• Title/Summary/Keyword: Security Bigdata Analysis

Search Result 34, Processing Time 0.025 seconds

Real time predictive analytic system design and implementation using Bigdata-log (빅데이터 로그를 이용한 실시간 예측분석시스템 설계 및 구현)

  • Lee, Sang-jun;Lee, Dong-hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1399-1410
    • /
    • 2015
  • Gartner is requiring companies to considerably change their survival paradigms insisting that companies need to understand and provide again the upcoming era of data competition. With the revealing of successful business cases through statistic algorithm-based predictive analytics, also, the conversion into preemptive countermeasure through predictive analysis from follow-up action through data analysis in the past is becoming a necessity of leading enterprises. This trend is influencing security analysis and log analysis and in reality, the cases regarding the application of the big data analysis framework to large-scale log analysis and intelligent and long-term security analysis are being reported file by file. But all the functions and techniques required for a big data log analysis system cannot be accommodated in a Hadoop-based big data platform, so independent platform-based big data log analysis products are still being provided to the market. This paper aims to suggest a framework, which is equipped with a real-time and non-real-time predictive analysis engine for these independent big data log analysis systems and can cope with cyber attack preemptively.

Strategy Design to Protect Personal Information on Fake News based on Bigdata and Artificial Intelligence

  • Kang, Jangmook;Lee, Sangwon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.59-66
    • /
    • 2019
  • The emergence of new IT technologies and convergence industries, such as artificial intelligence, bigdata and the Internet of Things, is another chance for South Korea, which has established itself as one of the world's top IT powerhouses. On the other hand, however, privacy concerns that may arise in the process of using such technologies raise the task of harmonizing the development of new industries and the protection of personal information at the same time. In response, the government clearly presented the criteria for deidentifiable measures of personal information and the scope of use of deidentifiable information needed to ensure that bigdata can be safely utilized within the framework of the current Personal Information Protection Act. It strives to promote corporate investment and industrial development by removing them and to ensure that the protection of the people's personal information and human rights is not neglected. This study discusses the strategy of deidentifying personal information protection based on the analysis of fake news. Using the strategies derived from this study, it is assumed that deidentification information that is appropriate for deidentification measures is not personal information and can therefore be used for analysis of big data. By doing so, deidentification information can be safely utilized and managed through administrative and technical safeguards to prevent re-identification, considering the possibility of re-identification due to technology development and data growth.

News Article Identification Methods with Fact-Checking Guideline on Artificial Intelligence & Bigdata

  • Kang, Jangmook;Lee, Sangwon
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.352-359
    • /
    • 2021
  • The purpose of this study is to design and build fake news discrimination systems and methods using fact-checking guidelines. In other words, the main content of this study is the system for identifying fake news using Artificial Intelligence -based Fact-checking guidelines. Specifically planned guidelines are needed to determine fake news that is prevalent these days, and the purpose of these guidelines is fact-checking. Identifying fake news immediately after seeing a huge amount of news is inefficient in handling and ineffective in handling. For this reason, we would like to design a fake news identification system using the fact-checking guidelines to create guidelines based on pattern analysis against fake news and real news data. The model will monitor the fact-checking guideline model modeled to determine the Fact-checking target within the news article and news articles shared on social networking service sites. Through this, the model is reflected in the fact-checking guideline model by analyzing news monitoring devices that select suspicious news articles based on their user responses. The core of this research model is a fake news identification device that determines the authenticity of this suspected news article. So, we propose news article identification methods with fact-checking guideline on Artificial Intelligence & Bigdata. This study will help news subscribers determine news that is unclear in its authenticity.

User-Customized News Service by use of Social Network Analysis on Artificial Intelligence & Bigdata

  • KANG, Jangmook;LEE, Sangwon
    • International journal of advanced smart convergence
    • /
    • v.10 no.3
    • /
    • pp.131-142
    • /
    • 2021
  • Recently, there has been an active service that provides customized news to news subscribers. In this study, we intend to design a customized news service system through Deep Learning-based Social Network Service (SNS) activity analysis, applying real news and avoiding fake news. In other words, the core of this study is the study of delivery methods and delivery devices to provide customized news services based on analysis of users, SNS activities. First of all, this research method consists of a total of five steps. In the first stage, social network service site access records are received from user terminals, and in the second stage, SNS sites are searched based on SNS site access records received to obtain user profile information and user SNS activity information. In step 3, the user's propensity is analyzed based on user profile information and SNS activity information, and in step 4, user-tailored news is selected through news search based on user propensity analysis results. Finally, in step 5, custom news is sent to the user terminal. This study will be of great help to news service providers to increase the number of news subscribers.

Social Network Analysis by Utilizing Disaster Risk Big Data (재난 위험신고 빅데이터를 활용한 사회연결망 분석)

  • Han, Ji-Ah;Jeong, Duk-Hoon
    • The Journal of Bigdata
    • /
    • v.1 no.2
    • /
    • pp.45-63
    • /
    • 2016
  • According to changes of recent climate social structures, frequency of occurrence new or complex disasters are increasing. So the importance of disaster prevention is increasing. To provide useful information of disaster prevention activities, We use the "Safety Sinmungo" main processing practices included Facility safety management in Ministry of Public Safety and Security. Facility safety management is the most and common disaster prevention activities. We identified the keywords in the risk report and facilities to residents report and analyzed the seasonal and inter-regional facilities report distribution process. We also utilized social network analysis techniques to configure a 1-mode, 2-mode facilities around the keyword for differences.

  • PDF

Design of Cloud Service Platform for eGovernment

  • LEE, Choong Hyong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.201-209
    • /
    • 2021
  • The term, eGovernmen or e-Government, uses technology communications devices such as computers and the Internet to provide public services to citizens and others. The eGovernment or e-government provides citizens with new opportunities to access the government directly and conveniently, while the government provides citizens with directservices. Also, in these days, cloud computing is a feature that enables users to use computer system resources, especially data storage (cloud storage) and on-demand computing power, without having to manage themselves. The term is commonly used to describe data centers that are available to many users over the Internet. Today, the dominant Big Cloud is distributed across multiple central servers. You can designate it as an Edge server if it is relatively close to the user. However, despite the prevalence of e-government and cloud computing, each of these concepts has evolved. Research attempts to combine these two concepts were not being made properly. For this reason, in this work, we aim to produce independent and objective analysis results by separating progress steps for the analysis of e-government cloud service platforms. This work will be done through an analysis of the development process and architectural composition of the e-government development standard framework and the cloud platform PaaS-TA. In addition, this study is expected to derive implications from an analysis perspective on the direction and service composition of the e-government cloud service platform currently being pursued.

Priority Analysis of Information Security Policy in the ICT Convergence Industry in South Korea Using Cross-Impact Analysis (교차영향분석을 이용한 국내 ICT 융합산업의 정보보호정책 우선순위 분석)

  • Lee, Dong-Hee;Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.695-706
    • /
    • 2018
  • In recent years, industrial convergence centered on ICBM (internet of things (IoT), cloud, big data, mobile) has been experiencing rapid development in various fields such as agriculture and the financial industry. In order to prepare for cyber threats, one of the biggest problems facing the convergence industry in the future, the development of the industry must proceed in tandem with a framework of information security. In this study, we analyze the details of the current industrial development policy and related information protection policies using cross impact analysis and present policy priorities through the expert questionnaire. The aim of the study was to clarify the priorities and interrelationships within information security policy as a first step in suggesting effective policy direction. As a result, all six information security policy tasks derived from this study belong to key drivers. Considering the importance of policies, policies such as improving the constitution of the security industry and strengthening of support, training of information protection talent, and investing in the information security industry need to be implemented relatively first.

For Improving Security Log Big Data Analysis Efficiency, A Firewall Log Data Standard Format Proposed (보안로그 빅데이터 분석 효율성 향상을 위한 방화벽 로그 데이터 표준 포맷 제안)

  • Bae, Chun-sock;Goh, Sung-cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.157-167
    • /
    • 2020
  • The big data and artificial intelligence technology, which has provided the foundation for the recent 4th industrial revolution, has become a major driving force in business innovation across industries. In the field of information security, we are trying to develop and improve an intelligent security system by applying these techniques to large-scale log data, which has been difficult to find effective utilization methods before. The quality of security log big data, which is the basis of information security AI learning, is an important input factor that determines the performance of intelligent security system. However, the difference and complexity of log data by various product has a problem that requires excessive time and effort in preprocessing big data with poor data quality. In this study, we research and analyze the cases related to log data collection of various firewall. By proposing firewall log data collection format standard, we hope to contribute to the development of intelligent security systems based on security log big data.

Development of Kernel based High Speed Packet Filtering Imbedded Gateway and Firewall Using Cloud Database (클라우드 데이터베이스를 이용한 커널 기반 고속 패킷필터링 임베디드 게이트웨이 및 방화벽 개발)

  • Park, Daeseung;Kim, Soomin;Yoo, Hanseob;Moon, Songchul
    • Journal of Service Research and Studies
    • /
    • v.5 no.1
    • /
    • pp.57-70
    • /
    • 2015
  • This paper develop curnel based high speed packet filtering imbedded gateway and firewall using cloud database. This study develop equipment include of predict function through bigdata analysis using cloud system. This equipment include intrusion prevention for network attack, and include system security function of L7 switch based contents. This study can improve security level of little company and general family. This study can pioneer a new market. This study can develop high perfomance switch and replacement of existing security equipment. This study proposed new next generation algorithm for constuction of high performance system from low specifications.

Analysis of Research Trends in Homomorphic Encryption Using Bibliometric Analysis (서지통계학적 분석을 이용한 동형 암호의 연구경향 분석)

  • Akihiko Yamada;Eunsang Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.601-608
    • /
    • 2023
  • Homomorphic encryption is a promising technology that has been extensively researched in recent years. It allows computations to be performed on encrypted data, without the need to decrypt it. In this paper, we perform bibliometric analysis to objectively and quantitatively analyze the research trends of homomorphic encryption technology using 6,047 homomorphic encryption papers from the Scopus database. Specifically, we analyze the number of papers by year, keyword co-occurrence, topic clustering, changes in related keywords over time, and country of homomorphic encryption research institutions. Our analysis results provide strategic directions for research and application of homomorphic encryption and can be a great help for subsequent research and industrial applications.