• Title/Summary/Keyword: Log Analysis System

Search Result 560, Processing Time 0.03 seconds

Integrated Monitoring System using Log Data (로그 데이터를 이용한 통합모니터링 시스템)

  • Jeon, Byung-Jin;Yoon, Deok-Byeong;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.1
    • /
    • pp.35-42
    • /
    • 2017
  • In this paper, we propose to implement an integrated monitoring system using log data to reduce the load of analysis task of information security officer and to detect information leak in advance. To do this, we developed a transmission module between different model DBMS that transmits large amount of log data generated by the individual security system (MSSQL) to the integrated monitoring system (ORACLE), and the transmitted log data is digitized by individual and individual and researches about the continuous inspection and measures against malicious users when the information leakage symptom is detected by using the numerical data.

Calculation and Analysis of Hydrophobicity of the Dyes Synthesized for Unmodified Polypropylene Fibers Using Molecular Descriptors

  • Kim, Tae-Kyeong;Jang, Kyung-Jin;Jeon, Seon-Hee
    • Textile Coloration and Finishing
    • /
    • v.21 no.5
    • /
    • pp.21-26
    • /
    • 2009
  • In order to analyze numerically the hydrophobicity of the new dyes synthesized for unmodified pure polypropylene fibers, the octanol-water partition coefficient (logP), which is one of molecular descriptors representing hydrophobicity of organic compounds, was obtained by a semi-empirical method using Chem3D software. For the dyes of higher logP than around 5, the affinity of the dyes towards unmodified polypropylene fiber was substantial. In contrast to the new dyes for polypropylene, conventional disperse dyes have logP values lower than 5 and exhibited poor affinity.

For Improving Security Log Big Data Analysis Efficiency, A Firewall Log Data Standard Format Proposed (보안로그 빅데이터 분석 효율성 향상을 위한 방화벽 로그 데이터 표준 포맷 제안)

  • Bae, Chun-sock;Goh, Sung-cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.157-167
    • /
    • 2020
  • The big data and artificial intelligence technology, which has provided the foundation for the recent 4th industrial revolution, has become a major driving force in business innovation across industries. In the field of information security, we are trying to develop and improve an intelligent security system by applying these techniques to large-scale log data, which has been difficult to find effective utilization methods before. The quality of security log big data, which is the basis of information security AI learning, is an important input factor that determines the performance of intelligent security system. However, the difference and complexity of log data by various product has a problem that requires excessive time and effort in preprocessing big data with poor data quality. In this study, we research and analyze the cases related to log data collection of various firewall. By proposing firewall log data collection format standard, we hope to contribute to the development of intelligent security systems based on security log big data.

Studies on the Productivity and the Productive Structure of the Forests II. Comparison between the Productivity of Pinus densiflora and of Quercus mongolica Stands located near Choon-Chun City (삼림의 생산구조와 생산력에 대한 연구 II. 춘천지방의 소나무림과 신갈나무림의 비교)

  • 김준호
    • Journal of Plant Biology
    • /
    • v.15 no.3
    • /
    • pp.1-8
    • /
    • 1972
  • A comparison between the productivity of the evergreen needle pine(Pinus densiflora) and of the deciduous broad leaved oak(Quercus mongolica) stands, which is located near Choon-Chun city, Kangwon dist. have been established. The pine stand had a stand density of 938 trees per ha and oak stand had of 638 trees per ha. The diameter at breast height (D) and the height of tree (H) of each tree were measured in sample plot of 800$m^2$. Twelve standard sample trees chose from the sample area felled down, and then weighed the stem, branches and leaves separately, according to both the stratified clip technique and the stem analysis. The vertical distribution of photosynthetic system was arranged effectively for high productivity in the productive structure of both trees. The allometric relation between D2H and dry weight of stem (Ws), branches (Wb) and leaves (Wl) of pine were approximated by log Ws=0.6212 log D2H-0.5383 log Wb=0.4681 log D2H-0.7236 log Wl=0.2582 log D2H-5.1567 and those of oak were approximated by log Ws=0.5125 log D2H+0.0231 log Wb=0.5125 log D2H-0.3755 log Wl=0.8721 log D2H-2.9710 From the above, the standing crops of pine and oak in the sample area were estimated to be as much as 38.83ton and 48.11 ton of dry matter, above ground, per ha, respectively. Annual net production as the sum of the biomass newly formed during one year was appraised at 12.66ton/ha.yr in pine stand and at 8.74 ton/ha.yr in oak. The reason of high productivity of pine stand compared with oak might be resulted from much more about 4 times of the amount of the photosynthetic system, but less non-photosynthetic one of pine than those of oak. To increase the productivity of the forest stands investigated it was necessary to make densly a stand density, to be abundant in the inorganic nutrients and to preserve much water in soil to conserve the litters.

  • PDF

Event Log Validity Analysis for Detecting Threats by Insiders in Control System

  • Kim, Jongmin;Kang, Jiwon;Lee, DongHwi
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.1
    • /
    • pp.16-21
    • /
    • 2020
  • Owing to the convergence of the communication network with the control system and public network, security threats, such as information leakage and falsification, have become possible through various routes. If we examine closely at the security type of the current control system, the operation of the security system focuses on the threats made from outside to inside, so the study on the detection system of the security threats conducted by insiders is inadequate. Thus, this study, based on "Spotting the Adversary with Windows Event Log Monitoring," published by the National Security Agency, found that event logs can be utilized for the detection and maneuver of threats conducted by insiders, by analyzing the validity of detecting insider threats to the control system with the list of important event logs.

Auto Configuration Module for Logstash in Elasticsearch Ecosystem

  • Ahmed, Hammad;Park, Yoosang;Choi, Jongsun;Choi, Jaeyoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.39-42
    • /
    • 2018
  • Log analysis and monitoring have a significant importance in most of the systems. Log management has core importance in applications like distributed applications, cloud based applications, and applications designed for big data. These applications produce a large number of log files which contain essential information. This information can be used for log analytics to understand the relevant patterns from varying log data. However, they need some tools for the purpose of parsing, storing, and visualizing log informations. "Elasticsearch, Logstash, and Kibana"(ELK Stack) is one of the most popular analyzing tools for log management. For the ingestion of log files configuration files have a key importance, as they cover all the services needed to input, process, and output the log files. However, creating configuration files is sometimes very complicated and time consuming in many applications as it requires domain expertise and manual creation. In this paper, an auto configuration module for Logstash is proposed which aims to auto generate the configuration files for Logstash. The primary purpose of this paper is to provide a mechanism, which can be used to auto generate the configuration files for corresponding log files in less time. The proposed module aims to provide an overall efficiency in the log management system.

Utilization Pattern Analysis of an Enterprise Information System using Event Log Data (로그 데이터를 이용한 기업 정보 시스템의 사용 패턴 분석)

  • Han, Kwan Hee
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.10
    • /
    • pp.723-732
    • /
    • 2022
  • The success of enterprise information system(EIS) is crucial to align with corporate strategies and eventually attain corporate goals. Since one of the factors to information system success is system use, managerial efforts to measure the level of EIS utilization is vital. In this paper, the EIS utilization level is analyzed using system access log data. In particular, process sequence patterns and clustering of similar functions are identified in more detail based on a process mining method, in addition to basic access log statistics. The result of this research can be used to improve existing information system design by finding real IS usage sequences and function clusters.

Attack Detection Technology through Log4J Vulnerability Analysis in Cloud Environments (클라우드 환경에서 Log4J 취약점 분석을 통한 공격 탐지 기술)

  • Byeon, Jungyeon;Lee, Sanghee;Yoo, Chaeyeon;Park, Wonhyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.557-559
    • /
    • 2022
  • The use of open source has the advantage that the development environment is convenient and maintenance is easier, but there is a limitation in that it is easy to be exposed to vulnerabilities from a security point of view. In this regard, the LOG4J vulnerability, which is an open source logging library widely used in Apache, was recently discovered. Currently, the risk of this vulnerability is at the 'highest' level, and developers are using it in many systems without being aware of such a problem, so there is a risk that hacking accidents due to the LOG4J vulnerability will continue to occur in the future. In this paper, we analyze the LOG4J vulnerability in detail and propose a SNORT detection policy technology that can detect vulnerabilities more quickly and accurately in the security control system. Through this, it is expected that in the future, security-related beginners, security officers, and companies will be able to efficiently monitor and respond quickly and proactively in preparation for the LOG4J vulnerability.

  • PDF

A Study on Data Pre-filtering Methods for Fault Diagnosis (시스템 결함원인분석을 위한 데이터 로그 전처리 기법 연구)

  • Lee, Yang-Ji;Kim, Duck-Young;Hwang, Min-Soon;Cheong, Young-Soo
    • Korean Journal of Computational Design and Engineering
    • /
    • v.17 no.2
    • /
    • pp.97-110
    • /
    • 2012
  • High performance sensors and modern data logging technology with real-time telemetry facilitate system fault diagnosis in a very precise manner. Fault detection, isolation and identification in fault diagnosis systems are typical steps to analyze the root cause of failures. This systematic failure analysis provides not only useful clues to rectify the abnormal behaviors of a system, but also key information to redesign the current system for retrofit. The main barriers to effective failure analysis are: (i) the gathered data (event) logs are too large in general, and further (ii) they usually contain noise and redundant data that make precise analysis difficult. This paper therefore applies suitable pre-processing techniques to data reduction and feature extraction, and then converts the reduced data log into a new format of event sequence information. Finally the event sequence information is decoded to investigate the correlation between specific event patterns and various system faults. The efficiency of the developed pre-filtering procedure is examined with a terminal box data log of a marine diesel engine.

An e-Commerce Agent System based on Web Site Log Analysis and Case Base (웹사이트 로그 분석과 사례기반의 전자상거래 에이전트 시스템)

  • 나윤지;원동유;이순애;조용환
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.3
    • /
    • pp.363-368
    • /
    • 2002
  • Electronic commerce system must provide information satisfying customers. To do this, many kinds of studies are being advanced actively about electronic commerce support system using intelligent agent technology. This paper suggests electronic commerce system using intelligent multi agent based on Case base and Log analysis. This system can provide suitable information to customers by using knowledge and traffic and system information analysis.

  • PDF