• Title/Summary/Keyword: Access Log

Search Result 198, Processing Time 0.035 seconds

Program Plagiarism Detection through Memory Access Log Analysis (메모리 액세스 로그 분석을 통한 프로그램 표절 검출)

  • Park, Sung-Yun;Han, Sang-Yong
    • The KIPS Transactions:PartD
    • /
    • v.13D no.6 s.109
    • /
    • pp.833-838
    • /
    • 2006
  • Program Plagiarism is an infringement of software copyright. In detecting program plagiarism, many different source program comparison methods has been studied. But, it is not easy to detect plagiarized program that made a few cosmetic changes in program structures and variable names In this paper, we propose a new ground-breaking technique in detecting plagiarism by Memory Access Log Analysis.

Development of Macro Program Detection System using Access_log (Access_log를 활용한 매크로 프로그램 탐지 시스템 개발)

  • Kim, Jun-young;Kim, Kyu-rim;Park, Han-sol;An, Seung-hwan;Lee, Hyun-tak;Choi, Sang-Yong;Lee, Jong-Rak
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.103-106
    • /
    • 2020
  • 매크로 프로그램에 의한 피해는 꾸준히 보고되어 왔다. 최근 코로나 19로 인해 마스크 품귀 현상이 발생하여 매크로 프로그램을 이용한 구매가 사회적 이슈로 떠오르면서 매크로에 대하여 법적 처벌을 하는 등 매크로에 대한 관심이 부각되고 있다. 본 논문에서는 매크로 프로그램을 효과적으로 탐지하기 위한 방법을 제안한다. 본 논문에서는 매크로 탐지를 위해 access.log의 다양한 필드를 분석하고, 이 중 매크로 식별에 효과가 있는 필드를 추출하여 매크로를 탐지한다. 제안하는 기술의 효과성 검증을 위해 매크로의 공통적인 기능이 포함된 매크로 프로그램을 직접 제작하고, 실제 구매 웹사이트와 유사한 판매 사이트를 제작하여 실험을 통해 제안하는 방법이 매크로를 효과적으로 탐지하는 것을 보인다.

  • PDF

Directory Access Behavior of the NAVER users via Log Analysis (로그 분석을 통한 네이버 이용자의 디렉토리 접근 행태에 관한 연구)

  • 배희진;이준호;박소연
    • Journal of Korean Library and Information Science Society
    • /
    • v.35 no.1
    • /
    • pp.1-17
    • /
    • 2004
  • Most web portals provide a web directory service which selects and classifies web sites according to their subject matter. In order to investigate the directory access behavior of general Korean web users, this study analyzes directory access logs of NAVER, a major Korean web search engine. This study suggests a methodology to classify the total sessions into six different session types. This study also discusses directory access behaviors of the NAVER users by examining the distribution of sessions according to session types, the lengths of navigation within a session, and the most frequently visited categories. It is expected that this study could contribute to the development of more effective web directory services.

  • PDF

Design and Implementation of Customer Personalized System Using Web Log and Purchase Database

  • Lee Jae-Hoon;Chung Hyun-Sook;Lee Sung-Joo
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.6 no.1
    • /
    • pp.21-26
    • /
    • 2006
  • In this paper, we propose a customer personalized system that presents the web pages to users which are customized to their individuality. It analyzes the action of users who visit the shopping mall, and preferentially supplies the necessary information to them. When they actually buy some items, it forecasts the user's access pattern to web site and their following purchasable items and improves their web page on the bases of their individuality. It reasons the relation among the web documents and among the items by using the log data of web server and the purchase information of DB. For reasoning, it employs Apriori algorithm, which is a method that searches the association rule. It reasons the web pages by considering the user's access pattern and time by using the web log and reasons the user's purchase pattern by using the purchase information of DB. On the basis of the relation among them, it appends the related web pages to link of user's web pages and displays the inferred goods on user's web pages.

Customer Personalized System of eCRM Using Web Log Mining and Rough Set

  • Lee, Jae-Hoon;Chung, Il-Yong;Lee, Sung-Joo
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2006.11a
    • /
    • pp.29-32
    • /
    • 2006
  • In this paper, we propose a customer personalized system that presents the web pages to users which are customized to their individuality. It analyzes the action of users who visit the shopping mall, and preferentially supplies the necessary information to them. When they actually buy some items, it forecasts the users' access pattern to web site and their following purchasable items and improves their web pare on the bases of their individuality. It reasons the relation among the web documents and among the items by using the log data of web server and the purchase information of DB. For reasoning it employs Rough Set, which is a method that searches the association rule and offers most suitable cases by reduces cases. It reasons the web pages by considering the users' access pattern and time by using the web log and reasons the users' purchase pattern by using the purchase information of DB. On the basis of the relation among them, it appends the related web pages to link of users' web pages and displays the inferred goods on users' web pages.

  • PDF

Utilization Pattern Analysis of an Enterprise Information System using Event Log Data (로그 데이터를 이용한 기업 정보 시스템의 사용 패턴 분석)

  • Han, Kwan Hee
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.10
    • /
    • pp.723-732
    • /
    • 2022
  • The success of enterprise information system(EIS) is crucial to align with corporate strategies and eventually attain corporate goals. Since one of the factors to information system success is system use, managerial efforts to measure the level of EIS utilization is vital. In this paper, the EIS utilization level is analyzed using system access log data. In particular, process sequence patterns and clustering of similar functions are identified in more detail based on a process mining method, in addition to basic access log statistics. The result of this research can be used to improve existing information system design by finding real IS usage sequences and function clusters.

Research on Data Acquisition Strategy and Its Application in Web Usage Mining (웹 사용 마이닝에서의 데이터 수집 전략과 그 응용에 관한 연구)

  • Ran, Cong-Lin;Joung, Suck-Tae
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.3
    • /
    • pp.231-241
    • /
    • 2019
  • Web Usage Mining (WUM) is one part of Web mining and also the application of data mining technique. Web mining technology is used to identify and analyze user's access patterns by using web server log data generated by web users when users access web site. So first of all, it is important that the data should be acquired in a reasonable way before applying data mining techniques to discover user access patterns from web log. The main task of data acquisition is to efficiently obtain users' detailed click behavior in the process of users' visiting Web site. This paper mainly focuses on data acquisition stage before the first stage of web usage mining data process with activities like data acquisition strategy and field extraction algorithm. Field extraction algorithm performs the process of separating fields from the single line of the log files, and they are also well used in practical application for a large amount of user data.

An Empirical Study on E-learning Participation Affected by Flow Experience and Internet Addiction (플로우 경험과 인터넷 중독이 이러닝 참여에 미치는 영향)

  • Lee, Ju-Yang;Jang, Phil-Sik
    • Journal of Digital Convergence
    • /
    • v.10 no.8
    • /
    • pp.341-346
    • /
    • 2012
  • This paper reports the findings of research into the effect of flow experience and internet addiction on e-learning participation. The total number of access, playing time of contents and lag time (time between content upload and first access) were investigated as e-learning participation by analyzing web log data. The paper also examines the relationship between academic achievement and e-learning participation. The results suggest that the flow experience significantly correlates with all variables related with e-learning participation and internet addiction significantly correlates with lag time. It is found that female students significantly access more, longer and have shorter lag time than their male counterparts. It also suggest total number of access, lag time and gender difference have significant effect on academic achievement.

A Study of Analysis of Hacking Attacks on Cyber Terrorism and Prognostic Analysis of Phenomena (사이버테러에 대한 해킹공격 분석과 전조 현상 분석)

  • Noh, Jung Ho;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.123-126
    • /
    • 2013
  • Access control system, when operating the infrastructure manager and the permissions for the user to clearly define the terminology that is. Various IT incidents still happening frequently occur, and these incidents in order to prevent the situation of access control is needed. In this study, the Copy command by hackers hacking incidents, such as walking dangerous limits for instructions attacks in advance, and also the internal administrator accident accidental limit command to walk off the risk in advance and even if the incident occurred access to the command history log and post it as evidence through the analysis techniques that can be utilized are described.

  • PDF

Performance Prediction of Interleave-Division Multiple Access Scheme based on Log-likelihood Ratio (LLR) for An Efficient 4G Mobile Radio System (효율적4세대 이동무선시스템을 위한 대수가능성비 기반의 인터리버 분할 다중접속기술의 성능 예측)

  • Chung, Yeon-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.7
    • /
    • pp.1328-1334
    • /
    • 2009
  • This paper presents a prediction mechanism of performance for an efficient interleave-division multiple access (IDMA) scheme that is being considered as 4th generation mobile radio system. The scheme is based upon log-likelihood ratio (LLR) to predict the performance of the IDMA. The conventional IDMA system simply passes the LLR values to a coarse estimation process in the receiver over a pre-defined number of iterations for an acceptable performance. The proposed IDMA system uses the LLRs to predict its BER performance and thus the iterative operation at the receiver can significantly be reduced when the performance attains an acceptable level. Performance evaluation shows that the proposed scheme of the IDMA with the LLRs used for the prediction provides a comparable BER performance. The use of the LLRs can facilitate an efficient design of the IDMA system that is a strong candidate system for 4G mobile radio systems.