• 제목/요약/키워드: Web Traffic Analysis

검색결과 127건 처리시간 0.027초

Empirical Analysis on Bitcoin Price Change by Consumer, Industry and Macro-Economy Variables (비트코인 가격 변화에 관한 실증분석: 소비자, 산업, 그리고 거시변수를 중심으로)

  • Lee, Junsik;Kim, Keon-Woo;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • 제24권2호
    • /
    • pp.195-220
    • /
    • 2018
  • In this study, we conducted an empirical analysis of the factors that affect the change of Bitcoin Closing Price. Previous studies have focused on the security of the block chain system, the economic ripple effects caused by the cryptocurrency, legal implications and the acceptance to consumer about cryptocurrency. In various area, cryptocurrency was studied and many researcher and people including government, regardless of country, try to utilize cryptocurrency and applicate to its technology. Despite of rapid and dramatic change of cryptocurrencies' price and growth of its effects, empirical study of the factors affecting the price change of cryptocurrency was lack. There were only a few limited studies, business reports and short working paper. Therefore, it is necessary to determine what factors effect on the change of closing Bitcoin price. For analysis, hypotheses were constructed from three dimensions of consumer, industry, and macroeconomics for analysis, and time series data were collected for variables of each dimension. Consumer variables consist of search traffic of Bitcoin, search traffic of bitcoin ban, search traffic of ransomware and search traffic of war. Industry variables were composed GPU vendors' stock price and memory vendors' stock price. Macro-economy variables were contemplated such as U.S. dollar index futures, FOMC policy interest rates, WTI crude oil price. Using above variables, we did times series regression analysis to find relationship between those variables and change of Bitcoin Closing Price. Before the regression analysis to confirm the relationship between change of Bitcoin Closing Price and the other variables, we performed the Unit-root test to verifying the stationary of time series data to avoid spurious regression. Then, using a stationary data, we did the regression analysis. As a result of the analysis, we found that the change of Bitcoin Closing Price has negative effects with search traffic of 'Bitcoin Ban' and US dollar index futures, while change of GPU vendors' stock price and change of WTI crude oil price showed positive effects. In case of 'Bitcoin Ban', it is directly determining the maintenance or abolition of Bitcoin trade, that's why consumer reacted sensitively and effected on change of Bitcoin Closing Price. GPU is raw material of Bitcoin mining. Generally, increasing of companies' stock price means the growth of the sales of those companies' products and services. GPU's demands increases are indirectly reflected to the GPU vendors' stock price. Making an interpretation, a rise in prices of GPU has put a crimp on the mining of Bitcoin. Consequently, GPU vendors' stock price effects on change of Bitcoin Closing Price. And we confirmed U.S. dollar index futures moved in the opposite direction with change of Bitcoin Closing Price. It moved like Gold. Gold was considered as a safe asset to consumers and it means consumer think that Bitcoin is a safe asset. On the other hand, WTI oil price went Bitcoin Closing Price's way. It implies that Bitcoin are regarded to investment asset like raw materials market's product. The variables that were not significant in the analysis were search traffic of bitcoin, search traffic of ransomware, search traffic of war, memory vendor's stock price, FOMC policy interest rates. In search traffic of bitcoin, we judged that interest in Bitcoin did not lead to purchase of Bitcoin. It means search traffic of Bitcoin didn't reflect all of Bitcoin's demand. So, it implies there are some factors that regulate and mediate the Bitcoin purchase. In search traffic of ransomware, it is hard to say concern of ransomware determined the whole Bitcoin demand. Because only a few people damaged by ransomware and the percentage of hackers requiring Bitcoins was low. Also, its information security problem is events not continuous issues. Search traffic of war was not significant. Like stock market, generally it has negative in relation to war, but exceptional case like Gulf war, it moves stakeholders' profits and environment. We think that this is the same case. In memory vendor stock price, this is because memory vendors' flagship products were not VRAM which is essential for Bitcoin supply. In FOMC policy interest rates, when the interest rate is low, the surplus capital is invested in securities such as stocks. But Bitcoin' price fluctuation was large so it is not recognized as an attractive commodity to the consumers. In addition, unlike the stock market, Bitcoin doesn't have any safety policy such as Circuit breakers and Sidecar. Through this study, we verified what factors effect on change of Bitcoin Closing Price, and interpreted why such change happened. In addition, establishing the characteristics of Bitcoin as a safe asset and investment asset, we provide a guide how consumer, financial institution and government organization approach to the cryptocurrency. Moreover, corroborating the factors affecting change of Bitcoin Closing Price, researcher will get some clue and qualification which factors have to be considered in hereafter cryptocurrency study.

Comparison and Performance Analysis of Connection Management Methods in the Centralized Server Based Network (중앙 집중형 서버 기반 망에서의 연결 관리 방식 비교 및 성능 분석)

  • Kwon, Tae-Hyun;Yim, Young-Eun;Choi, In-Sang;Kim, Choon-Hee;Cha, Young-Wook
    • The KIPS Transactions:PartC
    • /
    • 제13C권7호
    • /
    • pp.923-932
    • /
    • 2006
  • For the successful promotion about the NGN (Next Generation Network), centralized network control and management technology is required to guarantee QoS and Traffic Engineering. This paper describes SNMP. Web Services and Network Open Interface based connection management scheme which can be used in centralized server based network in which the control plane is separated from transport plane. We also constructed platforms about each of these connection management schemes and performed comparing and analyzing the performance of connection setup delays.

Analysis of Defense Method for HTTP POST DDoS Attack base on Content-Length Control (Content-Length 통제기반 HTTP POST DDoS 공격 대응 방법 분석)

  • Lee, Dae-Seob;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제22권4호
    • /
    • pp.809-817
    • /
    • 2012
  • One of the OSI 7 Layer DDoS Attack, HTTP POST DDoS can deny legitimate service by web server resource depletion. This Attack can be executed with less network traffic and legitimate TCP connections. Therefore, It is difficult to distinguish DDoS traffic from legitimate users. In this paper, I propose an anomaly HTTP POST traffic detection algorithm and http each page Content-Length field size limit with defense method for HTTP POST DDoS attack. Proposed method showed the result of detection and countermeasure without false negative and positive to use the r-u-dead-yet of HTTP POST DDoS attack tool and the self-developed attack tool.

New Mathematical Model for Travel Route Recommendation Service (여행경로 추천 서비스를 위한 최적화 수리모형)

  • Hwang, Intae;Kim, Heungseob
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • 제40권3호
    • /
    • pp.99-106
    • /
    • 2017
  • With the increased interest in the quality of life of modern people, the implementation of the five-day working week, the increase in traffic convenience, and the economic and social development, domestic and international travel is becoming commonplace. Furthermore, in the past, there were many cases of purchasing packaged goods of specialized travel agencies. However, as the development of the Internet improved the accessibility of information about the travel area, the tourist is changing the trend to plan the trip such as the choice of the destination. Web services have been introduced to recommend travel destinations and travel routes according to these needs of the customers. Therefore, after reviewing some of the most popular web services today, such as Stubby planner (http://www.stubbyplanner.com) and Earthtory (http://www.earthtory.com), they were supposed to be based on traditional Traveling Salesman Problems (TSPs), and the travel routes recommended by them included some practical limitations. That is, they were not considered important issues in the actual journey, such as the use of various transportation, travel expenses, the number of days, and lodging. Moreover, although to recommend travel destinations, there have been various studies such as using IoT (Internet of Things) technology and the analysis of cyberspatial Big Data on the web and SNS (Social Networking Service), there is little research to support travel routes considering the practical constraints. Therefore, this study proposes a new mathematical model for applying to travel route recommendation service, and it is verified by numerical experiments on travel to Jeju Island and trip to Europe including Germany, France and Czech Republic. It also expects to be able to provide more useful information to tourists in their travel plans through linkage with the services for recommending tourist attractions built in the Internet environment.

A Validation of Effectiveness for Intrusion Detection Events Using TF-IDF (TF-IDF를 이용한 침입탐지이벤트 유효성 검증 기법)

  • Kim, Hyoseok;Kim, Yong-Min
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제28권6호
    • /
    • pp.1489-1497
    • /
    • 2018
  • Web application services have diversified. At the same time, research on intrusion detection is continuing due to the surge of cyber threats. Also, As a single-defense system evolves into multi-level security, we are responding to specific intrusions by correlating security events that have become vast. However, it is difficult to check the OS, service, web application type and version of the target system in real time, and intrusion detection events occurring in network-based security devices can not confirm vulnerability of the target system and success of the attack A blind spot can occur for threats that are not analyzed for problems and associativity. In this paper, we propose the validation of effectiveness for intrusion detection events using TF-IDF. The proposed scheme extracts the response traffics by mapping the response of the target system corresponding to the attack. Then, Response traffics are divided into lines and weights each line with an TF-IDF weight. we checked the valid intrusion detection events by sequentially examining the lines with high weights.

Performance Analysis of Sensor Network Real-Time Traffic for Factory Automation in Intranet Environment (인트라넷 환경에서의 공장자동화를 위한 센서 망 실시간 트래픽 성능 평가)

  • Song, Myoung-Gyu;Choo, Young-Yeol
    • Journal of Korea Multimedia Society
    • /
    • 제11권7호
    • /
    • pp.1007-1015
    • /
    • 2008
  • In order to provide real-time data from sensors and instruments at manufacturing processes on web, we proposed a communication service model based on XML(eXtensible Markup Language). HTML(Hyper Text Markup Language) is inadequate for describing real-time data from manufacturing plants while it is suitable for display of non-real-time multimedia data on web. For applying XML-based web service of process data in Intranet environment, real-time performance of communication services was evaluated to provide the system design criteria. XML schema for the data presentation was proposed and its communication performance was evaluated by simulation in terms of transmission delay due to increased message length and processing delay for transformation of raw data into defined format. For transformation of raw data into XML format, we proposed two structures: one is the scheme where transformation is done at an SCC(Supervisory Control Computer) after receiving real-time data from instruments. the other is the scheme where transformation is carried out at instruments before the data are transmitted to the SCC. Performances of two structures were evaluated on a testbed under various conditions such as six packet sizes and offered loads of 20%, 50% and 80%, respectively. Test results show that proposed schemes are applicable to the systems in Ethernet 100BaseT network if total message traffic is less than 7 Mbps.

  • PDF

Analysis of Kernel-Thread Web Accelerator (커널 스레드 웹 가속기의 분석)

  • Hwang June;Nahm EuiSeok;Min Byungjo;Kim Hagbae
    • 한국컴퓨터산업교육학회:학술대회논문집
    • /
    • 한국컴퓨터산업교육학회 2003년도 제4회 종합학술대회 논문집
    • /
    • pp.17-22
    • /
    • 2003
  • The surge of Internet traffic makes the bottleneck nowadays. This problem can be reduced by substituting the media of network, routers and switches with more high-performance goods. However, we focused radically the server performance of processing the service requests. We prepose the method improving performance of server in the Linux kernel stack. This accelerator accepts the requests from many clients, and processes them using not user threads but kernel thread. To do so, we can reduce the overhead caused by frequent calling of system calls and the overhead of context switching between threads. Furthermore, we implement CPN(Coloured Petri Net) model. By using the CPN model criteria, we can analyze the characteristics of operation times in addition to the reachability of system. Benchmark of the system proves the model is valid.

  • PDF

A Study on Development of Network Advertising Service through Internet (인터넷을 통한 네트워크 광고 서비스 구축에 관한 연구)

  • Lee, Hee-Nahm;Lee, Chang-Ho
    • IE interfaces
    • /
    • 제13권4호
    • /
    • pp.599-607
    • /
    • 2000
  • In recent days, Internet advertising effects are expanded by the steep increase of the Internet users and the extension of the advertising market will be accelerated through Internet. This paper indicates the importance of Internet advertising and suggests the solution of a network advertising service. The system is divided into an Advertise Server, an Advertiser and a Web Publisher. This study proposes both the collection and the analysis of traffic data in real time. Also, the banner advertising frames not for sale purpose are levelled for the impression using the solution for the banner exchange engine. In addition, with developing the advertising service system by using Active Server Pages, the newest language of server side script will be able to lead the additional supplement of more various profitable functions when it is considered the rapid increment of Active Server Pages.

  • PDF

A Traffic Analysis for Web based Distance Education (사이버 교육 컨텐츠에 따른 트래픽 측정)

  • Cheon, In-Hyuk;Eum, Tai-Rang;Kwon, Lan;Lee, Kyung-Geun;Song, Jung-Hee
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 한국정보과학회 2003년도 봄 학술발표논문집 Vol.30 No.1 (A)
    • /
    • pp.857-859
    • /
    • 2003
  • 본 논문에서는 웹 기반의 사이버 강의 시스템을 이용하여 사용자가 인터넷을 통해 교육을 제공 받을 때 발생하는 트래픽을 측정 분석하고 강의에서 제공되는 동영상, 음성 및 문서 등의 멀티미디어 컨텐츠들이 대역폭에 미치는 영향을 분석한다. 또한 강의형태에 따라 트래픽 모델을 제시하고 강의 컨텐츠의 구성에 따라 달라지는 전송대역폭과 사용자수에 따른 영향을 분석한다.

  • PDF

A Traffic Analysis of Web based Distance Education (웹 기반의 사이버 교육 트래픽 분석)

  • 천인혁;이태석;신기정
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 한국정보과학회 2004년도 가을 학술발표논문집 Vol.31 No.2 (1)
    • /
    • pp.274-276
    • /
    • 2004
  • 본 논문에서는 현재 웹에서 제공되는 사이버 강의를 수강자가 인터넷을 통해 제공받을 때 사이버 교육컨텐츠들이 대역폭에 미치는 영향을 측정 분석한다. 또한 이더넷(Ethernet)을 통하여 스트리밍 형식의 사이버 강의를 수강할 경우 네트워크에 존재하는 설러 종류의 배경(Background)트래픽에 의하여 대역폭이 점유되므로 한정된 네트워크 환경에서는 강의 수강에 어려움이 있을 것으로 예상된다. 따라서 컨텐츠의 원활한 전달을 위해 FTP(File Transfer Protocol)를 이용하여 배경 트래픽을 발생시켜 이때 측정되는 사이버 강의 트래픽을 분석하여 강의의 전달 특성과 문제점을 파악한다. 마지막으로 사이버 강의를 수강하는 학습자의 위치에 따라 네트워크 환경을 살펴본 후 각각의 환경에서 강의를 수강할 경우를 가정하여 실제 트래픽을 측정 분석함으로써 강의제작에 선행되어야할 바랑직한 조건을 제안한다.

  • PDF