• Title/Summary/Keyword: 룰 기반

Search Result 197, Processing Time 0.026 seconds

NoSQL-based Distributed Processing System for Processing BigData Security Events (빅데이터 보안이벤트 처리를 위한 NoSQL 기반 분산 처리 시스템)

  • Han, HyoJoon;Kang, JiWon;Jung, Yong-Hwan;Kim, Yangwoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.90-93
    • /
    • 2017
  • 인터넷과 클라우드 서비스 사용이 증가하면서 패킷의 양과 사이버 위협이 증가하였다. 본 논문에서는 빅데이터를 처리하기 위해 사용되는 NoSQL을 보안이벤트의 신속한 처리를 위한 침입탐지시스템에 적용하였다. 다양한 데이터 모델 유형의 NoSQL 데이터베이스 중에서 빅데이터 보안이벤트를 처리하는데 가장 적합한 시스템을 찾기 위해 세 가지 유형의 Snort 룰 기반 보안이벤트 분산 처리 프로토타입 시스템들을 구축하였고 각 시스템의 성능을 평가하였다. 그 결과로 MongoDB 기반의 보안이벤트 분산 처리 시스템이 가장 속도가 빠른 것을 확인하였다.

BPEL to WS-ECA 변환 방법

  • Lee, Won-Seok;Lee, Gyu-Cheol
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.869-871
    • /
    • 2007
  • 최근 유비쿼터스 환경으로 발전하면서 이종의 하드웨어와 소프트웨어 플랫폼을 가지고 있는 디바이스들 간의 연동 기술이 점점 중요해지고 있다. 이에 대한 연구 중의 하나로 웹서비스를 이용한 이벤트 기반 다바이스 연동 프레임워크가 있으며, 이는 XML을 기반으로 이벤트 기반의 다바이스 연동을 정의하는 룰 언어인 WS-ECA를 제안하고 있다. 그러나, 아직까지 WS-ECA를 효과적으로 작성할 수 있는 방법이 제시되지 않고 있다. 따라서, 본 논문은 비즈니스 프로세스에 대한 로직을 표현하는 데 가장 활용이 많이 되고 있는 BPEL을 WS-ECA로 변환하는 방법을 제안하며, 이는 BPEL 저작 툴을 이용하여 기본적인 디바이스 연동을 정의할 수 있으므로 효과적으로 WS-ECA을 생성할 수 있는 방법을 제공할 수 있다.

  • PDF

Design of Business Rule-Based Component for Flexible Financial Charge (유연한 금융 수수료를 위한 업무 규칙 기반 컴포넌트 설계)

  • Hong, Sung-Woo;Kim, Young-Gab
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.619-622
    • /
    • 2005
  • 최근 금융권의 수익 기반이 되고 있는 수수료는 다양한 형태의 규칙을 내포하고 있으며, 복잡성이 증가하고 있어 유연하고 동적인 수수료 구조가 요구된다. 이러한 요구 사항을 충족시키기 위해서 업무 규칙(business rule)이 활용될 수 있다. 본 논문에서는 은행권의 수수료를 분석하여, 수수료 부과 기준을 업무 규칙으로 정의하고, 이를 파라미터 드리븐(parameter driven) 방식의 룰 데이터베이스(rule database)로 설계하였다. 이를 통하여 복합 수수료를 즉시 적용할 수 있는 유연한 설계로 어플리케이션 구조를 단순화 할 수 있는 업무 규칙 기반 수수료 처리 컴포넌트를 설계하였다.

  • PDF

Behavior Analysis of Internet Applications based on Network Traffic (네트워크 트래픽 기반 인터넷 응용의 동작형태 분석)

  • Park, Jin-Wan;Yoon, Sung-Ho;Park, Jun-Sang;Kim, Myung-Sup
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1210-1213
    • /
    • 2009
  • 네트워크 트래픽의 응용 별 분류는 최근 학계의 중요한 이슈 중 하나이다. 기존의 전통적인 트래픽 분류 방법으로 대표되는 well-known 포트 기반 분류 방법 및 페이로드 시그니쳐 기반 분류 방법의 구조적 한계점을 극복하기 위한 새로운 대안으로써, 트래픽의 상관관계를 통한 분류 방법이 제안되었다. 본 논문에서는 트래픽 상관관계에 대한 정형화된 식이나 룰을 찾는데 유용한 정보를 제공하기 위해 인터넷 응용 별 트래픽을 동작형태의 관점에서 분석하였다. 학내 망에서 자주 사용되는 인터넷 응용을 선정하고, 이들이 실행 초기에 발생시키는 트래픽을 플로우와 패킷 단위로 분석한 내용을 기술하였다. 특히, 인터넷 응용이 발생시키는 플로우 중 페이로드가 존재하는 첫 플로우를 first talk 라 정의하였으며, 이에 대한 상세한 분석 내용을 기술하였다.

A Two-Dimensional Binary Prefix Tree for Packet Classification (패킷 분류를 위한 이차원 이진 프리픽스 트리)

  • Jung, Yeo-Jin;Kim, Hye-Ran;Lim, Hye-Sook
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.4
    • /
    • pp.543-550
    • /
    • 2005
  • Demand for better services in the Internet has been increasing due to the rapid growth of the Internet, and hence next generation routers are required to perform intelligent packet classification. For a given classifier defining packet attributes or contents, packet classification is the process of identifying the highest priority rule to which a packet conforms. A notable characteristic of real classifiers is that a packet matches only a small number of distinct source-destination prefix pairs. Therefore, a lot of schemes have been proposed to filter rules based on source and destination prefix pairs. However, most of the schemes are based on sequential one-dimensional searches using trio which requires huge memory. In this paper, we proposea memory-efficient two-dimensional search scheme using source and destination prefix pairs. By constructing binary prefix tree, source prefix search and destination prefix search are simultaneously performed in a binary tree. Moreover, the proposed two-dimensional binary prefix tree does not include any empty internal nodes, and hence memory waste of previous trio-based structures is completely eliminated.

An Integrated Methodology of Knowledge-based Rules with Fuzzy Logic for Material Handling Equipment Selection (전문가 지식 및 퍼지 이론을 연계한 물류설비 선정 방안에 관한 연구)

  • Cho Chi-Woon
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.1
    • /
    • pp.57-73
    • /
    • 2006
  • This paper describes a methodology for automating the material handling equipment (MHE) evaluation and selection processes by combining knowledge-based rules and fuzzy multi-criteria decision making approach. The methodology is proposed to solve the MHE selection problems under fuzzy environment. At the primary stage, the most appropriate MHE type among the alternatives for each material flow link is searched. Knowledge-based rules are employed to retrieve the alternatives for each material flow link. To consider and compare the alternatives, multiple design factors are considered. These factors include both quantitative and qualitative measures. The qualitative measures are converted to numerical measures using fuzzy logic. The concept of fuzzy logic is applied to evaluation matrices used for the selection of the most suitable MHE through a fuzzy linguistic approach. Thus, this paper demonstrates the potential applicability of fuzzy theory in the MHE applications and provides a systemic guidance in the decision-making process.

  • PDF

Design of Efficient Edge Computing based on Learning Factors Sharing with Cloud in a Smart Factory Domain (스마트 팩토리 환경에서 클라우드와 학습된 요소 공유 방법 기반의 효율적 엣지 컴퓨팅 설계)

  • Hwang, Zi-on
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2167-2175
    • /
    • 2017
  • In recent years, an IoT is dramatically developing according to the enhancement of AI, the increase of connected devices, and the high-performance cloud systems. Huge data produced by many devices and sensors is expanding the scope of services, such as an intelligent diagnostics, a recommendation service, as well as a smart monitoring service. The studies of edge computing are limited as a role of small server system with high quality HW resources. However, there are specialized requirements in a smart factory domain needed edge computing. The edges are needed to pre-process containing tiny filtering, pre-formatting, as well as merging of group contexts and manage the regional rules. So, in this paper, we extract the features and requirements in a scope of efficiency and robustness. Our edge offers to decrease a network resource consumption and update rules and learning models. Moreover, we propose architecture of edge computing based on learning factors sharing with a cloud system in a smart factory.

Event based Rule Processing in Ubiquitous Web Services Environments (유비쿼터스 웹서비스 환경에서 이벤트 기반의 룰 처리 기법)

  • Lee Kang-Chan;Lee Won-Suk;Jeon Jong-Hong;Lee Seung-Yun;Park Jong-Hun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1101-1105
    • /
    • 2006
  • Ubiquitous computing network comprises a variety of distributed service devices. Today Web services technology enables the heterogeneous devices to provide their own services and interact with each other via well-defined Internet protocol. Nevertheless, service devices in ubiquitous environments require more event-driven, autonomous interaction beyond rather passive service-oriented architecture of the present time. This paper presents an ECA (Event-Condition-Action) rule description language in an attempt to support capability for autonomous interactions among service-oriented devices in ubiquitous computing network. Specifically, the proposed WS-ECA is an XML-based ECA rule description language for web service-enabled devices. The rules are embedded in distributed devices which invoke appropriate services in the network if the rules are triggered by some internal or external events. The presented ECA-based device coordination approach is expected to facilitate seamless inter-operation among the web service-enabled devices in the emerging ubiquitous computing environment.

Event and Service registry system for USN Application Services (USN응용 서비스를 위한 이벤트 및 서비스 레지스트리 시스템)

  • Yeom, Sung-Kun;Kim, Yong-Woon;Yoo, Sang-Keun;Kim, Hyung-Jun;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.7
    • /
    • pp.1459-1466
    • /
    • 2009
  • In ubiquitous environment, various and amount of sensor data information occur continuously and periodically about thing and user from RHO, sensor network of various space. Such, the users from among many of provider who provide sensor service should find service that themselves is wanted. And when service use, service right to user should be provided. But in the current environment of the USN(Ubiquitous Sensor Network) Application Service, there is no the registry to find these services but only business- oriented UDDI(Universal Description Discovery, and integration). In addition, when service use, service right to user should be provided but current services provided only services one of the conditions or events. Therefore, rules-based processing system of service event that can provide service according various conditions and events is need. In this paper research into service registry for sensor service search with reference to existing UDDI and event processing system for USN application service with reference to event rule based on web service as WS-ECA(Web Service-Event Condition Action).

Development of a decision scaling framework for drought vulnerability assessment of dam operation under climate change (Decision Scaling 기반 댐 운영 기후변화 가뭄 취약성 평가)

  • Kim, Jiheun;Seo, Seung Beom;Cho, Jaepil
    • Journal of Korea Water Resources Association
    • /
    • v.56 no.4
    • /
    • pp.273-284
    • /
    • 2023
  • Water supply is continuously suffering from frequent droughts under climate change, and such extreme events are expected to become more frequent due to climate change. In this study, the decision scaling method was introduced to evaluate the drought vulnerability under future climate change in a wider range. As a result, the water supply reliability of the Boryeong Dam ranged from 95.80% to 98.13% to the condition of the aqueduct which was constructed at the Boryeong Dam. Furthermore, the Boryeong Dam was discovered to be vulnerable under climate change scenarios. Hence, genetic algorithm-based hedging rules were developed to evaluate the reduction effect of drought vulnerability. Moreover, three demand scenarios (high, standard, and low demand) were also considered to reflect the future socio-economic change in the Boryeong Dam. By analyzing quantitative reliability and the probability of extreme drought occurrence under 5% of the water storage rate, all hedging rules demonstrated that they were superior in preparing for extreme drought under low-demand scenarios.