• Title/Summary/Keyword: Log System

Search Result 1,504, Processing Time 0.025 seconds

A u-Farm Cultivation Diary Management System based on Web 2.0 and Smart-Phone for Agricultural Products Cultivation Efficiency (농작물 재배 관리 효율성을 위한 Web 2.0 및 스마트폰 기반의 u-Farm 재배일지 관리 시스템)

  • Kwon, Young Wook;Jung, Se Hoon;Sim, Chun Bo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.1
    • /
    • pp.17-27
    • /
    • 2012
  • Most of the current cultivation log is recorded by growers manually or whose environment information is input based on the grower's own judgement. It is not easy for growers to record the image of disease and insect pests in the cultivation log. In this regards, u-Farm cultivation log management system based on Web 2.0 and smart phone is introduced in this paper, that is used for the effective cultivation management and grower's convenience. In the system, the value of environment information is transmitted to servers via sensors. It designs and implements Web 2.0 Flex so as to make the cultivation log more reliable and provide users with active, convenient GUI in case the log is recorded by desktop. In this process, detailed modules are designed by object-oriented UML considering the reusability and maintenance of the system. Moreover, the system introduced in this paper is proved to be more excellent by the qualitative assessment compared with the other researches.

CERES: A Log-based, Interactive Web Analytics System for Backbone Networks (CERES: 백본망 로그 기반 대화형 웹 분석 시스템)

  • Suh, Ilhyun;Chung, Yon Dohn
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.10
    • /
    • pp.651-657
    • /
    • 2015
  • The amount of web traffic has increased as a result of the rapid growth of the use of web-based applications. In order to obtain valuable information from web logs, we need to develop systems that can support interactive, flexible, and efficient ways to analyze and handle large amounts of data. In this paper, we present CERES, a log-based, interactive web analytics system for backbone networks. Since CERES focuses on analyzing web log records generated from backbone networks, it is possible to perform a web analysis from the perspective of a network. CERES is designed for deployment in a server cluster using the Hadoop Distributed File System (HDFS) as the underlying storage. We transform and store web log records from backbone networks into relations and then allow users to use a SQL-like language to analyze web log records in a flexible and interactive manner. In particular, we use the data cube technique to enable the efficient statistical analysis of web log. The system provides users a web-based, multi-modal user interface.

An optical object recognition system using log-polar coordinate transform of power spectrum and NJTC (파워스펙트럼의 Log-polar 좌표변환 및 NJTC를 이용한 광 물체 인식 시스템)

  • 이상이;채호병;이승현;김은수
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.33A no.6
    • /
    • pp.178-188
    • /
    • 1996
  • In this paper, we propose a new opto-digital object recognition system which has rotation, scale, and shift invariant characteristics. The fourier power spectrum of the object image is modified to get shift invariance. The log-polar transform is used for rotation and scale invariance. And the decision of similarities is performed by nonlinear joint transform correlator (NJTC) that can control the ratio of phase and amplitude signals. Experimental verification of th eproposed optical object recognition system is presented.

  • PDF

Windows based PC Log Collection System using Open Source (오픈소스를 이용한 윈도우 기반 PC 로그 수집 시스템)

  • Song, Jungho;Kim, Hakmin;Yoon, Jin
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.7
    • /
    • pp.332-337
    • /
    • 2016
  • System administrator or security managers need to collect logs of computing device (desktop or server), which are used for the purpose of cause-analysis of security incident and discover if damage to system was either caused by hacking or computer virus. Furthermore, appropriate log maintenance helps preventing security breech incidents through identification of vulnerability. In addition, it can be utilized for prevention of data leakage through the insider. In the paper, we present log collection system developed using open source supported by commands and basic methods of Windows. Furthermore, we aim to collect log information to enable search and analysis from diverse perspectives and to propose a way to integrate with open source-based search engine system.

Attack Detection Technology through Log4J Vulnerability Analysis in Cloud Environments (클라우드 환경에서 Log4J 취약점 분석을 통한 공격 탐지 기술)

  • Byeon, Jungyeon;Lee, Sanghee;Yoo, Chaeyeon;Park, Wonhyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.557-559
    • /
    • 2022
  • The use of open source has the advantage that the development environment is convenient and maintenance is easier, but there is a limitation in that it is easy to be exposed to vulnerabilities from a security point of view. In this regard, the LOG4J vulnerability, which is an open source logging library widely used in Apache, was recently discovered. Currently, the risk of this vulnerability is at the 'highest' level, and developers are using it in many systems without being aware of such a problem, so there is a risk that hacking accidents due to the LOG4J vulnerability will continue to occur in the future. In this paper, we analyze the LOG4J vulnerability in detail and propose a SNORT detection policy technology that can detect vulnerabilities more quickly and accurately in the security control system. Through this, it is expected that in the future, security-related beginners, security officers, and companies will be able to efficiently monitor and respond quickly and proactively in preparation for the LOG4J vulnerability.

  • PDF

Utilization of Log Data Reflecting User Information-Seeking Behavior in the Digital Library

  • Lee, Seonhee;Lee, Jee Yeon
    • Journal of Information Science Theory and Practice
    • /
    • v.10 no.1
    • /
    • pp.73-88
    • /
    • 2022
  • This exploratory study aims to understand the potential of log data analysis and expand its utilization in user research methods. Transaction log data are records of electronic interactions that have occurred between users and web services, reflecting information-seeking behavior in the context of digital libraries where users interact with the service system during the search for information. Two ways were used to analyze South Korea's National Digital Science Library (NDSL) log data for three days, including 150,000 data: a log pattern analysis, and log context analysis using statistics. First, a pattern-based analysis examined the general paths of usage by logged and unlogged users. The correlation between paths was analyzed through a χ2 analysis. The subsequent log context analysis assessed 30 identified users' data using basic statistics and visualized the individual user information-seeking behavior while accessing NDSL. The visualization shows included 30 diverse paths for 30 cases. Log analysis provided insight into general and individual user information-seeking behavior. The results of log analysis can enhance the understanding of user actions. Therefore, it can be utilized as the basic data to improve the design of services and systems in the digital library to meet users' needs.

A study on log diameter classes of Korean softwood log (국산 침엽수 원목의 경급구분 기준에 관한 연구)

  • Park, Jung-Hwan;Kim, Kwang-Mo;Eom, Chang-Deuk;Jung, Doo-Jin
    • Journal of the Korean Wood Science and Technology
    • /
    • v.41 no.4
    • /
    • pp.337-345
    • /
    • 2013
  • Log grading rules are essential tools to ensure the quality of logs in distribution structure. The rules should reflect the long experience and accepted usage practice in the market. A gap between the rules and market should be improved based on analysis of log qualities that produced and market demand. In this study more than ten millions logs which were produced by 5 Regional Forest Services in 2010~2011 period, were analyzed in their qualities including diameters and lengths by species. A proposal was driven to improve the current log grading rules in terms of log diameter classes and length. The followings are the summary of this study. Most of domestic softwood logs are belong to small diameter class of 100~160 mm, which imply the diameter classes of current log grading rules are immoderate. Distributions of log diameter shows distinctive patterns by species, which indicate a necessity of differentiated diameter classes by species in an improved rules. Lengths of logs in productions do not corresponding to the demands and preferences in sawmills. Therefore it is highly recommended to include log length term in an improved log grading system. Based on these findings, 6 log grading systems for 3 species groups of softwood are newly proposed to improve current log grading rules. Limits of log diameter and log length are also proposed for each log grading system.

A Customized Tourism System Using Log Data on Hadoop (로그 데이터를 이용한 하둡기반 맞춤형 관광시스템)

  • Ya, Ding;Kim, Kang-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.2
    • /
    • pp.397-404
    • /
    • 2018
  • As the usage of internet is increasing, a lot of user behavior are written in a log file and the researches and industries using the log files are getting activated recently. This paper uses the Hadoop based on open source distributed computing platform and proposes a customized tourism system by analyzing user behaviors in the log files. The proposed system uses Google Analytics to get user's log files from the website that users visit, and stores search terms extracted by MapReduce to HDFS. Also it gathers features about the sight-seeing places or cities which travelers want to tour from travel guide websites by Octopus application. It suggests the customized cities by matching the search terms and city features. NBP(next bit permutation) algorithm to rearrange the search terms and city features is used to increase the probability of matching. Some customized cities are suggested by analyzing log files for 39 users to show the performance of the proposed system.

Auto Configuration Module for Logstash in Elasticsearch Ecosystem

  • Ahmed, Hammad;Park, Yoosang;Choi, Jongsun;Choi, Jaeyoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.39-42
    • /
    • 2018
  • Log analysis and monitoring have a significant importance in most of the systems. Log management has core importance in applications like distributed applications, cloud based applications, and applications designed for big data. These applications produce a large number of log files which contain essential information. This information can be used for log analytics to understand the relevant patterns from varying log data. However, they need some tools for the purpose of parsing, storing, and visualizing log informations. "Elasticsearch, Logstash, and Kibana"(ELK Stack) is one of the most popular analyzing tools for log management. For the ingestion of log files configuration files have a key importance, as they cover all the services needed to input, process, and output the log files. However, creating configuration files is sometimes very complicated and time consuming in many applications as it requires domain expertise and manual creation. In this paper, an auto configuration module for Logstash is proposed which aims to auto generate the configuration files for Logstash. The primary purpose of this paper is to provide a mechanism, which can be used to auto generate the configuration files for corresponding log files in less time. The proposed module aims to provide an overall efficiency in the log management system.

A Design of Syslog Real-time Monitoring System (Syslog 실시간 감시시스템 설계)

  • Kim, Do-Hyeong;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.43-48
    • /
    • 2008
  • Previously, we need to log-in to the target system to check the system log. This is a problem that can not be monitored in real time. This paper designed a syslog real-time monitoring system to solve this problem. The proposed system be able to detect a problem of system in real time without log-in process and be able to solve problems immediately. The proposed syslog real-time monitoring system in this paper is based on Windows OS.

  • PDF