• Title/Summary/Keyword: Network Log

Search Result 371, Processing Time 0.025 seconds

Test of Fit for the Log-Normalness of the Post Dialling Delay

  • Won, Hyung-Gyoo
    • Journal of Korean Society for Quality Management
    • /
    • v.22 no.2
    • /
    • pp.79-88
    • /
    • 1994
  • Delay has influenced customer satisfaction while using a telephone. It has been ranked second after transmission impairments in annoyance to customers. Therefore, it is important to analyze its behavior not only to increase the quality of service for the customers, but to provide its information to network planners and administrators and to designers of equipment and systems. In this paper, we consider a log-normal model as a candidate for describing the statistical behavior of the post dialling delay, i.e., the time to connect a call to the telephone network after dialling. Based on the real data, the log-normalness of the post dialling delays are convinced for the long distance calls, but not supported for the local calls. Uses of graphical plotting paper and statistical test of fit art discussed.

  • PDF

Event Log Validity Analysis for Detecting Threats by Insiders in Control System

  • Kim, Jongmin;Kang, Jiwon;Lee, DongHwi
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.1
    • /
    • pp.16-21
    • /
    • 2020
  • Owing to the convergence of the communication network with the control system and public network, security threats, such as information leakage and falsification, have become possible through various routes. If we examine closely at the security type of the current control system, the operation of the security system focuses on the threats made from outside to inside, so the study on the detection system of the security threats conducted by insiders is inadequate. Thus, this study, based on "Spotting the Adversary with Windows Event Log Monitoring," published by the National Security Agency, found that event logs can be utilized for the detection and maneuver of threats conducted by insiders, by analyzing the validity of detecting insider threats to the control system with the list of important event logs.

Speech Feature Selection of Normal and Autistic children using Filter and Wrapper Approach

  • Akhtar, Muhammed Ali;Ali, Syed Abbas;Siddiqui, Maria Andleeb
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.129-132
    • /
    • 2021
  • Two feature selection approaches are analyzed in this study. First Approach used in this paper is Filter Approach which comprises of correlation technique. It provides two reduced feature sets using positive and negative correlation. Secondly Approach used in this paper is the wrapper approach which comprises of Sequential Forward Selection technique. The reduced feature set obtained by positive correlation results comprises of Rate of Acceleration, Intensity and Formant. The reduced feature set obtained by positive correlation results comprises of Rasta PLP, Log energy, Log power and Zero Crossing Rate. Pitch, Rate of Acceleration, Log Power, MFCC, LPCC is the reduced feature set yield as a result of Sequential Forwarding Selection.

PUM: Processing Unit Module Design of Intrusion Detector for Large Scale Network (대규모 네트워크를 위한 침입 탐지결정모듈 설계)

  • 최인수;차홍준
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.2
    • /
    • pp.53-58
    • /
    • 2002
  • the popularity of uses for internet has been needed to information security. thereforce, intrusion, information leakage and modification, change or intentional efflux to computer system aspects of information security have been resulted in requirement of intrusion detection from outer at user authentication. this problem Presents design of PUM(Processing Unit Module) which analyze both the host log generated by sever host systems that various case for intellectualized intrusion method and network_packet on networks in large scale network.

  • PDF

Development of Log Processing Module and Log Server for Ethernet Shipboard Integration Networks (이더넷 기반 선박 통합 네트워크를 위한 로그 처리 모듈 및 로그 서버의 개발)

  • Hwang, Hun-Gyu;Yoon, Jin-Sik;Seo, Jeong-Min;Lee, Seong-Dae;Jang, Kil-Woong;Park, Hyu-Chan;Lee, Jang-Se
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.2
    • /
    • pp.331-338
    • /
    • 2011
  • Objectives of shipboard integration networks are to exchange and manage integrated information. Shipboard integration networks use UDP(User Datagram Protocol) multicast for the exchange of information. However, such information can be missed or damaged because UDP can't guarantee reliability. The standard of shipboard integration networks defines error log functions for the missed or damaged information. In this paper, we analyze internal and external log functions. The internal log function records errors internally, and the external log function sends error messages to a log server and records them in a database. We also develop a log processing module and log server for the external log function.

Count-Min HyperLogLog : Cardinality Estimation Algorithm for Big Network Data (Count-Min HyperLogLog : 네트워크 빅데이터를 위한 카디널리티 추정 알고리즘)

  • Sinjung Kang;DaeHun Nyang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.427-435
    • /
    • 2023
  • Cardinality estimation is used in wide range of applications and a fundamental problem processing a large range of data. While the internet moves into the era of big data, the function addressing cardinality estimation use only on-chip cache memory. To use memory efficiently, there have been various methods proposed. However, because of the noises between estimator, which is data structure per flow, loss of accuracy occurs in these algorithms. In this paper, we focus on minimizing noises. We propose multiple data structure that each estimator has the number of estimated value as many as the number of structures and choose the minimum value, which is one with minimum noises, We discover that the proposed algorithm achieves better performance than the best existing work using the same tight memory, such as 1 bit per flow, through experiment.

Home Service Recovery System based on Home Network Control Log (홈 네트워크 제어 로그 기반 홈 서비스 복구 시스템)

  • Kim, Yong-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.620-623
    • /
    • 2008
  • Home service networked system gets more its fault chances, which are fault by the external factors, network fault, home appliance fault, and so on. Moreover, user may want to pay no attention to a sequence of complex or nervous maintenance jobs for system fault management. Therefore, home management system needs the function of home service recovery for fault home device. For this, this paper manages to design home network control log, and proposes the method for securing the home device service continuity analyzing home device service log in the point of fault.

  • PDF

A Distributed Algorithm to Update Spanning Tree and Strongly-Connected Components (생성트리와 강결합요소의 갱신을 위한 분산 알고리즘)

  • Park, Jeong-Ho;Park, Yun-Yong;Choe, Seong-Hui
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.2
    • /
    • pp.299-306
    • /
    • 1999
  • Considers the problem to update the spanning tree and strongly-connected components in response to topology change of the network. This paper proposes a distributed algorithm that solves such a problem after several processors and links are added and deleted. Its message complexity and its ideal-time complexity are O(n'log n'+ (n'+s+t)) and O(n'logn') respectively where n'is the number of processors in the network after the topology change, s is the number of added links, and t is the total number of links in the strongly connected component (of the network before the topology change) including the deleted links.

  • PDF

Intelligent Deployment Method of Sensor Networks using SOFM (SOFM을 이용한 센서 네트워크의 지능적인 배치 방식)

  • Jung, Kyung-Kwon;Eom, Ki-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.2
    • /
    • pp.430-435
    • /
    • 2007
  • In this paper, we propose an intelligent deployment of sensor network for reliable communication. The proposed method determines optimal transmission range based on the wireless channel characteristics, and searches the optimal number of sensor nodes, and optimal locations with SOFM. We calculate PRR against a distance uses the log-normal path loss model, and decide the communication range of sensor node from PRR. In order to verify the effectiveness of the proposed method, we performed simulations on the searching for intelligent deployment and checking for link condition of sensor network.

A Proposal of an New Algorithm for RWA Problem on Multi-optical Network (다중 광 네트워크에서 RWA문제를 해결하는 새로운 알고리즘 제안)

  • 강성수;김창근;김순석;탁한호
    • Journal of Korea Multimedia Society
    • /
    • v.2 no.4
    • /
    • pp.451-458
    • /
    • 1999
  • This paper considers the problem of routing connections in multi-optical tree network using WDM (Wavelength Division Multiplexing), where each connection between a pair of nodes in the network is assigned a path through the network and a wavelength on that path, such that connections whose paths share a common link in the network are assigned different wavelengths. The problem of optimal colouring of paths on multi-optical network is NP-hard[1], but if that is the colouring of all paths, then there exists an efficient polynomial time algorithm. In this paper, using divided & conquer method we gave an efficient algorithm to assign wavelengths to the all paths of a tree network based on the theory of (7) and our time complexity $O(n^4log\; n)$.

  • PDF