• Title/Summary/Keyword: Log Data Analysis

Search Result 975, Processing Time 0.031 seconds

Methodology of Log Analysis for Intrusion Prevention based on LINUX (리눅스 기반 침입 방지를 위한 로그 분석 방법 연구)

  • Lim, Sung-Hwa;Lee, Do Hyeon;Kim, Jeom Goo
    • Convergence Security Journal
    • /
    • v.15 no.2
    • /
    • pp.33-41
    • /
    • 2015
  • A safe Linux system for security enhancement should have an audit ability that prohibits an illegal access and alternation of data as well as trace ability of illegal activities. In addition, construction of the log management and monitoring system is a necessity to clearly categorize the responsibility of the system manager or administrator and the users' activities. In this paper, the Linux system's Security Log is analyzed to utilize it on prohibition and detection of an illegal protrusion converting the analyzed security log into a database. The proposed analysis allows a safe management of the security log. This system will contribute to the enhancement of the system reliability by allowing quick response to the system malfunctions.

An Optimization Technique for Smart-Walk Systems Using Big Stream Log Data (Smart-Walk 시스템에서 스트림 빅데이터 분석을 통한 최적화 기법)

  • Cho, Wan-Sup;Yang, Kyung-Eun;Lee, Joong-Yeub
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.3
    • /
    • pp.105-114
    • /
    • 2012
  • Various RFID-based smart-walk systems have been developed for guiding disabled people. The system sends appropriate message whenever the disabled people arrived at a specific point. We propose universal design concept and optimization techniques for the smart-walk systems. Universal design concept can be adopted for supporting various kinds of disabled such as a blind person, a hearing-impaired person, or a foreigner in a system. It can be supported by storing appropriate messages set in the message database table depending on the kinds of the disabled. System optimization can be done by analyzing operational log(stream) data accumulated in the system. Useful information can be extracted by analyzing or mining the accumulated operational log data. We show various analysis results from the operational log data.

OLAP System and Performance Evaluation for Analyzing Web Log Data (웹 로그 분석을 위한 OLAP 시스템 및 성능 평가)

  • 김지현;용환승
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.5
    • /
    • pp.909-920
    • /
    • 2003
  • Nowadays, IT for CRM has been growing and developed rapidly. Typical techniques are statistical analysis tools, on-line multidimensional analytical processing (OLAP) tools, and data mining algorithms (such neural networks, decision trees, and association rules). Among customer data, web log data is very important and to use these data efficiently, applying OLAP technology to analyze multi-dimensionally. To make OLAP cube, we have to precalculate multidimensional summary results in order to get fast response. But as the number of dimensions and sparse cells increases, data explosion occurs seriously and the performance of OLAP decreases. In this paper, we presented why the web log data sparsity occurs and then what kinds of sparsity patterns generate in the two and t.he three dimensions for OLAP. Based on this research, we set up the multidimensional data models and query models for benchmark with each sparsity patterns. Finally, we evaluated the performance of three OLAP systems (MS SQL 2000 Analysis Service, Oracle Express and C-MOLAP).

  • PDF

Data-centric XAI-driven Data Imputation of Molecular Structure and QSAR Model for Toxicity Prediction of 3D Printing Chemicals (3D 프린팅 소재 화학물질의 독성 예측을 위한 Data-centric XAI 기반 분자 구조 Data Imputation과 QSAR 모델 개발)

  • ChanHyeok Jeong;SangYoun Kim;SungKu Heo;Shahzeb Tariq;MinHyeok Shin;ChangKyoo Yoo
    • Korean Chemical Engineering Research
    • /
    • v.61 no.4
    • /
    • pp.523-541
    • /
    • 2023
  • As accessibility to 3D printers increases, there is a growing frequency of exposure to chemicals associated with 3D printing. However, research on the toxicity and harmfulness of chemicals generated by 3D printing is insufficient, and the performance of toxicity prediction using in silico techniques is limited due to missing molecular structure data. In this study, quantitative structure-activity relationship (QSAR) model based on data-centric AI approach was developed to predict the toxicity of new 3D printing materials by imputing missing values in molecular descriptors. First, MissForest algorithm was utilized to impute missing values in molecular descriptors of hazardous 3D printing materials. Then, based on four different machine learning models (decision tree, random forest, XGBoost, SVM), a machine learning (ML)-based QSAR model was developed to predict the bioconcentration factor (Log BCF), octanol-air partition coefficient (Log Koa), and partition coefficient (Log P). Furthermore, the reliability of the data-centric QSAR model was validated through the Tree-SHAP (SHapley Additive exPlanations) method, which is one of explainable artificial intelligence (XAI) techniques. The proposed imputation method based on the MissForest enlarged approximately 2.5 times more molecular structure data compared to the existing data. Based on the imputed dataset of molecular descriptor, the developed data-centric QSAR model achieved approximately 73%, 76% and 92% of prediction performance for Log BCF, Log Koa, and Log P, respectively. Lastly, Tree-SHAP analysis demonstrated that the data-centric-based QSAR model achieved high prediction performance for toxicity information by identifying key molecular descriptors highly correlated with toxicity indices. Therefore, the proposed QSAR model based on the data-centric XAI approach can be extended to predict the toxicity of potential pollutants in emerging printing chemicals, chemical process, semiconductor or display process.

Bioequivalence Evaluation of Two brands of Cetirizine HCl 10 mg Tablets (Zyrix and Zyrtec) in Healthy Male Volunteers

  • Im, Ho-Taek;Won, Jong-Hoen;Cho, Sung-Hee;Lee, Heon-Woo;Park, Wan-Su;Rew, Jae-Hwan;Lee, Kyung-Tae
    • Journal of Pharmaceutical Investigation
    • /
    • v.35 no.5
    • /
    • pp.355-360
    • /
    • 2005
  • The purpose of the present study was to evaluate the bioequivalence of two cetirizine HCl tablets, Zyrtec tablet (UCB Pharm. Co., Ltd. Korea, reference product) and Zyrix tablet (Kukje Pharm. Co., Ltd., Korea, test product), according to the guidelines of Korea Food and Drug Administration (KFDA). After adding an internal standard (diazepam), plasma samples were extracted using 1 mL of dichloromethane. Compounds extracted were analyzed by reverse-phase HPLC with ultra-violet detector. This method for determination cetirizine is proved accurate and reproducible with a limit of quantitation of 10 ng/mL in male plasma. Twenty-four healthy male Korean volunteers received each medicine at the cetirizine HCl dose of 10 mg in a $2{\times}2$ crossover study. There was a one-week wash out period between the doses. Plasma concentrations of cetirizine were monitored for over a period of 24 hr after the administration. AUC (the area under the plasma concentration-time curve) was calculated by the linear trapezoidal rule. $C_{max}$ (maximum plasma drug concentration) and $T_{max}$ (time to reach $C_{max}$) were compiled from the plasma concentration-time data. Analysis of variance was carried out using logarithmically transformed AUC and $C_{max}$. No significant sequence effect was found for all of the bioavailability parameters indicating that the crossover design was properly performed. The 90% confidence intervals for the log transformed data were acceptable range of log 0.8 to log 1.25 $(e.g.,\;log\;0.93-log\;1.08\;for\;AUC_{0-t},\;log\;0.91-log\;1.08\;for\;AUC_{0-{\infty}}\;and\;log\;1.01-log\;1.11\;for\;C_{max})$. The major parameters, AUC and $C_{max}$ met the criteria of KFDA for bioequivalence indicating that Zyrix tablet is bioequivalent to Zyrtec tablet.

Development of data analysis and experiment evaluation supporting system(DAEXESS) (실험데이타 분석 및 평가지원시스템(DAEXESS) 개발)

  • 이현철;오인석;심봉식
    • Journal of the Ergonomics Society of Korea
    • /
    • v.16 no.1
    • /
    • pp.119-126
    • /
    • 1997
  • Most of human factors experiments in nuclear industry domain produe lots of experimental data, thus much time is reauired to analyze the data. DAEXESS was developed to reduce resource demands necessary for the analysis work through systematic data analysis requirements and automated data processing based on computer technology. Physilolgical data, human behavior recording data, system log data and verbal protocl can be collected, synthesized and easily analyzed with with respect to time domain in DAEXESS so that analyser is able to look into inte- grated information on operating context. DAEXESS assists analyser to carry out qualitative and quantitative data analysis easily.

  • PDF

A Study on the Analysis of Data Using Association Rule (연관규칙을 이용한 데이터 분석에 관한 연구)

  • 임영문;최영두
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.23 no.61
    • /
    • pp.115-126
    • /
    • 2000
  • In General, data mining is defined as the knowledge discovery or extracting hidden necessary information from large databases. Its technique can be applied into decision making, prediction, and information analysis through analyzing of relationship and pattern among data. One of the most important works is to find association rules in data mining. Association Rule is mainly being used in basket analysis. In addition, it has been used in the analysis of web-log and user-pattern. This paper provides the application method in the field of marketing through the analysis of data using association rule as a technique of data mining.

  • PDF

Security Operation Implementation through Big Data Analysis by Using Open Source ELK Stack (오픈소스 ELK Stack 활용 정보보호 빅데이터 분석을 통한 보안관제 구현)

  • Hyun, Jeong-Hoon;Kim, Hyoung-Joong
    • Journal of Digital Contents Society
    • /
    • v.19 no.1
    • /
    • pp.181-191
    • /
    • 2018
  • With the development of IT, hacking crimes are becoming intelligent and refined. In Emergency response, Big data analysis in information security is to derive problems such as abnormal behavior through collecting, storing, analyzing and visualizing whole log including normal log generated from various information protection system. By using the full log data, including data we have been overlooked, we seek to detect and respond to the abnormal signs of the cyber attack from the early stage of the cyber attack. We used open-source ELK Stack technology to analyze big data like unstructured data that occur in information protection system, terminal and server. By using this technology, we can make it possible to build an information security control system that is optimized for the business environment with its own staff and technology. It is not necessary to rely on high-cost data analysis solution, and it is possible to accumulate technologies to defend from cyber attacks by implementing protection control system directly with its own manpower.

A Study on the Calculation and Provision of Accruals-Quality by Big Data Real-Time Predictive Analysis Program

  • Shin, YeounOuk
    • International journal of advanced smart convergence
    • /
    • v.8 no.3
    • /
    • pp.193-200
    • /
    • 2019
  • Accruals-Quality(AQ) is an important proxy for evaluating the quality of accounting information disclosures. High-quality accounting information will provide high predictability and precision in the disclosure of earnings and will increase the response to stock prices. And high Accruals-Quality, such as mitigating heterogeneity in accounting information interpretation, provides information usefulness in capital markets. The purpose of this study is to suggest how AQ, which represents the quality of accounting information disclosure, is transformed into digitized data in real-time in combination with IT information technology and provided to financial analyst's information environment in real-time. And AQ is a framework for predictive analysis through big data log analysis system. This real-time information from AQ will help financial analysts to increase their activity and reduce information asymmetry. In addition, AQ, which is provided in real time through IT information technology, can be used as an important basis for decision-making by users of capital market information, and is expected to contribute in providing companies with incentives to voluntarily improve the quality of accounting information disclosure.

Design and Implementation of Web Attack Detection System Based on Integrated Web Audit Data (통합 이벤트 로그 기반 웹 공격 탐지 시스템 설계 및 구현)

  • Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.11 no.6
    • /
    • pp.73-86
    • /
    • 2010
  • In proportion to the rapid increase in the number of Web users, web attack techniques are also getting more sophisticated. Therefore, we need not only to detect Web attack based on the log analysis but also to extract web attack events from audit information such as Web firewall, Web IDS and system logs for detecting abnormal Web behaviors. In this paper, web attack detection system was designed and implemented based on integrated web audit data for detecting diverse web attack by generating integrated log information generated from W3C form of IIS log and web firewall/IDS log. The proposed system analyzes multiple web sessions and determines its correlation between the sessions and web attack efficiently. Therefore, proposed system has advantages on extracting the latest web attack events efficiently by designing and implementing the multiple web session and log correlation analysis actively.