• 제목/요약/키워드: Network Data Analysis

검색결과 5,845건 처리시간 0.036초

Network Traffic Analysis System Based on Data Engineering Methodology (데이터 엔지니어링 방법론을 기반으로한 네트워크 트래픽 분석 시스템)

  • Han, Young-Shin;Kim, Tae-Kyu;Jung, Jason J.;Jung, Chan-Ki;Lee, Chil-Gee
    • Journal of the Korea Society for Simulation
    • /
    • 제18권1호
    • /
    • pp.27-34
    • /
    • 2009
  • Currently network users, especially the number of internet users, increase rapidly. Also, high quality of service is required and this requirement results a sudden network traffic increment. As a result, an efficient management system for huge network traffic becomes an important issue. Ontology/data engineering based context awareness using the System Entity Structure (SES) concepts enables network administrators to access traffic data easily and efficiently. The network traffic analysis system, which is studied in this paper, is designed and implemented based on a model and simulation using data engineering methodology to be avaiable in evaluating large network traffic data. Extensible Markup Language (XML) is used for metadata language in this system. The information which is extracted from the network traffic analysis system could be modeled and simulated in Discrete Event Simulation (DEVS) methodology for further works such as post simulation evaluation, web services, and etc.

From proteomics toward systems biology: integration of different types of proteomics data into network models

  • Rho, Sang-Chul;You, Sung-Yong;Kim, Yong-Soo;Hwang, Dae-Hee
    • BMB Reports
    • /
    • 제41권3호
    • /
    • pp.184-193
    • /
    • 2008
  • Living organisms are comprised of various systems at different levels, i.e., organs, tissues, and cells. Each system carries out its diverse functions in response to environmental and genetic perturbations, by utilizing biological networks, in which nodal components, such as, DNA, mRNAs, proteins, and metabolites, closely interact with each other. Systems biology investigates such systems by producing comprehensive global data that represent different levels of biological information, i.e., at the DNA, mRNA, protein, or metabolite levels, and by integrating this data into network models that generate coherent hypotheses for given biological situations. This review presents a systems biology framework, called the 'Integrative Proteomics Data Analysis Pipeline' (IPDAP), which generates mechanistic hypotheses from network models reconstructed by integrating diverse types of proteomic data generated by mass spectrometry-based proteomic analyses. The devised framework includes a serial set of computational and network analysis tools. Here, we demonstrate its functionalities by applying these tools to several conceptual examples.

Network intrusion detection method based on matrix factorization of their time and frequency representations

  • Chountasis, Spiros;Pappas, Dimitrios;Sklavounos, Dimitris
    • ETRI Journal
    • /
    • 제43권1호
    • /
    • pp.152-162
    • /
    • 2021
  • In the last few years, detection has become a powerful methodology for network protection and security. This paper presents a new detection scheme for data recorded over a computer network. This approach is applicable to the broad scientific field of information security, including intrusion detection and prevention. The proposed method employs bidimensional (time-frequency) data representations of the forms of the short-time Fourier transform, as well as the Wigner distribution. Moreover, the method applies matrix factorization using singular value decomposition and principal component analysis of the two-dimensional data representation matrices to detect intrusions. The current scheme was evaluated using numerous tests on network activities, which were recorded and presented in the KDD-NSL and UNSW-NB15 datasets. The efficiency and robustness of the technique have been experimentally proved.

Priority Analysis for Software Functions Using Social Network Analysis and DEA(Data Envelopment Analysis) (사회연결망 분석과 자료포락분석 기법을 이용한 소프트웨어 함수 우선순위 분석 연구)

  • Huh, Sang Moo;Kim, Woo Je
    • Journal of Information Technology Services
    • /
    • 제17권3호
    • /
    • pp.171-189
    • /
    • 2018
  • To remove software defects and improve performance of software, many developers perform code inspections and use static analysis tools. A code inspection is an activity that is performed manually to detect software defects in the developed source. However, there is no clear criterion which source codes are inspected. A static analysis tool can automatically detect software defects by analyzing the source codes without running the source codes. However, it has disadvantage that analyzes only the codes in the functions without analyzing the relations among source functions. The functions in the source codes are interconnected and formed a social network. Functions that occupy critical locations in a network can be important enough to affect the overall quality. Whereas, a static analysis tool merely suggests which functions were called several times. In this study, the core functions will be elicited by using social network analysis and DEA (Data Envelopment Analysis) for CUBRID open database sources. In addition, we will suggest clear criteria for selecting the target sources for code inspection and will suggest ways to find core functions to minimize defects and improve performance.

Study of Mental Disorder Schizophrenia, based on Big Data

  • Hye-Sun Lee
    • International Journal of Advanced Culture Technology
    • /
    • 제11권4호
    • /
    • pp.279-285
    • /
    • 2023
  • This study provides academic implications by considering trends of domestic research regarding therapy for Mental disorder schizophrenia and psychosocial. For the analysis of this study, text mining with the use of R program and social network analysis method have been used and 65 papers have been collected The result of this study is as follows. First, collected data were visualized through analysis of keywords by using word cloud method. Second, keywords such as intervention, schizophrenia, research, patients, program, effect, society, mind, ability, function were recorded with highest frequency resulted from keyword frequency analysis. Third, LDA (latent Dirichlet allocation) topic modeling result showed that classified into 3 keywords: patient, subjects, intervention of psychosocial, efficacy of interventions. Fourth, the social network analysis results derived connectivity, closeness centrality, betweennes centrality. In conclusion, this study presents significant results as it provided basic rehabilitation data for schizophrenia and psychosocial therapy through new research methods by analyzing with big data method by proposing the results through visualization from seeking research trends of schizophrenia and psychosocial therapy through text mining and social network analysis.

Deriving a Strategy for Resolving the Inter-and Intra-generational Digital Divide based on the Continuous Core-periphery Network Model (연속형 중심-주변 네트워크 모형을 통한 세대 간 세대 내 디지털 격차 해소를 위한 전략 도출)

  • Yoo, In Jin;Ha, Sang Jip;Park, Do Hyung
    • The Journal of Information Systems
    • /
    • 제31권1호
    • /
    • pp.115-146
    • /
    • 2022
  • Purpose The purpose of this study is to find meaningful insights using regression analysis to resolve the digital divide between generations. In the analysis process of this study, social network analysis was applied to approach it with a perspective differentiated from the existing statistical techniques. Design/methodology/approach This study used a social network analysis methodology that transforms and analyzes government-led survey data into relational data. First, the cross-sectional data were converted into relational data, and a continuous core-periphery model and multidimensional scaling method were applied. Afterwards, the relationship between various factors affecting the digital divide and the difference in influence were analyzed by generation. Findings According to the network analysis results, it can be seen that all generations commonly use 'information and news search' and 'living information service'. However, it can be seen that the centrally used services of each generation are clearly different from each other, and the degree of linkage between the services is also clearly different. In addition, it can be seen that the relationship between factors influencing the digital divide by generation is also different.

Comparison between Social Network Based Rank Discrimination Techniques of Data Envelopment Analysis: Beyond the Limitations (사회 연결망 분석 기반 자료포락분석 순위 결정 기법간 비교와 한계 극복 방안에 대한 연구)

  • Hee Jay Kang
    • Journal of Information Technology Services
    • /
    • 제22권1호
    • /
    • pp.57-74
    • /
    • 2023
  • It has been pointed out as a limitation that the rank of some efficient DMUs(decision making units) cannot be discriminated due to the relativity nature of efficiency measured by DEA(data envelopment analysis), comparing the production structure. Recently, to solve this problem, a DEA-SNA(social network analysis) model that combines SNA techniques with data envelopment analysis has been studied intensively. Several models have been proposed using techniques such as eigenvector centrality, pagerank centrality, and hypertext induced topic selection(HITS) algorithm, but DMUs that cannot be ranked still remain. Moreover, in the process of extracting latent information within the DMU group to build effective network, a problem that violates the basic assumptions of the DEA also arises. This study is meaningful in finding the cause of the limitations by comparing and analyzing the characteristics of the DEA-SNA model proposed so far, and based on this, suggesting the direction and possibility to develop more advanced model. Through the results of this study, it will be enable to further expand the field of research related to DEA.

Integrated Water Distribution Network System using the Mathematical Analysis Model and GIS (수리해석 모형과 GIS를 이용한 통합 용수배분 시스템)

  • Kwon, Jae-Seop;Jo, Myung-Hee
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • 제4권4호
    • /
    • pp.21-28
    • /
    • 2001
  • In this study, GNLP(GIS linked non-linear network analysis program) for pipeline system analysis has been developed. This GNLP gets the input data for pipeline analysis from existing GIS(geographic information system) data automatically, and has GUI(graphic user interface) for user. Non-Linear Method was used for hydraulic analysis of pipe network based on Hazen-Williams equation, and Microsoft Access of relational database management system(RDBMS) was used for the framework of database applied program. GNLP system environment program was improved so that a pipe network designer can input information data for hydraulic analysis of pipeline system more easily than that of existing models. Furthermore this model generate output such as pressure and water quantities in the form of a table and a chart, and also produces output data in Excel file. This model is also able to display data effectively for analysed data confirmation and query function which is the core of GIS program.

  • PDF

Network Analysis on Communication of Welfare Policy Using Twitter Data

  • Seo, Bojun;Lee, Soochang
    • International Journal of Advanced Culture Technology
    • /
    • 제6권2호
    • /
    • pp.58-64
    • /
    • 2018
  • This main purpose of the study is to identify social network of communicators sharing information on Bokjiro for publicizing welfare policy. This study employs NodeXL pro to understand networks and their role in the social network. The data for social network analysis was collected from Twitter for a week. The result of the analysis shows that the social network of communicators on Bokjiro does not have many nodes. It also has an independent network with high possibility of information distortion. Little communicators have controlling power in information flow in one way of communication. According to the result, it is not effective for marketing strategy of welfare policy in providing online information through Bokjiro. The study suggests that the government should use the transactional approach to marketing based on agent-oriented activity focusing on the exchange relationship between information providers and demanders in an age of networked intelligence.

Spark-based Network Log Analysis Aystem for Detecting Network Attack Pattern Using Snort (Snort를 이용한 비정형 네트워크 공격패턴 탐지를 수행하는 Spark 기반 네트워크 로그 분석 시스템)

  • Baek, Na-Eun;Shin, Jae-Hwan;Chang, Jin-Su;Chang, Jae-Woo
    • The Journal of the Korea Contents Association
    • /
    • 제18권4호
    • /
    • pp.48-59
    • /
    • 2018
  • Recently, network technology has been used in various fields due to development of network technology. However, there has been an increase in the number of attacks targeting public institutions and companies by exploiting the evolving network technology. Meanwhile, the existing network intrusion detection system takes much time to process logs as the amount of network log increases. Therefore, in this paper, we propose a Spark-based network log analysis system that detects unstructured network attack pattern. by using Snort. The proposed system extracts and analyzes the elements required for network attack pattern detection from large amount of network log data. For the analysis, we propose a rule to detect network attack patterns for Port Scanning, Host Scanning, DDoS, and worm activity, and can detect real attack pattern well by applying it to real log data. Finally, we show from our performance evaluation that the proposed Spark-based log analysis system is more than two times better on log data processing performance than the Hadoop-based system.