• Title/Summary/Keyword: Log data analysis

Search Result 972, Processing Time 0.029 seconds

Web Server Log Visualization

  • Kim, Jungkee
    • International journal of advanced smart convergence
    • /
    • v.7 no.4
    • /
    • pp.101-107
    • /
    • 2018
  • Visitors to a Web site leave access logs documenting their activity in the site. These access logs provide a valuable source of information about the visitors' access patterns in the Web site. In addition to the pages that the user visited, it is generally possible to discover the geographical locations of the visitors. Web servers also records other information such as the entry into the site, the URL, the used operating system and the browser, etc. There are several Web mining techniques to extract useful information from such information and visualization of a Web log is one of those techniques. This paper presents a technique as well as a case a study of visualizing a Web log.

The Comparative Study of NHPP Software Reliability Model Exponential and Log Shaped Type Hazard Function from the Perspective of Learning Effects (지수형과 로그형 위험함수 학습효과에 근거한 NHPP 소프트웨어 신뢰성장모형에 관한 비교연구)

  • Kim, Hee Cheul
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.2
    • /
    • pp.1-10
    • /
    • 2012
  • In this study, software products developed in the course of testing, software managers in the process of testing software test and test tools for effective learning effects perspective has been studied using the NHPP software. The finite failure nonhomogeneous Poisson process models presented and the life distribution applied exponential and log shaped type hazard function. Software error detection techniques known in advance, but influencing factors for considering the errors found automatically and learning factors, by prior experience, to find precisely the error factor setting up the testing manager are presented comparing the problem. As a result, the learning factor is greater than autonomous errors-detected factor that is generally efficient model could be confirmed. This paper, a failure data analysis of applying using time between failures and parameter estimation using maximum likelihood estimation method, after the efficiency of the data through trend analysis model selection were efficient using the mean square error and coefficient of determination.

Anomaly Detection Technique of Log Data Using Hadoop Ecosystem (하둡 에코시스템을 활용한 로그 데이터의 이상 탐지 기법)

  • Son, Siwoon;Gil, Myeong-Seon;Moon, Yang-Sae
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.2
    • /
    • pp.128-133
    • /
    • 2017
  • In recent years, the number of systems for the analysis of large volumes of data is increasing. Hadoop, a representative big data system, stores and processes the large data in the distributed environment of multiple servers, where system-resource management is very important. The authors attempted to detect anomalies from the rapid changing of the log data that are collected from the multiple servers using simple but efficient anomaly-detection techniques. Accordingly, an Apache Hive storage architecture was designed to store the log data that were collected from the multiple servers in the Hadoop ecosystem. Also, three anomaly-detection techniques were designed based on the moving-average and 3-sigma concepts. It was finally confirmed that all three of the techniques detected the abnormal intervals correctly, while the weighted anomaly-detection technique is more precise than the basic techniques. These results show an excellent approach for the detection of log-data anomalies with the use of simple techniques in the Hadoop ecosystem.

Bioequivalence Assessment of Acephyll® Capsule to Surfolase® Capsule (Acebrophylline HCl 100 mg) by Liquid Chromatography Tandem Mass Spectrometry

  • Nam, Kyung-Don;Seo, Ji-Hyung;Yim, Sung-Vin;Lee, Kyung-Tae
    • Journal of Pharmaceutical Investigation
    • /
    • v.41 no.5
    • /
    • pp.309-315
    • /
    • 2011
  • A sensitive and specific liquid chromatographic method coupled with tandem mass spectrometry (LC-MS/MS) was developed for the analysis of ambroxol (active moiety of acebrophylline). After acetonitrile precipitation of proteins from plasma samples, ambroxol and the domperidone (internal standard, IS) were eluted on a C18 column. The isocratic mobile phase was consisted of 10 mM ammonium acetate and methanol (10 : 90, v/v), with flow rate at 0.2 mL/min. A tandem mass spectrometer, as detector, was used for quantitative analysis in positive mode by a multiple reaction monitoring mode to monitor the m/z 379.2${\rightarrow}$264.0 and the m/z 426.2${\rightarrow}$175.1 transitions for ambroxol and the IS, respectively. Twenty four healthy Korean male subjects received two capsules (100 mg ${\times}$ 2) of either the test or the reference formulation of acebrophylline HCl in a 2 ${\times}$ 2 crossover study, this was followed by a 1week washout period between either formulation. $AUC_{0-t}$ (the area under the plasma concentration-time curve) was calculated by the linear trapezoidal rule. $C_{max}$ (maximum plasma drug concentration) and $T_{max}$ (time to reach $C_{max}$) were compiled from the plasma concentration-time data. The 90% confidence intervals for the log transformed data were acceptable range of log 0.8 to log 1.25 (e.g., log 0.8964 - log 0.9910 for $AUC_{0-t}$ log 0.8690 - log 1.0750 for $C_{max}$). The major parameters, $AUC_{0-t}$ and $C_{max}$ met the criteria of Korea Food and Drug Administration for bioequivalence indicating that Acephyll$^{(R)}$ capsule (test) is bioequivalent to Surfolase$^{(R)}$ capsule (reference).

The Threat Analysis and Security Guide for Private Information in Web Log (웹 로그 데이터에 대한 개인정보 위협분석 및 보안 가이드)

  • Ryeo, Sung-Koo;Shim, Mi-Na;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.135-144
    • /
    • 2009
  • This paper discusses an issue of serious security risks at web log which contains private information, and suggests solutions to protect them. These days privacy is core information to produce value-added in information society. Its scope and type is expanded and is more important along with the growth of information society. Web log is a privacy information file enacted as law in South Korea. Web log is not protected properly in spite of that has private information It just is treated as residual product of web services. Many malicious people could gain private information in web log. This problem is occurred by no classified data and improper development of web application. This paper suggests the technical solutions which control data in development phase and minimizes that the private information stored in web log, and applies in operation environment. It is very efficient method to protect private information and to observe the law.

Development of User Interface and Blog based on Probabilistic Model for Life Log Sharing and Management (라이프 로그 공유 및 관리를 위한 확률모델 기반 사용자 인터폐이스 및 블로그 개발)

  • Lee, Jin-Hyung;Noh, Hyun-Yong;Oh, Se-Won;Hwang, Keum-Sung;Cho, Sung-Bae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.5
    • /
    • pp.380-384
    • /
    • 2009
  • The log data collected on a mobile device contain diverse and continuous information about the user. From the log data, the location, pictures, running functions and services of the user can be obtained. It has interested in the research inferring the contexts and understanding the everyday-life of mobile users. In this paper, we have studied the methods for real-time collection of log data from mobile devices, analysis of the data, map based visualization and effective management of the personal everyday-life information. We have developed an application for sharing the contexts. The proposed application infers the personal contexts with Bayesian network probabilistic model. In the experiments, we confirm that the usability of visualization and information sharing functions based on the real world log data.

Using Image Visualization Based Malware Detection Techniques for Customer Churn Prediction in Online Games (악성코드의 이미지 시각화 탐지 기법을 적용한 온라인 게임상에서의 이탈 유저 탐지 모델)

  • Yim, Ha-bin;Kim, Huy-kang;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1431-1439
    • /
    • 2017
  • In the security field, log analysis is important to detect malware or abnormal behavior. Recently, image visualization techniques for malware dectection becomes to a major part of security. These techniques can also be used in online games. Users can leave a game when they felt bad experience from game bot, automatic hunting programs, malicious code, etc. This churning can damage online game's profit and longevity of service if game operators cannot detect this kind of events in time. In this paper, we propose a new technique of PNG image conversion based churn prediction to improve the efficiency of data analysis for the first. By using this log compression technique, we can reduce the size of log files by 52,849 times smaller and increase the analysis speed without features analysis. Second, we apply data mining technique to predict user's churn with a real dataset from Blade & Soul developed by NCSoft. As a result, we can identify potential churners with a high accuracy of 97%.

Web Log Data Analysis (웹 로그(WEB LOG) 데이터 분석 방법에 관한 연구)

  • 김석기;안정용;한경수
    • The Korean Journal of Applied Statistics
    • /
    • v.14 no.2
    • /
    • pp.261-271
    • /
    • 2001
  • 정보 공유와 비즈니스 수행 등의 매체로서 World Wide Web의 이용이 보편화됨에 따라 다양하고 방대한 데이터를 웹을 통하여 얻을 수 있게 되었으며, 이러한 데이터로부터 유용한 정보를 추출하기 위한 데이터 분석과 활용은 많은 분야에서 중요한 사안으로 인식되고 있다. 본 연구에서는 웹 로그(web log)데이터로부터 정보를 추출하기 위한 과정 및 방안에 대해 살펴보고자 한다. 로그 데이터의 특징과 통계 데이터와의 차이점, 데이터 수집 및 사전 처리 과정, 추출할 수 있는 정보 및 분석 방법 등을 제시하고 로그 데이터 분석 예제를 제시한다.

  • PDF

Web-log Process Mining Analysis for Improving Utilization of University Homepage (대학 홈페이지 활용도 향상을 위한 웹 로그 프로세스마이닝 분석)

  • Lee, Yong Uook;Choi, Sang Hyun
    • Journal of Information Technology Applications and Management
    • /
    • v.21 no.4
    • /
    • pp.51-64
    • /
    • 2014
  • The purpose of operating the main homepage of University is to provide the related information about University resources to site visitors. In this study, we analyze website browsing patterns and extract characteristics of users in order to improve its utilization. The access log files to main homepage were used to analyze the browsing patterns and converted to process log files adaptable to a process mining tool, ProM. Finally we provide useful information about user friendly homepage design and suggest plans for improving its utilization to website operators.

AUTOMATED ELECTROFACIES DETERMINATION USING MULTIVARIATE STATISTICAL ANALYSIS

  • Kim Jungwhan;Lim Jong-Se
    • 한국석유지질학회:학술대회논문집
    • /
    • spring
    • /
    • pp.10-14
    • /
    • 1998
  • A systematic methodology is developed for the electrofacies determination from wireline log data using multivariate statistical analysis. To consider corresponding contribution of each log and reduce the computational dimension, multivariate logs are transformed into a single variable through principal components analysis. Resultant principal components logs are segmented using the statistical zonation method to enhance the efficiency and quality of the interpreted results. Hierarchical cluster analysis is then used to group the segments into electrofacies. Optimal number of groups is determined on the basis of the ratio of within-group variance to total variance and core data. This technique is applied to the wells in the Korea Continental Shelf. The results of field application demonstrate that the prediction of lithology based on the electrofacies classification matches well to the core and the cutting data with high reliability This methodology for electrofacies classification can be used to define the reservoir characteristics which are helpful to the reservoir management.

  • PDF