• Title/Summary/Keyword: Logging System

Search Result 279, Processing Time 0.028 seconds

SSO based Security Management in Cloud Computing Environment

  • Jing, Si Da;Jung, Young-Min;Chung, Mok-Dong
    • Korea Information Processing Society Review
    • /
    • v.17 no.2
    • /
    • pp.18-29
    • /
    • 2010
  • In this paper, we surveyed SSO based security management including the knowledge domain of the area of cloud and its relevant components. Cloud computing refers to the delivery of software and other technology services over the Internet by a service provider. SSO refers to the ability to log on to a single security system once, rather than logging on separately to multiple security systems. Existing SSO solutions in cloud computing environment suggest several methods. SSO-based security Issues illustrate these key items in cloud computing environment such as risks and security vulnerabilities of SSO. SSO supports for multiple and different domains in cloud computing environment.

  • PDF

A Study on the Design and Implementation of SDLA for C-Band Application (C-Band용 SDLA의 설계 및 구현에 관한 연구)

  • 임경택;윤기방;조홍구
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2000.11a
    • /
    • pp.711-727
    • /
    • 2000
  • In this paper, the design of the successive detection logarithmic amplifier(SDLA) is reviewed for radar and EW system, and implemented in hybrid MIC. The SDLA operates over the 5 to 7㎓ frequency range. the unit has a dynamic range of -80㏈m to 0㏈m, a logging accuracy of ±1.4㏈, a legging slope 19.2㎷/㏈, and a gain flatness of ± 1.2㏈. Input VSWR of less than 2, noise figure of 2㏈, video impedance of 900Ω and output voltage range of 0 to 1.53V DC have been obtained over 80㏈ of dynamic range.

  • PDF

Abuse Pattern Monitoring Method based on CEP in On-line Game (CEP 기반 온라인 게임 악용 패턴 모니터링 방법)

  • Roh, Chang-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.1
    • /
    • pp.114-121
    • /
    • 2010
  • Based on a complex event processing technique, an abuse pattern monitoring method is developed to provide an real-time detection. CEP is a technique to find complex event pattern in a massive information system. In this study, the events occurred by game-play are observed to be against the rules using CEP. User abuse patterns are pre-registered in CEP engine. And CEP engine monitors user abuse after aggregating the game data transferred by game logging server.

A Study on the Logging System Design Suggestion Using Machine Learning (머신러닝을 사용한 로그수집 시스템 설계 제안에 관한 연구)

  • Seo, Deck-Won;Yooun, Ho-sang;Shin, Dong-Il;Shin, Dong-Kyoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.299-301
    • /
    • 2017
  • 현대사회에서는 사이버 해킹 공격이 많이 일어나고 있다. 공격이 증가함에 따라 이를 다양한 방법으로 방어하고 탐지하는 연구가 많이 이루어지고 있다. 본 논문은 OpenIOC, STIX, MMDEF 등과 같은 공격자의 방법론 또는 증거를 식별하는 기술 특성 설명을 수집해 놓은 표현들을 기반을 머신러닝과 logstash라는 로그 수집기를 결합하는 새로운 시스템을 제안한다. 시스템은 pc에 공격이 가해졌을 때 로그 수집기를 사용하여 로그를 수집한 후에 로그의 속성 값들의 리스트를 가지고 머신러닝 알고리즘을 통해 학습시켜 분석을 진행한다. 향후에는 제안된 시스템을 실시간 처리 머신러닝 알고리즘을 사용하여 필요로그정보의 구성을 해주면 자동으로 로그정보를 수집하고 필터와 출력을 거쳐 학습을 시켜 자동 침입탐지시스템으로 발전할 수 있을 것이라 예상된다.

Adaptive Filtering Processing for Target Signature Enhancement in Monostatic Borehole Radar Data

  • Hyun, Seung-Yeup;Kim, Se-Yun
    • Journal of electromagnetic engineering and science
    • /
    • v.14 no.2
    • /
    • pp.79-81
    • /
    • 2014
  • In B-scan data measured by a pulse-type monostatic borehole radar, target signatures are seriously obscured by two clutters that differ in orientation and intensity. The primary clutter appears as a nearly constant time delay, which is caused by internal ringing between antenna and transceiver in the radar system. The secondary clutter occurs as an oblique time delay due to the guided borehole wave along the logging cable of the radar antenna. This issue led us to perform adaptive filtering processing for orientation-based clutter removal. This letter describes adaptive filtering processing consisting of a combination of edge detection, data rotation, and eigenimage filtering. We show that the hyperbolic signatures of a dormant air-filled tunnel target can be more distinctly enhanced by applying the proposed approach to the B-scan data, which are measured in a well-suited test site for underground tunnel detection.

The Extension of CORBA for the Support of Primary-Backup Object Group (프라이머리-백업 객체 그룹 지원을 위한 CORBA의 확장)

  • 신범주;김명준
    • The Journal of Information Technology and Database
    • /
    • v.7 no.1
    • /
    • pp.17-26
    • /
    • 2000
  • To provide highly available services in the distributed object system, it is required to support the object group. The state machine approach and primary-backup approach are proposed as two representative approaches for support of object group. The primary-backup approach does not only give merits such as transparency of object group and non-deterministic execution but also require less resource than state machine approach. This paper describes an extension of CORBA that is required to support of the primary-backup object group. In this paper, the state of backup is synchronized with primary through the atomic multicast protocol whenever the request of client is executed at primary. As a result, it does not require message logging and check pointing. The object group of this paper also provides fast response time in case of failure of the primary since it makes primary election unnecessary. And through an extension of IDL, it makes possible to avoid consistency control depending on characteristic of application. A prototype has been implemented and the performance of object group has been compared with a single object invocation.

  • PDF

A Content-based Load Balancing Algorithm for Cluster File System (클러스터 파일 시스템의 내용 기반 부하 분산 알고리즘)

  • 장준호;박성용
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.526-528
    • /
    • 2004
  • 메타데이타에 대한 접근이 특정 디렉토리에 집중되며 메타데이타 연산마다 다른 계산량을 가지는 클러스터 파일 시스템의 특성상 메타데이타 서버 간 부하의 불균형과 과부하가 발생한다. 따라서 클러스터 파일 시스템의 성능을 결정짓는 중요 요소인 메타데이타 서비스의 성능을 위해서는 메타데이타 서버들의 과부하 상황에 대처할 수 있는 합리적인 부하 분산 기법이 필수적이다. 메타데이타 공간을 분할하여 담당영역만을 관리하는 비대칭 메타데이타 서버를 위해 본 눈문은 클라이언트 요청의 내용을 분석하여 담당 메타데이타 서버를 결정하고 해당 연산의 종류에 따라 단순 검색, 메타데이타 중복 저장(replication), 또는 메타데이타에 대한 로깅(logging)을 수행하는 내용 기반의 부하 분산 알고리즘을 제시하였다.

  • PDF

The Design of Host-based Intrusion Detection Module using Fuzzy Petri-net for UNIX (UNIX 환경에서 퍼지 Petri-net을 이용한 호스트 기반 침입 탐지 모듈 설계)

  • Kim, Min-Su;Eun, Yu-Jin;No, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.7
    • /
    • pp.1867-1876
    • /
    • 1999
  • In this paper, we ropose formalized method to create detection rules for known intrusion method and the fuzzy Petri-net using fuzzy theory to cope with varied attack. On producing the detection module for using intrusion detection, we can add new found pattern. And also, we use system call logging for increasing correctness of detection.

  • PDF

A Study of Rail Wear by Change of Acceleration and Deceleration (가속도/감속도 변화율에 따른 레일마모 현상에 관한 연구)

  • Ha, Kwan-Yong;Kim, Hie-Sik
    • Journal of the Korean Society for Railway
    • /
    • v.10 no.5
    • /
    • pp.607-612
    • /
    • 2007
  • In this paper, operation mode of train was divided into powering, coasting, and braking and rail wear phenomenon has been done comparative analysis by each section. Data of train velocity is transferred to acceleration and deceleration from ATO Logging data. Amount of rail wear has been done comparative analysis by traction force of acceleration and braking force of deceleration and a plan for management of track irregularity is come up with by the result of the analysis.

Design and Implementation of System for Sales, Production and Inventory management for Logging (원목 세일즈 문서, 생산 및 재고 관리 시스템에 대한 설계와 구현)

  • Koo, Heesung;Son, Cheolsu;Kim, Wonjung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.1375-1378
    • /
    • 2012
  • 본 논문은 원목 세일즈 문서, 생산 및 재고 관리 시스템에 대하여 논의한다. 논문의 목적은 특수한 작업 환경, 생산부터 판매까지의 업무 처리 및 ERP 시스템인 ACCPAC 의 연동하는 시스템이다. 새로운 사업장, 판매 시장의 변화 및 전문 관리자의 부재의 경우 ERP 시스템을 활용하기가 매우 어려운 현실이다. 이런 특수한 상황과 소스 데이터의 미표준화를 표준화한 인벤토리 데이터를 활용하여 판매 부서에 제공하고, 회계 소프트웨어에 자동으로 입력하여 기존 ERP 시스템을 최대한 활용하는 시스템이다.