• Title/Summary/Keyword: 연속성 이벤트

Search Result 38, Processing Time 0.025 seconds

Continuous Issue Event Analysis in Social Media (소셜미디어에 나타난 연속성 이슈 이벤트 분석)

  • Oh, Hyo-Jung;Kim, Hyunki;Yun, Bo-Hyun
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.2
    • /
    • pp.31-38
    • /
    • 2014
  • This paper reveals continuity of related events which are occurred and changing from moment to moment accident/events collected from various social media channels. Among them, we especially define the events which have big social influence as "issue event" and investigate the type and characteristics of continuous issue event for each domain. We also introduce a automatic issue detection system in social media text. Based on the extracted issue event results in a particular domain, we analyse the continuity of those events by illustrating in time and place-axis. Furthermore, we identify the relationship between social media in terms of issue events propagation.

  • PDF

Trend Analysis using Spatial-Temporal Visualization of Event Information based on Social Media (소셜 미디어에 기반한 이벤트 정보의 시공간적 시각화를 통한 추이 분석)

  • Oh, Hyo-Jung;Yun, Bo-Hyun;Yoo, Cheol-Jung;Kim, Yong
    • Journal of Internet Computing and Services
    • /
    • v.15 no.6
    • /
    • pp.65-75
    • /
    • 2014
  • The main focus of this paper is to analyze trend of event informations in a variety of mass media by graphical visualization in axis of the time and location. Especially, continuity analysis based on user-generated social media can reflect the social impact of a certain event according to change time and location and their directional changes. To reveal the characteristics of continuous events, we survey the data set collected from news articles and tweets during two years. Based on case studies on 'disease' and 'leisure', we verify the effectiveness and usefulness of our proposed method. Even though some events occurred during same period, we showed directional changes which have high-impact in social media referred user interest's, compared with fact-based continuous visualization results.

Monitoring and Tracking of Time Series Security Events using Visualization Interface with Multi-rotational and Radial Axis (멀티 회전축 및 방사축 시각화 인터페이스를 이용한 시계열 보안이벤트의 감시 및 추적)

  • Chang, Beom-Hwan
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.33-43
    • /
    • 2018
  • In this paper, we want to solve the problems that users want to search the progress of attack, continuity of attack, association between attackers and victims, blocking priority and countermeasures by using visualization interface with multi-rotational axis and radial axis structure. It is possible to effectively monitor and track security events by arranging a time series event based on a multi-rotational axis structured by an event generation order, a subject of an event, an event type, and an emission axis, which is an objective time indicating progress of individual events. The proposed interface is a practical visualization interface that can apply attack blocking and defense measures by providing the progress and progress of the whole attack, the details and continuity of individual attacks, and the relationship between attacker and victim in one screen.

  • PDF

Reliable Continuous Object Detection Scheme in Wireless Sensor Networks (무선 센서 네트워크에서 신뢰성 있는 연속 개체 탐지 방안)

  • Nam, Ki-Dong;Park, Ho-Sung;Yim, Young-Bin;Oh, Seung-Min;Kim, Sang-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.12A
    • /
    • pp.1171-1180
    • /
    • 2010
  • In wireless sensor networks, reliable event detection is one of the most important research issues. For the reliable event detection, previous works usually assume the events are only individual objects such as tanks and soldiers. Recently, many researches focus on detection of continuous objects such as wild fire and bio-chemical material, but they merely aim at methods to reduce communication costs. Hence, we propose a reliable continuous object detection scheme. However, it might not be trivial. Unlike individual objects that could be referred as a point, a continuous object is shown in a dynamic two-dimensional diagram since it may cover a wide area and it could dynamically alter its own shape according to physical environments, e.g. geographical conditions, wind, and so on. Hence, the continuous object detection reliability can not be estimated by the indicator for individual objects. This paper newly defines the reliability indicator for continuous object detection and proposes an error recovery mechanism relying on the estimation result from the new indicator.

A Method of Realtime Mining for Summarization and Discovery of a Casual Relationship based on Multidimensional Stream Data (다차원 스트림 데이터 요약 및 인과 관계 탐사를 위한 실시간 데이터 마이닝 기법)

  • Song, Myung-Jin;Kim, Dae-In;Hwang, Bu-Hyun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06c
    • /
    • pp.152-155
    • /
    • 2010
  • 실시간 데이터 마이닝 기법은 다양한 종류의 센서에서 수집된 다차원 스트림 데이터들 사이에 존재하는 의미있는 정보를 탐사할 수 있다. 전통적인 데이터베이스 시스템에서의 마이닝 기법은 정적인 데이터베이스에 기초하므로 실시간으로 수집되는 스트림 데이터는 시간 속성을 갖는 인터벌 이벤트로 요약되어야 한다. 이 논문은 다차원 스트림 데이터 환경에서 스트림 데이터를 요약하고 이들 사이에 존재하는 인과 관계를 탐사하는 실시간 데이터 마이닝 기법을 제안한다. 제안 기법은 센서에서 수집되는 데이터의 대부분이 객체의 정상적인 상태 데이터임을 고려하여 의미있는 이상 이벤트를 선별하여 전송한다. 그리고 스트림 데이터의 연속성을 고려하며 스트림 데이터를 세 가지 상태의 이벤트로 요약하고 인과 관계 규칙을 탐사한다. 인과 관계 규칙은 시간에 따라 이벤트 발생에 영향력을 미치는 원인 이벤트를 발견함으로써 이벤트의 발생을 미리 예측할 수 있다.

  • PDF

A Study on Measuring Sequential Dependencies in Denial of Service Attacks (DoS 공격의 순차의존성 측정에 관한 연구)

  • 홍동호;유황빈
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.395-397
    • /
    • 2003
  • 서비스거부공격(DoS)은 공격의 목표가 되는 호스트에 악의적인 패킷을 단지 하나만 보냄으로써 공격이 이루어 질 수 없다. 그렇기 때문에 침입탐지시스템에서는 패킷에 대한 일련의 순차성을 알아냄으로써 연속적인 패킷을 보내는 DoS 공격으로서의 침입을 탐지해 내는 것이 가능하다. 본 연구에서는 네트워크 패킷에 대한 송신지의 주소와 서비스, 목적지의 주소와 서비스를 이용하여 이벤트를 정의 하였으며. 이렇게 정의된 이벤트를 이용하여 정상적인 상황에서의 이벤트에 대한 순차의존성과 DoS 공격 상황에서의 이벤트에 대한 순차의존성을 알아내었다. 이벤트에 대한 순차의존성을 측정하기 위해서 정상 이벤트가 발생하는 확률을 이용하였으며. 더 나아가서는 정보이론 분야에서의 조건부 엔트로피의 사용도 제안하였다.

  • PDF

Network Security Visualization for Trend and Correlation of Attacks (네트워크 공격 추이 및 공격 연관 정보 시각화)

  • Chang, Beom-Hwan
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.27-34
    • /
    • 2017
  • Network security visualization technique using security alerts provide the administrator with intuitive network security situation by efficiently visualizing a large number of security alerts occurring from the security devices. However, most of these visualization techniques represent events using overlap the timelines of the alerts or Top-N analysis by their frequencies resulting in failing to provide information such as the attack trend, the relationship between attacks, the point of occurrence of attack, and the continuity of the attack. In this paper, we propose an effective visualization technique which intuitively explains the transition of the whole attack and the continuity of individual attacks by arranging the events spirally according to timeline and marking occurrence point and attack type. Furthermore, the relationship between attackers and victims is provided through a single screen view, so that it is possible to comprehensively monitor not only the entire attack situation but also attack type and attack point.

An Automatic Discontinuity Extraction Method from 3D Seismic Data (3차원 탄성파 자료로부터 불연속면 자동 추출기법)

  • Ji Jun
    • Geophysics and Geophysical Exploration
    • /
    • v.4 no.3
    • /
    • pp.89-95
    • /
    • 2001
  • The final goal of the seismic method is to verify the spatial characteristic of subsurface media. For this purpose, professional interpreters interprete the discontinuities of seismic events from seismic image. This paper introduces a method for automatic discontinuity extraction from 3D seismic image. The method consists of three steps. The first step is for estimating coherency of seismic events from seismic data. The second step is to express the potential region where discontinuities may exist in the form of binary image. The third step is to locate the discontinuities by thining the region found in the second step.

  • PDF

Range Stabbing Technique for Continuous Queries on RFID Streaming Data) (RFID 스트리밍 데이타의 연속질의를 위한 영역 스태빙 기법)

  • Park, Jae-Kwan;Hong, Bong-Hee;Lee, Ki-Han
    • Journal of KIISE:Databases
    • /
    • v.36 no.2
    • /
    • pp.112-122
    • /
    • 2009
  • The EPCglobal leading the development in RFID standards proposed Event Cycle Specification (ECSpec) and Event Cycle Reports (ECReports) for the standard about RFID middleware interface. ECSpec is a specification for filtering and collecting RFID tag data and is treated as a Continuous Query (CQ) processed during fixed time intervals repeatedly. ECReport is a specification for describing the results after ECSpec is processed. Thus, it is efficient to apply Query Indexing technique designed for the continuous query processing. This query index processes ECSpecs as data and tag events as queries for efficiency. In logistics environment, the similar or same products are transferred together. Also, when RFID tags attached to the products are acquired, the acquisition events occur massively for the short period. For these properties, it is inefficient to process the massive events one by one. In this paper, we propose a technique reducing similar search process by considering tag events which are collected by the report period in ECSpec, as a range query. For this group processing, we suggest a queuing method for collecting tag events efficiently and a structure for generating range queries in the queues. The experiments show that performance is enhanced by the proposed methods.

Energy-Efficient Multipath Routing Protocol for Supporting Mobile Events in Wireless Sensor Networks (무선 센서 네트워크에서 이동 이벤트를 지원하기 위한 에너지 효율적인 멀티패스 라우팅 프로토콜)

  • Kim, Hoewon;Lee, Euisin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.455-462
    • /
    • 2016
  • Wireless sensor networks have been researched to gather data about events on sensor fields from sources at sinks. Multipath routing is one of attractive approaches to reliably send data against the problem of frequent breakages on paths from sources to sinks due to node and link failures. As mobile events such as humans, animals, and vehicles are considered, sources may be continuously generated according to the movement of the mobile event. Thus, mobile events provide new challenging issue in multipath routing. However, the research on multipath routing mainly focus on both efficient multipath construction from sources to static sinks and fast multipath reconstruction against path breakages. Accordingly, the previous multipath routing protocols request each source continuously generated by a mobile event to construct individual multipath from the source to sinks. This induces the increase of multipath construction cost in the previous protocols in proportion to the number of source. Therefore, we propose efficient multipath routing protocol for supporting continuous sources generated by mobile events. In the proposed protocol, new source efficiently reconstructs its multipath by exploiting the existing multipath of previous sources. To do this, the proposed protocol selects one among three reconstruction methods: a local reconstruction, a global partial one, and a global full one. For a selection decision, we provide an analytical energy consumption cost model that calculates the summation of both the multipath reconstruction cost and the data forwarding cost. Simulation results show that the proposed protocol has better performance than the previous protocol to provide multipath routing for mobile events.