. 이를 통해 사회연결망에서 영향력을 나타내는 관계의 요소를 중심으로 관계의 시각화 과정에 있어 적합한 시각화 프로세스를 온톨로지 개념을 사용하는 시멘틱 그래프에 적용해 보았다. 영향력의 각 관계 요소는 공통적인 개념과 성격, 측정 요소를 통하여 노드와 링크의 네트워크 형태의 그래프로 형성되었다. 영향력 시멘틱 그래프는 사회연결망의 영향력 요소를 이해하고, 분석하는데 유용하게 사용될 수 있음을 확인할 수 있다. 또한 시멘틱 그래프의 적용 범위를 연결망 시각화 전반을 확장하여, 합리적이고 효율적인 시각화 프로세스의 설정이 가능함을 알 수 있다.

  • PDF

Circular Splats Based Visualization for Point Cloud Contents (포인트 클라우드 콘텐츠의 원형 Splat 기반 시각화 기법)

  • Yun, Junyoung;Kim, Jongwook;Park, Jong-Il
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2020.07a
    • /
    • pp.276-278
    • /
    • 2020
  • 포인트 클라우드 콘텐츠는 실제 사물을 수천만 개의 점으로 표현하는 미디어 콘텐츠이다. 각 점들은 색상 값과 3 차원 공간상의 위치로 구성 되어있다. 이러한 컨텐츠를 영상 미디어로 활용하기 위해서는 실시간으로 네트워크를 통해 전달되는 포인트 클라우드 콘텐츠를 고품질의 영상으로 시각화 할 필요성이 있다. 본 연구에서는 포인트 클라우드 콘텐츠를 구성하는 점들이 임의의 순서로 입력될 때, 각 점이 투영된 형상을 원형으로 나타내어 블렌딩하는 원형 splat 기반의 실시간 시각화 기법을 제안한다.

  • PDF

Design and implementation of the honeycomb structure visualization system for the effective security situational awareness of large-scale networks (대규모 네트워크의 효과적 보안상황 인지를 위한 벌집 구조 시각화 시스템의 설계 및 구현)

  • Park, Jae-Beom;Kim, Huy-Kang;Kim, Eun-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1197-1213
    • /
    • 2014
  • Due to the increase in size of the computer network, the network security systems such as a firewall, IDS, IPS generate much more vast amount of information related to network security. So detecting signs of hidden security threats has become more difficult. Security personnels' 'Network Security Situational Awareness(NSSA)' is effectively determining the security situation of overall computer network on the basis of the relation between the security events that occur in the several views. The process of situational awareness is divided into three stages of the 'identification,' 'understanding' and 'prediction'. And 'identification' and 'understanding' are prerequisites for 'predicting' and the following appropriate responses. But 'identification' and 'understanding' in the vast amount of information became more difficult. In this paper, we propose Honeycomb security situational awareness visualization system that is designed to help NSSA in large-scale networks by using visualization techniques known effective to the 'identification' and 'understanding' stages. And we identified the empirical effects of this system on the basis of the 'VAST Challenge 2012' data.

A log visualization method for network security monitoring (네트워크 보안 관제를 위한 로그 시각화 방법)

  • Joe, Woo-Jin;Shin, Hyo-Jeong;Kim, Hyong-Shik
    • Smart Media Journal
    • /
    • v.7 no.4
    • /
    • pp.70-78
    • /
    • 2018
  • Current trends in information system have led many companies to adopt security solutions. However, even with a large budget, they cannot function properly without proper security monitoring that manages them. Security monitoring necessitates a quick response in the event of a problem, and it is needed to design appropriate visualization dashboards for monitoring purposes so that necessary information can be delivered quickly. This paper shows how to visualize a security log using the open source program Elastic Stack and demonstrates that the proposed method is suitable for network security monitoring by implementing it as a appropriate dashboard for monitoring purposes. We confirmed that the dashboard was effectively exploited for the analysis of abnormal traffic growth and attack paths.

Traffic Anomaly Identification Using Multi-Class Support Vector Machine (다중 클래스 SVM을 이용한 트래픽의 이상패턴 검출)

  • Park, Young-Jae;Kim, Gye-Young;Jang, Seok-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.4
    • /
    • pp.1942-1950
    • /
    • 2013
  • This paper suggests a new method of detecting attacks of network traffic by visualizing original traffic data and applying multi-class SVM (support vector machine). The proposed method first generates 2D images from IP and ports of transmitters and receivers, and extracts linear patterns and high intensity values from the images, representing traffic attacks. It then obtains variance of ports of transmitters and receivers and extracts the number of clusters and entropy features using ISODATA algorithm. Finally, it determines through multi-class SVM if the traffic data contain DDoS, DoS, Internet worm, or port scans. Experimental results show that the suggested multi-class SVM-based algorithm can more effectively detect network traffic attacks.

Industry Linkage Analysis and Link Structure Network Analysis of Water Transportation Industry (수상 운송업의 산업연관분석 및 연계구조 네트워크 분석)

  • Park, Sung-Min;Park, Chan-Kwon
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.3
    • /
    • pp.85-107
    • /
    • 2022
  • This study is to analyze the induced effect, network connectivity, and network visualization of the water transportation industry on the overall economy in relation to all industries. For this, various inducement coefficients of the water transportation industry are analyzed using industry linkage analysis and unit structure matrix, and network visualization analysis is performed using network connectivity and NetDraw using Ucinet 6 that utilizes unit structure matrix and inverse matrix function. As a result of the study, analysis results of input coefficient, production inducement coefficient, value-added inducement coefficient, and inter-industry chain effect were presented as various inducement coefficients in the water transportation industry. content was presented. Through this study, the current position and status of the water transportation industry and its relationship with all industries were confirmed, and the strategic relationship with which industries it should be presented was presented. In the future, it is necessary to further analyze the current status and trends of various induced effects, connectivity (centrality), and network visualization analysis using industry-related analysis published since the 2000s.

Network Time Protocol Extension for Wireless Sensor Networks (무선 센서 네트워크를 위한 인터넷 시각 동기 프로토콜 확장)

  • Hwang, So-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.12
    • /
    • pp.2563-2567
    • /
    • 2011
  • Advances in smart sensors, embedded systems, low-power design, ad-hoc networks and MEMS have allowed the development of low-cost small sensor nodes with computation and wireless communication capabilities that can form distributed wireless sensor networks. Time information and time synchronization are fundamental building blocks in wireless sensor networks since many sensor network applications need time information for object tracking, consistent state updates, duplicate detection and temporal order delivery. Various time synchronization protocols have been proposed for sensor networks because of the characteristics of sensor networks which have limited computing power and resources. However, none of these protocols have been designed with time representation scheme in mind. Global time format such as UTC TOD (Universal Time Coordinated, Time Of Day) is very useful in sensor network applications. In this paper we propose network time protocol extension for global time presentation in wireless sensor networks.

Global Time Synchronization for Wireless Sensor Networks (무선 센서 네트워크를 위한 전역 시각 동기 기법)

  • Hwang, So-Young;Yu, Don-Hui;Joo, Jae-Heum;Won, Sung-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.84-86
    • /
    • 2010
  • Time information and time synchronization are fundamental building blocks in wireless sensor networks since many sensor network applications need time information for object tracking, consistent state updates, duplicate detection and temporal order delivery. Various time synchronization protocols have been proposed for sensor networks because of the characteristics of sensor networks which have limited computing power and resources. However, none of these protocols have been designed with time representation scheme in mind. Global time format such as UTC TOD (Universal Time Coordinated, Time Of Day) is very useful in sensor network applications. In this paper we propose time keeping and synchronization method for global time presentation in wireless sensor networks.

  • PDF

Real-Time Classification, Visualization, and QoS Control of Elephant Flows in SDN (SDN에서 엘리펀트 플로우의 실시간 분류, 시각화 및 QoS 제어)

  • Muhammad, Afaq;Song, Wang-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.3
    • /
    • pp.612-622
    • /
    • 2017
  • Long-lived flowed termed as elephant flows in data center networks have a tendency to consume a lot of bandwidth, leaving delay-sensitive short-lived flows referred to as mice flows choked behind them. This results in non-trivial delays for mice flows, eventually degrading application performance running on the network. Therefore, a datacenter network should be able to classify, detect, and visualize elephant flows as well as provide QoS guarantees in real-time. In this paper we aim to focus on: 1) a proposed framework for real-time detection and visualization of elephant flows in SDN using sFlow. This allows to examine elephant flows traversing a switch by double-clicking the switch node in the topology visualization UI; 2) an approach to guarantee QoS that is defined and administered by a SDN controller and specifications offered by OpenFlow. In the scope of this paper, we will focus on the use of rate-limiting (traffic-shaping) classification technique within an SDN network.