• Title/Summary/Keyword: Access Log

Search Result 199, Processing Time 0.021 seconds

Online Snapshot Method based on Directory and File Change Tracking for Virtual File System (가상파일시스템에서 디렉토리 및 파일 변경 추적에 기반한 온라인 스냅샷 방법)

  • Kim, Jinsu;Song, Seokil;Shin, Jae Ryong
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.5
    • /
    • pp.417-425
    • /
    • 2019
  • Storage snapshot technology allows to preserve data at a specific point in time, and recover and access data at a desired point in time. It is an essential technology for storage protection application. Existing snapshot methods have some problems in that they dependent on storage hardware vendor, file system or virtual block device. In this paper, we propose a new snapshot method for solving the problems and creating snapshots on-line. The proposed snapshot method uses a method of extracting the log records of update operations at the virtual file system layer to enable the snapshot method to operate independently on file systems, virtual block devices, and storage hardwares. In addition, the proposed snapshot mehod creates and manages snapshots for directories and files without interruption to the storage service. Finally, through experiments we measure the snapshot creation time and the performance degradation caused by the snapshot.

Methodology for Search Intent-based Document Recommendation

  • Lee, Donghoon;Kim, Namgyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.6
    • /
    • pp.115-127
    • /
    • 2021
  • It is not an easy task for a user to find the correct documents that a user really wanted at once from a vast amount of the search results. For this reason, various methods of recommending documents by taking the user's preferences into consideration based on the user's document browsing history have been proposed. However, the document recommendation methodology based on the document browsing history also has a limitation that only the information the user has viewed is utilized, but the intent of the user searching for the document is not fully utilized. Therefore, we propose a document recommendation method based on the user's search intent that utilizes information on "Why" the user reads the document, instead of the information on "Who" reads the document. In order to confirm the feasibility of the proposed methodology, an experiment was conducted by analyzing 239,438 actual user's search history of one of the most popular e-commerce platform companies in Korea. As a result, our methodology showed superior performance compared to the existing content-based or simple browsing history-based recommendation model.

Vulnerability analysis for AppLock Application (AppLock 정보 은닉 앱에 대한 취약점 분석)

  • Hong, Pyo-gil;Kim, Dohyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.845-853
    • /
    • 2022
  • As the memory capacity of smartphone increases, the type and amount of privacy stored in the smartphone is also increasing. but recently there is an increasing possibility that various personal information such as photos and videos of smartphones may be leaked due to malicious apps by malicious attackers or other people such as repair technicians. This paper analyzed and studied the security and vulnerability of these vault apps by analyzing the cryptography algorithm and data protection function. We analyzed 5.3.7(June 13, 2022) and 3.3.2(December 30, 2020) versions of AppLock, the most downloaded information-hidding apps registered with Google Play, and found various vulnerabilities. In the case of access control, there was a vulnerability in that values for encrypting patterns entered by users were hardcoded into plain text in the source code, and encrypted pattern values were stored in xml files. In addition, in the case of the vault function, there was a vulnerability in that the files and log files for storing in the vault were not encrypted.

Analysis of the Possibility of Recovering Deleted Flight Records by DJI Drone Model (DJI 드론 모델별 삭제 비행기록 복구 가능성 분석)

  • YeoHoon Yoon;Joobeom Yun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.609-619
    • /
    • 2023
  • Recently, crimes using drones, one of the IoT industries have been continuously reported. In particular, drones are characterized by easy access and free movement, so they are used for various crimes such as transporting explosives, transporting drugs, and illegal recording. In order to analyze and investigate these criminal acts, drone forensic research is highly emphasized. Media data, PII, and flight records are digital forensic artifacts that can be acquired from drones, in particluar flight records are important artifacts since they can be used to trace drone activities. Therefore, in this paper, the characteristics of the deleted flight record files of DJI drones are presented and verified using the Phantom3, Phantom4 andMini2 models, two drones with differences in characteristics. Additionally, the recovery level is analyzed using the flight record file characteristics, and lastly, drones with the capacity to recover flight records for each drone model and drone models without it are classified.

A Study on DB Security Problem Improvement of DB Masking by Security Grade (DB 보안의 문제점 개선을 위한 보안등급별 Masking 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.4
    • /
    • pp.101-109
    • /
    • 2009
  • An encryption module is equipped basically at 8i version ideal of Oracle DBMS, encryption module, but a performance decrease is caused, and users are restrictive. We analyze problem of DB security by technology by circles at this paper whether or not there is an index search, object management disorder, a serious DB performance decrease by encryption, real-time data encryption beauty whether or not there is data approach control beauty circular-based IP. And presentation does the comprehensive security Frame Work which utilized the DB Masking technique that is an alternative means technical encryption in order to improve availability of DB security. We use a virtual account, and set up a DB Masking basis by security grades as alternatives, we check advance user authentication and SQL inquiry approvals and integrity after the fact through virtual accounts, utilize to method as collect by an auditing log that an officer was able to do safely DB.

Weblog Analysis of University Admissions Website using Google Analytics (구글 애널리틱스를 활용한 대학 입시 홈페이지 웹로그 분석)

  • Su-Hyun Ahn;Sang-Jun Lee
    • Journal of Practical Engineering Education
    • /
    • v.16 no.1_spc
    • /
    • pp.95-103
    • /
    • 2024
  • With the rapid decline of the school-age population, the competition for admissions has increased and marketing through digital channels has become more important, so universities are investing more resources in online promotion and communication to recruit new students. This study uses Google Analytics, a web log analysis tool, to track the visitor behavior of a university admissions website and establish a digital marketing strategy based on it. The analysis period was set from July 1, 2023, when Google Analytics 4(GA4) was integrated, to January 10, 2024, when the college admissions process was completed. The analysis revealed interesting patterns such as geographical information based on visitors' access location, devices(operating systems) and browsers used by visitors, acquisition channels through visitors traffic, conversions on pages and screens that visitors engaged with and visitor flow. Based on this study, we expect universities to find ways to strengthen their admission promotion through digital marketing and effectively communicate with applicants to gain a competitive edge.

Vulnerability Analysis of Remote Multi-Server User Authentication System Based on Smart Card and Dynamic ID (스마트 카드 및 동적 ID 기반 멀티서버 원격 사용자 인증 프로토콜의 취약점 분석)

  • Kwon Soon Hyung;Byeon Hae won;Choi Youn Sung
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.43-52
    • /
    • 2023
  • Many businesses and organizations use smartcard-based user authentication for remote access. In the meantime, through various studies, dynamic ID-based remote user authentication protocols for distributed multi-server environments have been proposed to protect the connection between users and servers. Among them, Qiu et al. proposed an efficient smart card-based remote user authentication system that provides mutual authentication and key agreement, user anonymity, and resistance to various types of attacks. Later, Andola et al. found various vulnerabilities in the authentication scheme proposed by Qiu et al., and overcame the flaws in their authentication scheme, and whenever the user wants to log in to the server, the user ID is dynamically changed before logging in. An improved authentication protocol is proposed. In this paper, by analyzing the operation process and vulnerabilities of the protocol proposed by Andola et al., it was revealed that the protocol proposed by Andola et al. was vulnerable to offline smart card attack, dos attack, lack of perfect forward secrecy, and session key attack.

Control of Diatrype stigma occurred on the bed-log of Shiitake by resistant Shiitake strains (표고골목 해균인 주홍꼬리버섯을 방제하기 위한 저항성 표고균주 선발)

  • Lee, Bong-Hun;Bak, Won-Chull;Ka, Kang-Hyeon;Yoon, Kab-Hee;Park, Hyun;Cha, Byeong-Jin
    • Journal of Mushroom
    • /
    • v.3 no.3
    • /
    • pp.109-114
    • /
    • 2005
  • Attempts were made to control Diatrype stigma occurred on the bed-log of shiitake by resistant shiitake strains. In selection test of resistant shiitake strains, 67 out of 77 strains tested were proved to be resistant to D. stigma. Among them, 13 strains including KFRI 5 were effective to inhibit the access of D. stigma, and 7 strains including KFRI 180 remarkably invaded the territory of D. stigma. Among 31 shiitake strains made by hybridization of resistant strains for D. stigma, 8 strains including KFRI 537 inhibited the access of D. stigma, and 4 strains including KFRI 545 invaded the territory of D. stigma. The effects of temperatures and inoculation orders to the resistance were confirmed in PDA plates and test tubes filled with sawdust of Quercus acutissima. Four kinds of temperature treatments as follows were tested: (1) continuous incubation at $14^{\circ}C$, (2) continuous incubation at $25^{\circ}C$, (3) changing of incubation temperature from $14^{\circ}C$ to $25^{\circ}C$ as soon as mycelia of both shiitake and D. stigma meet together, (4) changing of incubation temperature from $25^{\circ}C$ to $14^{\circ}C$ as soon as mycelia of both shiitake and D. stigma meet together. Three kinds of inoculation procedure were tested: (1) inoculation of shiitake 3 days ahead of D. stigma inoculation, (2) inoculation of D. stigma 3 days ahead of shiitake inoculation, (3) simultaneous inoculation of both fungi. In PDA plate test, the strain KFRI 137 showed outstanding ability to inhibit mycelial growth of D. stigma and the strain KFRI 180 invaded into the territory of D. stigma in most of treatments. Hybrid strains, KFRI 545, 546, and 547 were more resistant than their parent strains, KFRI 488 and 405. In test tube examinations, all the strains of shiitake showed high resistance at the treatment of change in temperature from $14^{\circ}C$ to $25^{\circ}C$ when mycelia of both shiitake and D. stigma meet together. On the other hand, resistance of all the strains growing at $25^{\circ}C$ decreased when the temperature was changed into $14^{\circ}C$ after mycelia of both fungi. In these cases, the resistance reached to 7~20% of the highest resistance. The strain KFRI 259 invaded the territory of D. stigma, contrary to PDA plate test. Among the strains, KFRI 393 strain was the most resistant under the continuous incubation at $25^{\circ}C$.

  • PDF

Development of Empirical Fragility Function for High-speed Railway System Using 2004 Niigata Earthquake Case History (2004 니가타 지진 사례 분석을 통한 고속철도 시스템의 지진 취약도 곡선 개발)

  • Yang, Seunghoon;Kwak, Dongyoup
    • Journal of the Korean Geotechnical Society
    • /
    • v.35 no.11
    • /
    • pp.111-119
    • /
    • 2019
  • The high-speed railway system is mainly composed of tunnel, bridge, and viaduct to meet the straightness needed for keeping the high speed up to 400 km/s. Seismic fragility for the high-speed railway infrastructure can be assessed as two ways: one way is studying each element of infrastructure analytically or numerically, but it requires lots of research efforts due to wide range of railway system. On the other hand, empirical method can be used to access the fragility of an entire system efficiently, which requires case history data. In this study, we collect the 2004 MW 6.6 Niigata earthquake case history data to develop empirical seismic fragility function for a railway system. Five types of intensity measures (IMs) and damage levels are assigned to all segments of target system for which the unit length is 200 m. From statistical analysis, probability of exceedance for a certain damage level (DL) is calculated as a function of IM. For those probability data points, log-normal CDF is fitted using MLE method, which forms fragility function for each damage level of exceedance. Evaluating fragility functions calculated, we observe that T=3.0 spectral acceleration (SAT3.0) is superior to other IMs, which has lower standard deviation of log-normal CDF and low error of the fit. This indicates that long-period ground motion has more impacts on railway infrastructure system such as tunnel and bridge. It is observed that when SAT3.0 = 0.1 g, P(DL>1) = 2%, and SAT3.0 = 0.2 g, P(DL>1) = 23.9%.

A Study on Efficient and Secure user Authentication System based on Smart-card (효율적이고 안전한 스마트카드 기반 사용자 인증 시스템 연구)

  • Byun, Jin-Wook
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.2
    • /
    • pp.105-115
    • /
    • 2011
  • User authentication service is an absolutely necessary condition while securely implementing an IT service system. It allows for valid users to securely log-in the system and even to access valid resources from database. For efficiently and securely authenticating users, smart-card has been used as a popular tool because of its convenience and popularity. Furthermore the smart-card can maintain its own power for computation and storage, which makes it easier to be used in all types of authenticating environment that usually needs temporary storage and additional computation for authenticating users and server. First, in 1981, Lamport has designed an authentication service protocol based on user's smart-card. However it has been criticized in aspects of efficiency and security because it uses hash chains and the revealment of server's secret values are not considered. Over the years, many smart-card based authentication service protocol have been designed. Very recently, Xu, Zhu, Feng have suggested a provable and secure smart-card based authentication protocol. In this paper, first, we define all types of attacks in the smart-card based authentication service. According to the defined attacks, however, the protocol by Xu, Zhu, Feng is weak against an attack that an attacker with secret values of server is able to impersonate a valid user without knowing password and secret values of user. An efficient and secure countermeasure is suggested, then the security is analyzed.