• Title/Summary/Keyword: Access Log

Search Result 199, Processing Time 0.022 seconds

Detection and Location-based Visualization of Anomalous Web Sessions (비정상 웹 세션 탐지 및 지역 기반 시각화)

  • Kim, Sang-Rok;Lee, Jun-Sup;Seo, Jeong-Seok;Cha, Sung-Deok
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10c
    • /
    • pp.616-620
    • /
    • 2006
  • 한 해에도 수많은 해킹 사고가 발생하고 있고, 이 중에서 웹 해킹이 차지하는 비율은 급격하게 증가하고 있다. 또한 최근의 해킹 동향을 분석해 보았을 때 웹 해킹의 비율은 더욱 증가할 것이라고 예상된다. HTTP 프로토콜을 이용한 공격의 특성 상 정상행위와 비정상 행위의 구분이 어렵다. 따라서 웹 서비스에 특화된 침입탐지 시스템이 요구된다. 또한 웹 사이트 관리자는 빠른 탐지와 대응을 위해 이상 행위에 대한 신속하고 정확한 인식을 필요로 한다. 본 논문에서는 이러한 필요성을 기반으로 Location-based Visualization Tool을 제안한다. 웹 사용 현황 및 이상행위에 대해 시각적인 정보를 제공하기 위해 웹 서버의 access log를 분석하여 이상 행위를 탐지하였고, IP정보를 기반으로 지역 정보의 시각화를 구현하였다.

  • PDF

A Study on the Ethical Issues and Sharing Behavior of User's Information in the Era of Big Data

  • Lee, Myung-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.10
    • /
    • pp.43-48
    • /
    • 2016
  • This study is to examine how big data collects user's information and is used; the status quo of exposures of user's information, and various measures of self-control by the user. This study is also to look their ethical issues and discuss problems of privacy concerning big data. As a way for users to self-control their information, they need to check the log-in state of web portal sites and set up their account so that customized advertisement and location information cannot be tracked. When posting a blog, the value of posting should be controlled. When becoming a member of a web site, users must check the access terms before agreement and beware of chained agreements and/or membership joins in order to control the exposure of their personal information. To prevent information abuse through big data through which user's information is collected and analyzed, all users must have the right to control, block or allow personal information. For an individual to have the right to control over his information, users must understand the concept of user's information and practice ethics accompanied by newly given roles in the Internet space, which will lead to the establishment of the sound and mature information society on the Internet.

Tele-Control of Rapid Prototyping Machine System Via Internet (인터넷 기반의 원격 제어를 이용한 RP 시스템 개발)

  • 최태림;송용억;강신일
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2001.04a
    • /
    • pp.24-27
    • /
    • 2001
  • Nowadays, increasing demand of the customized products has led to an increased usage of rapid prototyping in the product development. However, the acquisition price of a rapid prototyping equipment is still too high that not every body can afford to buy one. To offer a wide access to the users who need physical prototypes, a connection of the rapid prototyping equipment to the Internet is a viable step. It would allow a large group of customers all over the world to use the manufacturing capability of a service provider offering this kind of manufacturing service. To realize how such an e-manufacturing concept can look like, a LOM-type 3D printer developed at KIST has been used as test site and connected to the Internet. A possible user can log on to the server of the equipment and view his STL file and start the building operation from a remote place. To see whether the operation runs properly, a CCD camera is used to transmit the actual state of operation online. The result so far proves the feasibility of rapid prototyping on the Internet as well as an order-adaptive manufacturing system via web.

  • PDF

Link Budget of WAVE Communication System for a Reliable ITS Service under Highway Environments (고속도로 환경에서 안정적인 ITS서비스를 위한 WAVE 통신 시스템 link budget 분석)

  • Song, Yoo-seung;Yun, Hyun-jeong
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.14 no.4
    • /
    • pp.80-85
    • /
    • 2015
  • The era of intelligent transportation system(ITS) has been arrived by applying information and communication technology(ICT) to the traffic. One of these technological advances is a wireless communication technology for a high speed vehicle to be connected to an infrastructure(V2I). A variety of road traffic safety services and operator comfort services are being developed by means of WAVE(Wireless Access in a Vehicular Environment) based on IEEE802.11p Standard. In this paper, the link budget is analyzed to provide a reliable quality of these ITS services. Log-distance model and two-ray model is employed for the wave propagation path loss model which is adequate for a highway environment. Reliable cell coverage is suggested for ITS services from the link budget.

The Analysis and Practical Use of Web Sites for Participation and Access in the Age of Digital Intelligence (디지털 지능 시대의 소셜 미디어 참여와 접근을 위한 웹사이트 분석과 활용 방안)

  • Jung, Deok-Gil;Jung, Min-Po;Cho, Hyuk-Gyu;Lho, Young-Uhg;Cho, Jae-Hyun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2011.01a
    • /
    • pp.117-120
    • /
    • 2011
  • 최근의 디지털 기술 및 컴퓨터, 통신 기술의 개발과 확산을 통해 다양한 소셜 미디어의 사용에 따른 디지털 사회가 생성되고 디지털 지능이 출현하여 새로운 디지털 문화와 커뮤니티가 생겨나고 있다. 이러한 추세에 따라 산업체, 교육계 등에서 소셜 미디어의 사용 및 채택 효과에 대한 연구가 필요하다. 또한, 소셜 도구의 사용 기법과 활용 방안이 필요하며, 사용 실태에 대한 조사가 필요하다. 이에 따라, 이 논문에서는 소셜 미디어를 개인 및 회사의 업무에 사용할 수 있는 있는 활용 방안을 마련하기 위하여, 소셜 미디어의 참여와 접근 방안 등에 대한 방법론을 조사하고 제시한다. 소셜 미디어에 접근하고 활용하기 위하여 웹 로그 분석 도구 및 소셜 미디어 콘텐츠 도구 등에 대하여 살펴보고, 웹 사이트 분석과 활용 방안 마련을 위하여 소셜 미디어 메트릭스 활용 방안을 제시한다.

  • PDF

A Query Randomizing Technique for breaking 'Filter Bubble'

  • Joo, Sangdon;Seo, Sukyung;Yoon, Youngmi
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.12
    • /
    • pp.117-123
    • /
    • 2017
  • The personalized search algorithm is a search system that analyzes the user's IP, cookies, log data, and search history to recommend the desired information. As a result, users are isolated in the information frame recommended by the algorithm. This is called 'Filter bubble' phenomenon. Most of the personalized data can be deleted or changed by the user, but data stored in the service provider's server is difficult to access. This study suggests a way to neutralize personalization by keeping on sending random query words. This is to confuse the data accumulated in the server while performing search activities with words that are not related to the user. We have analyzed the rank change of the URL while conducting the search activity with 500 random query words once using the personalized account as the experimental group. To prove the effect, we set up a new account and set it as a control. We then searched the same set of queries with these two accounts, stored the URL data, and scored the rank variation. The URLs ranked on the upper page are weighted more than the lower-ranked URLs. At the beginning of the experiment, the difference between the scores of the two accounts was insignificant. As experiments continue, the number of random query words accumulated in the server increases and results show meaningful difference.

A Study on the DDoS Defense Algorithm using CFC based on Attack Pattern Analysis of TCP/IP Layers (TCP/IP Layer별 공격패턴 분석에 기반한 CFC를 이용한 DDoS 방어 알고리즘 연구)

  • Seo, Woo Seok;Park, Dea Woo;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.117-130
    • /
    • 2010
  • Paper is on defense for so-called internet crisis, the attack of DDoS (Distributed Denial of Service) which was targeted to the central government ministries, financial sector, and portal sites of chief counties including Korea on June 7th, 2009 as its start. By conducting attack with various DDoS attacking methods in the lab environment and dividing networks targeted by the attack by layers, this paper records and analyzes the chief information for attack, destination information of packets, defense policy setting, and the flow of packet attack with the subjects of the networks separated. This study suggests CFC system using multiple firewalls applying defense policy corresponding to the target layer for ultimate attack and tests it according to the result of analyzing the attack packet information and its amount, log analysis, access recording port, and MAC and IT information, etc. by layers. This article is meaningful in that it analyzes the attack by layers, establishes firewall policy for protecting each layer, and secures accurate mechanism for detect and defense.

Directed Graph by Integrating Web Document Hyperlink and Web Access Log for Web Mining (웹 마이닝을 위한 웹 문서 하이퍼링크와 웹 접근로그를 통합한 방향그래프)

  • Park, Chul-Hyun;Lee, Seong-Dae;Kwak, Yong-Won;Jeon, Sung-Hwan;Park, Hyu-Chan
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11b
    • /
    • pp.16-18
    • /
    • 2005
  • 웹은 사용자가 원하는 정보를 쉽고 정확하게 검색할 수 있도록 웹 문서를 자료구조화하여 보다 신뢰성 있는 패턴을 추출하고 사용자의 특성과 행동 패턴을 적용하여 개인화 하여야한다. 본 논문에서는 개인화하기 위한 전처리 과정으로서 웹 문서를 구조화 하는 방법을 제안한다. 제안 방법은 기본적으로 웹 문서 태그의 하이퍼링크를 깊이 우선 탐색 알고리즘을 사용하여 방향그래프를 만드는 것이다. 이때 웹 문서 태그 탐색 시 플래시, 스크립트 등의 찾기 힘든 하이퍼링크를 찾는 문제와 '뒤로' 버튼 사용 시 웹 접근로그에 기록되지 않는 문제점을 보완한다. 이를 위해 클릭 스트림을 스택에 저장하여 이미 만들어진 방향그래프와 비교하여 새롭게 찾은 정점과 간선을 추가함으로써 보다 신뢰성높은 방향그래프를 만든다.

  • PDF

Coded and Scalar Prefix Trees: Prefix Matching Using the Novel Idea of Double Relation Chains

  • Behdadfar, Mohammad;Saidi, Hossein;Hashemi, Massoud Reza;Lin, Ying-Dar
    • ETRI Journal
    • /
    • v.33 no.3
    • /
    • pp.344-354
    • /
    • 2011
  • In this paper, a model is introduced named double relation chains (DRC) based on ordered sets. It is proved that using DRC and special relationships among the members of an alphabet, vectors of this alphabet can be stored and searched in a tree. This idea is general; however, one special application of DRC is the longest prefix matching (LPM) problem in an IP network. Applying the idea of DRC to the LPM problem makes the prefixes comparable like numbers using a pair of w-bit vectors to store at least one and at most w prefixes, where w is the IP address length. This leads to good compression performance. Based on this, two recently introduced structures called coded prefix trees and scalar prefix trees are shown to be specific applications of DRC. They are implementable on balanced trees which cause the node access complexity for prefix search and update procedures to be O(log n) where n is the number of prefixes. As another advantage, the number of node accesses for these procedures does not depend on w. Additionally, they need fewer number of node accesses compared to recent range-based solutions. These structures are applicable on both IPv4 and IPv6, and can be implemented in software or hardware.

The design of User authentication system by using Public key cryptography system and one time password (공개키 암호화 시스템과 일회성 패스워드를 이용한 사용자 인증 시스템 설계)

  • 이상준;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.498-501
    • /
    • 2002
  • In the process of Log-In to the system, clear User authentication is the beginning of the information protection service. In the open communication system of today, it is true that a password as security instrument and the inner mechanism of the system and cryptography algorithm for the support of this are also poor. For this reason, this dissertation had a final aim to design the user authentication system, which offer the accuracy and safety. It used RSA and CBC mode of DES as cryptography algorithm and used the Challenge-Response scheme at a authentication protocol and designed the User authentication system to which user access using one time password, output of token to guarantee the safety of the authentication protocol. Alto by using the Public key cryptography algorithm, it could embody the more safe User authentication system.

  • PDF