• Title/Summary/Keyword: 워크넷

Search Result 124, Processing Time 0.026 seconds

E-Walk Series Analysis Algorithm for Workcase Mining (워크케이스 마이닝을 위한 실행계열분석 알고리즘 설계)

  • Paik Su-Ki
    • Journal of the Korea Computer Industry Society
    • /
    • v.6 no.3
    • /
    • pp.437-446
    • /
    • 2005
  • Workflow mining is a newly emerging research issue for rediscovering and reengineering workflow models from workflow logs containing information about workflow being executed on the workflow engine. This paper newly defines a workflow process reduction mechanism that formally and automatically reduces an original workflow process to a minimal set of activities, which was used proposed 'E-walk series analysis algorithm'. Main purpose of this paper is to minimize discrepancies between the workflow process modeled and the enacted workflow process as it is actually being executed. That means, we compare a complete set of activity firing sequences on buildtime with workflow execution logs which was generate on runtime. For this purpose we proposed two algorithm, the one is 'Activity-Dependent Net Algorithm' and the other is 'E-Walk Series Analysis Algorithm'.

  • PDF

A Development of Intrusion Detection and Protection System using Netfilter Framework (넷필터 프레임워크를 이용한 침입 탐지 및 차단 시스템 개발)

  • Baek, Seoung-Yub;Lee, Geun-Ho;Lee, Geuk
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.33-41
    • /
    • 2005
  • Information can be leaked, changed, damaged and illegally used regardless of the intension of the information owner. Intrusion Detection Systems and Firewalls are used to protect the illegal accesses in the network. But these are the passive protection method, not the active protection method. They only react based on the predefined protection rules or only report to the administrator. In this paper, we develop the intrusion detection and protection system using Netfilter framework. The system makes the administrator's management easy and simple. Furthermore, it offers active protection mechanism against the intrusions.

  • PDF

A Vehicular Authentication Security Mechanism Modeling using Petri Net (Petri Net을 이용한 차량 인증 보안 메커니즘 모델링)

  • Song, Yu-Jin;Lee, Jong-Kun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.04a
    • /
    • pp.364-367
    • /
    • 2014
  • 차량 애드혹 네트워크(VANET : Vehicular Ad-Hoc Network) 환경에서 차량들은 네트워크 인프라를 바탕으로 한 통신들을 통하여 서로의 안전이나 편리성을 도모하고자 많은 관심을 가지고 지금까지 연구되어 왔으며 앞으로도 활발히 연구될 것이다. 그러나 안전성이나 편리성을 도모하고자 연구되어왔던 여러 부분들이 보안문제에 직면하면서 새로운 국면으로 접어들고 있다. 이에 본 논문에서는 차량 애드혹 네트워크에서 차량 간 통신을 효율적이고 안전하게 전송하기 위해 우선되어야 하는 차량의 인증을 위한 보안 메커니즘을 제안하고 이를 패트리넷 모델링 기법을 통해 검증하고자 한다. 본 논문에서 제안하는 차량 인증 보안 메커니즘(VASM : Vehicular Authentication Security Mechanism)은 차량 인증 기능과 함께 패트리넷으로 모델링 함으로써 차량들의 많은 변화로 복잡할 수밖에 없는 VANET에서의 보안요구들을 정의하여 수행하는데 유연하게 대처할 수 있다.

A Workcase Mining Mechanism using Activity Dependency (액티비티 의존성을 이용한 워크케이스 마이닝 메커니즘)

  • Kim Sang-Bae;Kim Hak-Seong;Paik Su-Ki
    • Journal of Internet Computing and Services
    • /
    • v.4 no.6
    • /
    • pp.43-55
    • /
    • 2003
  • Workflow mining is a newly emerging research issue for rediscovering and reengineering workflow models from workflow logs containing information about workflows being executed on the workflow engine. In this paper, we proposed workcase mining which was used dependency among activities. Main purpose of this paper is to minimize discrepancies between the modeled workflow process and the enacted workflow process as it is actually being executed. That is, we can get a complete set of activity firing sequences on buildtime. Besides, we can discover from workflow logs that which path out of all reachable paths a workcase has actually followed through on runtime. For this purpose we proposed two algorithm, the one is 'Activily-Dependent Net Algorithm' and the other is 'E-Walk Series Analysis Algorithm'.

  • PDF

The EMFG Modeling and Analysis for a Workflow (워크플로우의 EMFG 모델링과 분석)

  • Heo, Hu-Sook;Yeo, Jeong-Mo
    • The KIPS Transactions:PartD
    • /
    • v.10D no.7
    • /
    • pp.1189-1196
    • /
    • 2003
  • Owing to the developed If industry, many people are more and more interested in Workflow which is an automated business processing system. In this paper, we present basic structures and various parallel processing structures of a workflow using EMFG (Extended Mark Flow Graph) that makes conceptional design available. And then, We design a workflow with EMFG. We propose the commitability verification method to check whether a workflow can complete or not and the logical bug verification method to find whether invalid components exist or not by using simulation result of it. The proposed EMFG modeling and analysis method for a workflow make it possible to become a visual and formal design. Also, it makes intuitional and mathematical analysis possible.

A Study on Scalable Bluetooth Network for Secure Ubiquitous Environment (안전한 유비쿼터스 환경을 위한 확장성 있는 블루투스 네트워크에 관한 연구)

  • Baek, Jang-Mi;Seo, Dae-Hee
    • Journal of Internet Computing and Services
    • /
    • v.9 no.1
    • /
    • pp.159-170
    • /
    • 2008
  • The ubiquitous network revolution is beginning with the onset of digital convergence, whereby computers, horne appliances, and communications and broadcast media are being unified into digital media with the founding of the information super high speed. This technical advancement is creating a new culture and a new space and accelerating society's transition to the new and unique social paradigm of a 'ubiquitous society'. In particular, studies on ubiquitous communications are well underway. Lately, the focus has been on the Bluetooth technology due to its applicability in various environments. Applying Bluetooth connectivity to new environments such as ubiquitous or sensor networks requires finding new ways of using it. Thus, the scalable Bluetooth piconet scheme with independent slave device is proposed. It follows from work by Sea et al. But extended scatternet is not considered is Kiisc05 paper. Therefore, we propose secure bridge connection scheme for scalable Bluetooth scatternet.

  • PDF

Probability-based Deep Learning Clustering Model for the Collection of IoT Information (IoT 정보 수집을 위한 확률 기반의 딥러닝 클러스터링 모델)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.18 no.3
    • /
    • pp.189-194
    • /
    • 2020
  • Recently, various clustering techniques have been studied to efficiently handle data generated by heterogeneous IoT devices. However, existing clustering techniques are not suitable for mobile IoT devices because they focus on statically dividing networks. This paper proposes a probabilistic deep learning-based dynamic clustering model for collecting and analyzing information on IoT devices using edge networks. The proposed model establishes a subnet by applying the frequency of the attribute values collected probabilistically to deep learning. The established subnets are used to group information extracted from seeds into hierarchical structures and improve the speed and accuracy of dynamic clustering for IoT devices. The performance evaluation results showed that the proposed model had an average 13.8 percent improvement in data processing time compared to the existing model, and the server's overhead was 10.5 percent lower on average than the existing model. The accuracy of extracting IoT information from servers has improved by 8.7% on average from previous models.

Development of Integrated Development Framework for Context-Awareness Simulation based on Multi-Agent System (멀티 에이전트 기반의 상황 인지 시뮬레이션을 위한 통합 개발 프레임워크의 개발)

  • Kim, Tae-Hyung;Choi, Jin-Woo;Woo, Chong-Woo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.538-541
    • /
    • 2010
  • 상황인지 시뮬레이션이란 상황자료의 수집, 추론 및 결론 도출의 과정을 실제 환경이 아닌 가상의 시뮬레이션 환경 안에서 실험해 볼 수 있는 것을 말하며, 상황인지 기술과 DEVS(Discrete Event System Specification), 페트리-넷(Petri-Net)등의 기반 기술이 사용된다. 본 논문에서는 사용자들이 보다 편리하게 상황인지 시스템을 구축하고 실제보다 적은 시간으로 구축된 시스템을 실험할 수 있는 시뮬레이션 환경을 제공할 수 있는 통합 개발 프레임워크를 개발하고자 한다. 시뮬레이션 통합 개발 프레임워크 특징으로는, 첫째 상황인지를 위한 추론 기능을 가지는 에이전트와 시뮬레이션 기능들을 플러그인 및 라이브러리로 제공할 수 있고, 둘째, 통합환경 안에서 제공되는 도구들을 사용하여 사용자들이 보다 편리하게 개발 및 실험을 할 수 있다는 장점이 있다. 따라서 본 논문에서는 상황 아키텍처를 위한 모델 표현 계층, 멀티 에이전트 시스템을 위한 연산 계층, 환경과의 상호작용을 위한 인터랙션 계층, 그리고 시뮬레이션 계층인 4-계층구조의 통합개발환경을 연구하였다.

A Study on Collection and Analysis Method of Malicious URLs Based on Darknet Traffic for Advanced Security Monitoring and Response (효율적인 보안관제 수행을 위한 다크넷 트래픽 기반 악성 URL 수집 및 분석방법 연구)

  • Kim, Kyu-Il;Choi, Sang-So;Park, Hark-Soo;Ko, Sang-Jun;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1185-1195
    • /
    • 2014
  • Domestic and international CERTs are carrying out security monitoring and response services based on security devices for intrusion incident prevention and damage minimization of the organizations. However, the security monitoring and response service has a fatal limitation in that it is unable to detect unknown attacks that are not matched to the predefined signatures. In recent, many approaches have adopted the darknet technique in order to overcome the limitation. Since the darknet means a set of unused IP addresses, no real systems connected to the darknet. Thus, all the incoming traffic to the darknet can be regarded as attack activities. In this paper, we present a collection and analysis method of malicious URLs based on darkent traffic for advanced security monitoring and response service. The proposed method prepared 8,192 darknet space and extracted all of URLs from the darknet traffic, and carried out in-depth analysis for the extracted URLs. The analysis results can contribute to the emergence response of large-scale cyber threats and it is able to improve the performance of the security monitoring and response if we apply the malicious URLs into the security devices, DNS sinkhole service, etc.

Research Trends in Global Cruise Industry Using Keyword Network Analysis (키워드 네트워크 분석을 활용한 세계 크루즈산업 연구동향)

  • Jhang, Se-Eun;Lee, Su-Ho
    • Journal of Navigation and Port Research
    • /
    • v.38 no.6
    • /
    • pp.607-614
    • /
    • 2014
  • This article aims to explore and discuss research trends in global cruise industry using keyword network analysis. We visualize keyword networks in each of four groups of 1982-1999, 2000-2004, 2005-2009, 2010-2014 based on the top 20 keyword nodes' degree centrality and betweenness centrality which are selected among four centrality measurements, comparing them with frequency order. The article shows that keyword frequency collected from 240 articles published in international journals is subject to Zipf's law and nodes degree distribution also exhibits power law. We try to find out research trends in global cruise industry to change some important keywords diachronically, visualizing several networks focusing on the top two keywords, cruise and tourism, belonging to all the four year groups, with high degree and betweenness centrality values. Interestingly enough, a new node, China, connecting the top most keywords, appears in the most recent period of 2010-2014 when China has emerged as one of the rapid development countries in global cruise industry. Therefore keyword network analysis used in this article will be useful to understand research trends in global cruise industry because of increase and decrease of numbers of network types in different year groups and the visual connection between important nodes in giant components.