• Title/Summary/Keyword: 모니터링 검색 시스템

Search Result 103, Processing Time 0.039 seconds

An Efficient Update Algorithm for Packet Classification With TCAM (TCAM을 이용한 패킷 분류를 위한 효율적인 갱신 알고리즘)

  • Jeong Haejin;Song Ilseop;Lee Yookyoung;Kwon Taeckgeun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.2A
    • /
    • pp.79-85
    • /
    • 2006
  • Generally, it is essential that high-speed routers, switches, and network security appliances should have an efficient packet classification scheme in order to achieve the high-speed packet forwarding capability. For the multi-gigabit packet-processing network equipment the high-speed content search hardware such as TCAM and search engine is recently used to support the content-based packet inspection. During the packet classification process, hundreds and thousands of rules are applied to provide the network security policies regarding traffic screening, traffic monitoring, and traffic shaping. In addition, these rules could be dynamically changed during operations of systems if anomaly traffic patterns would vary. Particularly, in the high-speed network, an efficient algorithm that updates and reorganizes the packet classification rules is critical so as not to degrade the performance of the network device. In this paper, we have proposed an efficient update algorithm using a partial-ordering that can relocate the dynamically changing rules at the TCAM. Experimental results should that our algorithm does not need to relocate existing rules feature until 70$\%$ of TCAM utilization.

User Recognition based TV Programs Recommendation System in Smart Devices Environment (스마트 디바이스 환경에서 사용자 인식 기반의 TV 프로그램 추천 시스템)

  • Park, Soon-Hong;Kim, Yong-Ho
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.249-254
    • /
    • 2013
  • The number of channels are increased into several hundreds of channels when coming out the digital broadcasting era. In this environment, viewers searching for programs will be very difficult to do. In addition, recent popularization of smart devices are receiving the services that they previously had not been given to. A TV program recommended a system that has been studied as a way to solve these problems. However, most studies have been studied in most web-based research results when applied to broadcast TV for TV program recommendations. In particular, the combination of the current members who watch TV are not considered. In this paper, the environment and TV viewers are considering a combination of the members of the TV program's recommended system proposal. In order to make a group deal successful, we employ the face recognition.

Design of the Integrated Fire Automation System(IFAS) on based P-Type Fire Control Panel (P형 수신기 기반 통합화재 자동 시스템의 설계)

  • Kim, Hyun-Ju;Park, Jae-Heung;Seo, Yeong-Geon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.12
    • /
    • pp.133-142
    • /
    • 2010
  • P-type fire control panel, currently in use, has a big hazard that can cause the large scaled human death tolls and property damage in the massive fire because it is difficult to identify in real time the location of fire outbreak and whether search-device are broken down or not. In this paper, I suggest that the integrated fire automation system on based p-type fire control panel should be used, which can detect in real time the signal that occur when whether search-device are broken down or not, and can detect the arisen circumstances information of p-type fire control panel on the fire signal in the far away. The devised systems have designed and embodied the analysis of circumstances information and module that can analyze the circumstances information from the p-type fire control panel and the part of internet access installment which can gather and deliver the circumstances information from the fire prevention facility receiver.

A Study on System Tracing User Activities in the Windows Operating System (윈도우 운영체제 상의 사용자 행위 추적에 관한 연구)

  • Jung, Chang-Sung;Kim, Young-Chan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.101-114
    • /
    • 2011
  • As it seems like critical information leakages have been increasing due to industrial espionage and malicious internal users, the importance of introducing audit and log security technology is growing every now and then. In this paper, we suggest the session logging system for the company's internal control to meet the SOX legislation level, by monitoring and analyzing users behaviors connecting to the business-critical Operating System. The system proposed in this paper aims to monitor the user's illegal activities in the Operating System, and to present the clear evidence of purpose of those activities by detailed logs. For this purpose, we modified Operating System by adding multiple services suggested in this paper. These services utilize interfaces provided by the existing Operating System and add functions to control access and get logs. The system saves and manages session logs of users or administrators connected to the server with centralized log storage. And the system supports session log searching and lookup features required by SOX legislation for the company's internal controls with the level of computer forensics and logging technology.

Strategies and Cost Model for Spatial Data Stream Join (공간 데이터스트림을 위한 조인 전략 및 비용 모델)

  • Yoo, Ki-Hyun;Nam, Kwang-Woo
    • Journal of Korea Spatial Information System Society
    • /
    • v.10 no.4
    • /
    • pp.59-66
    • /
    • 2008
  • GeoSensor network means sensor network infra and related software of specific form monitoring a variety of circumstances over geospatial. And these GeoSensor network is implemented by mixing data stream with spatial attribute, spatial relation. But, until a recent date sensor network system has been concentrated on a store and search method of sensor data stream except for a spatial information. In this paper, we propose a definition of spatial data stream and its join strategy model at GeoSensor network, which combine data stream with spatial data. Spatial data stream s defining in this paper are dynamic spatial data stream of a moving object type and static spatial data stream of a fixed type. Dynamic spatial data stream is data stream transmitted by moving sensor as GPS, while static spatial data stream is generated by joining a data stream of general sensor and a relation with location values of these sensors. This paper propose joins of dynamic spatial data stream and static spatial data stream, and cost models estimating join cost. Finally, we show verification of proposed cost models and performance by join strategy.

  • PDF

Damage Detecion of CFRP-Laminated Concrete based on a Continuous Self-Sensing Technology (셀프센싱 상시계측 기반 CFRP보강 콘크리트 구조물의 손상검색)

  • Kim, Young-Jin;Park, Seung-Hee;Jin, Kyu-Nam;Lee, Chang-Gil
    • Land and Housing Review
    • /
    • v.2 no.4
    • /
    • pp.407-413
    • /
    • 2011
  • This paper reports a novel structural health monitoring (SHM) technique for detecting de-bonding between a concrete beam and CFRP (Carbon Fiber Reinforced Polymer) sheet that is attached to the concrete surface. To achieve this, a multi-scale actuated sensing system with a self-sensing circuit using piezoelectric active sensors is applied to the CFRP laminated concrete beam structure. In this self-sensing based multi-scale actuated sensing, one scale provides a wide frequency-band structural response from the self-sensed impedance measurements and the other scale provides a specific frequency-induced structural wavelet response from the self-sensed guided wave measurement. To quantify the de-bonding levels, the supervised learning-based statistical pattern recognition was implemented by composing a two-dimensional (2D) plane using the damage indices extracted from the impedance and guided wave features.

Design and Implementation of High-Resolution Image Transmission Interface for Mobile Device (모바일용 고화질 영상 전송 인터페이스의 설계 및 구현)

  • Ahn, Yong-Beom;Lee, Sang-Wook;Kim, Eung-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.8
    • /
    • pp.1511-1518
    • /
    • 2007
  • As studies on ubiquitous computing are actively conducted, desire for various services, including image transmission storage, search and remote monitoring. has been expanding into mobile environment as well as to PCs. while CCTV (closed circuit TV) and un DVR (Digital video Recording) are used in places where security service such as intrusion detection system is required, these are high-end equipment. So it is not easy for ordinary users or household and small-sized companies to use them. Besides, they are difficult to be carried and camera solution for mobile device does not support high-quality function and provides low-definition of QVGA for picture quality. Therefore, in this study, design and implementation of embedded system of high-definition image transmission for ubiquitous mobile device which is not inferior to PC or DVR are described. To this end, usage of dedicated CPU for mobile device and design and implementation of MPEG-4 H/W CODEC also are examined. The implemented system showed excellent performance in mobile environment, in terms of speed, picture quality.

Implementation of Security Information and Event Management for Realtime Anomaly Detection and Visualization (실시간 이상 행위 탐지 및 시각화 작업을 위한 보안 정보 관리 시스템 구현)

  • Kim, Nam Gyun;Park, Sang Seon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.5
    • /
    • pp.303-314
    • /
    • 2018
  • In the past few years, government agencies and corporations have succumbed to stealthy, tailored cyberattacks designed to exploit vulnerabilities, disrupt operations and steal valuable information. Security Information and Event Management (SIEM) is useful tool for cyberattacks. SIEM solutions are available in the market but they are too expensive and difficult to use. Then we implemented basic SIEM functions to research and development for future security solutions. We focus on collection, aggregation and analysis of real-time logs from host. This tool allows parsing and search of log data for forensics. Beyond just log management it uses intrusion detection and prioritize of security events inform and support alerting to user. We select Elastic Stack to process and visualization of these security informations. Elastic Stack is a very useful tool for finding information from large data, identifying correlations and creating rich visualizations for monitoring. We suggested using vulnerability check results on our SIEM. We have attacked to the host and got real time user activity for monitoring, alerting and security auditing based this security information management.

The Physical Activity and Smart Health Care of Trend for the Elderly (노인을 위한 신체활동 및 스마트 헬스 케어분야의 경향)

  • Yi, Eun Surk
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.511-516
    • /
    • 2017
  • The study conducted a systematic analysis through systematic literature to explore trends in physical activities and trends in the elderly and smart health care sector. Based on the research data collected from 2006 to 2017, the research paper was selected as an analysis data base and collected data from the patented patent data registered to the Patent Office. Based on the combination of the aged, physical activities, IT, IoT, and healthcare, the research identified the research trends and subjects through the analysis and analysis of subjects based on a total of 102 academic journals and 79 patents. First of all, the academic research published a surge in 2010 research in 2006, and it has emerged as an area of continuous interest in academia until 2017. Meanwhile, patents for patents soared in 2012, according to the company's patent. Second, research shows that studies are being conducted in five areas of research. Service design, monitoring systems, systems, policies, and other studies. In the case of patents, three types of patents were classified as patents, devices and information related to information. Subsequent studies will be deemed necessary to verify the effectiveness of the smart health care technology to enhance the health of the elderly.

Contents application airport security equipment·facility for terror prevention (테러방지를 위한 콘텐츠 응용 공항보안 장비·시설)

  • Kang, maeng-jin
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.228-235
    • /
    • 2008
  • Terror for airplane, airport and passengers of the problems is being threat over the world. and since 9.11 terror of 2001 year, many countries have endeavored to prevent terror and have manipulate airport security part as important field. Especially, The U.S.A made Transportation security Administration in Homeland security adminstration and strongly execute for policies related anti-terror. many countries over the world enforce airport and airplane security facilities with science-technology contents. and with security exploitation for the passengers and freight security inspection level enforcement, many countries also make effort to interupt aviation terror threat. In this process, in the center of developed countries that need science-technology contents adaption, much budget and personals are invested and exploited a security inspection instrument and complimented of many facilities As a result, according to the development of science-technology, prevention of Terror have much developed. The contents using intelligence-communication technology inevitably needed on the goal of terror prevention and safty. From simple monitoring for the people who come in and out airport to boarding process and inspection for the freight, security inspection process for the passengers, bio information input, confirmation, of the level that there is no cases of adaption of contents, The reality have generalized of using contents. The study is going to research contents application situation.

  • PDF