• Title/Summary/Keyword: application log

Search Result 438, Processing Time 0.027 seconds

Correlation Analysis of Event Logs for System Fault Detection (시스템 결함 분석을 위한 이벤트 로그 연관성에 관한 연구)

  • Park, Ju-Won;Kim, Eunhye;Yeom, Jaekeun;Kim, Sungho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.2
    • /
    • pp.129-137
    • /
    • 2016
  • To identify the cause of the error and maintain the health of system, an administrator usually analyzes event log data since it contains useful information to infer the cause of the error. However, because today's systems are huge and complex, it is almost impossible for administrators to manually analyze event log files to identify the cause of an error. In particular, as OpenStack, which is being widely used as cloud management system, operates with various service modules being linked to multiple servers, it is hard to access each node and analyze event log messages for each service module in the case of an error. For this, in this paper, we propose a novel message-based log analysis method that enables the administrator to find the cause of an error quickly. Specifically, the proposed method 1) consolidates event log data generated from system level and application service level, 2) clusters the consolidated data based on messages, and 3) analyzes interrelations among message groups in order to promptly identify the cause of a system error. This study has great significance in the following three aspects. First, the root cause of the error can be identified by collecting event logs of both system level and application service level and analyzing interrelations among the logs. Second, administrators do not need to classify messages for training since unsupervised learning of event log messages is applied. Third, using Dynamic Time Warping, an algorithm for measuring similarity of dynamic patterns over time increases accuracy of analysis on patterns generated from distributed system in which time synchronization is not exactly consistent.

The Comparative Study for Truncated Software Reliability Growth Model based on Log-Logistic Distribution (로그-로지스틱 분포에 근거한 소프트웨어 고장 시간 절단 모형에 관한 비교연구)

  • Kim, Hee-Cheul;Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.85-91
    • /
    • 2011
  • Due to the large-scale application software syslmls, software reliability, software development has animportantrole. In this paper, software truncated software reliability growth model was proposed based on log-logistic distribution. According to fixed time, the intensity function, the mean value function, the reliability was estimated and the parameter estimation used to maximum likelihood. In the empirical analysis, Poisson execution time model of the existiog model in this area and the log-logistic model were compared Because log-logistic model is more efficient in tems of reliability, in this area, the log-logistic model as an alternative 1D the existiog model also were able to confim that you can use.

UWB Automobile Short Range Radar Receivers Performance In a Log-Normal Clutter Background (Log-Normal Clutter 환경에서 차량용 UWB 단거리 레이더 수신기의 성능분석)

  • Kumaravelu, Nandeeshkumar;Ko, Seok-Jun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.9
    • /
    • pp.59-64
    • /
    • 2011
  • Ultra wideband radars attract considerable attention as a short range automotive radar because of its high range resolution. Radar signal reflected from a target often contains unwanted echoes called as clutter, so the detection of target is difficult due to clutter echoes. Therefore, it is important to investigate the radar detector for better detecting from the reflected signals. In this paper, the optimal detector is obtained for various mean and variance value in log-normal clutter environment. The types of non-coherent detectors used are square law detector, linear detector, and logarithmic detector. The performances of detectors are compared in log normal clutter environment and the suitable detector is determined for automotive short range radar application.

Unlocking Shared Bike System by Exploiting an Application Log (애플리케이션 로그를 이용한 공유 자전거 시스템의 잠금장치 해제 방법)

  • Cho, Junwan;Lee, Jeeun;Kim, Kwangjo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.719-728
    • /
    • 2019
  • Recently, there has been a growing market for shared mobility businesses that share 'transport' such as cars and bikes, and many operators offer a variety of services. However, if the fare can not be charged normally because of security vulnerability, the operator can not continue the business. So there should be no security loopholes. However, there is a lack of awareness and research on shared mobility security. In this paper, we analyzed security vulnerabilities exposed in application log of shared bike service in Korea. We could easily obtain the password of the bike lock and the encryption key of the AES-128 algorithm through the log, and confirmed the data generation process for unlocking using software reverse engineering. It is shown that the service can be used without charge with a success rate of 100%. This implies that the importance of security in shared mobility business and new security measures are needed.

Research on Data Acquisition Strategy and Its Application in Web Usage Mining (웹 사용 마이닝에서의 데이터 수집 전략과 그 응용에 관한 연구)

  • Ran, Cong-Lin;Joung, Suck-Tae
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.3
    • /
    • pp.231-241
    • /
    • 2019
  • Web Usage Mining (WUM) is one part of Web mining and also the application of data mining technique. Web mining technology is used to identify and analyze user's access patterns by using web server log data generated by web users when users access web site. So first of all, it is important that the data should be acquired in a reasonable way before applying data mining techniques to discover user access patterns from web log. The main task of data acquisition is to efficiently obtain users' detailed click behavior in the process of users' visiting Web site. This paper mainly focuses on data acquisition stage before the first stage of web usage mining data process with activities like data acquisition strategy and field extraction algorithm. Field extraction algorithm performs the process of separating fields from the single line of the log files, and they are also well used in practical application for a large amount of user data.

Chemical Characteristics and Application for Kraft Pulp of Bed Log Wastes (표고골목의 화학적 특성과 펄프재로서의 이용방안)

  • Jeong, Myung-Joon;Kim, Dae-Young;Jo, Byoung-Muk;Oh, Jung-Soo
    • Journal of the Korean Wood Science and Technology
    • /
    • v.33 no.3 s.131
    • /
    • pp.79-88
    • /
    • 2005
  • This research studied the utilization of the bed log wastes as a papermaking grade pulp. Five different bed log samples from shiitake mushroom (Lentinus edodes (Berk.) Sing) cultivation were collected by the cultivating periods of 1 to 5 years. The wood chemical composition and the characteristics of kraft pulping of each sample were investigated. The results of chemical composition showed that the rate of carbohydrate (glucose and xylose) content in sapwood was decreased as the cultivation period was increased. In heartwood, there was no significant difference. The screening yield of non-cultivated bed log from kraft pulping was higher than that of cultivated one, but the reject of cultivated one, especially for 5 year-cultivated, was lower than non-cultivated bed log. The fiber length and width was continuously decreased as the cultivation period was increased. Therefore, the freeness of the pulp from the cultivated bed log was sharply decreased comparing to non-cultivated due to the fiber cutting and the increased fine content. The dry strengths were increased according to the increasing addition level of bed log kraft pulp to KOCC and non-cultivated wood pulp. From the overall results, the pulp from 5 years cultivated bed log can be reasonably used if it is mixed with long fiber pulp for advantages such as reducing beating time.

A Study on Slowness Time Coherence Application and its Characteristics from Sonic Log Experiment in Model Holes (모형공에서의 음파실험을 통한 STC 기법의 적용과 특성 비교)

  • Kim, Yeong-Hwa;Zhao, Weijun
    • Geophysics and Geophysical Exploration
    • /
    • v.10 no.4
    • /
    • pp.299-307
    • /
    • 2007
  • Slowness time coherence (STC) technique has been applied to 3-receiver slim hole sonic log using 3 NX sized concrete model holes of different physical properties. We analyzed the effects of different source center frequencies on the wave forms, their amplitude spectra, and their STC results. We could determine the sonic velocity of each mode accurately by the application of STC method with the semblance projection and efficient selection of center frequency. Theoretical model and experimental model hole studies indicate that 4-receiver condition is the most ideal for STC in near surface slim hole sonic log. The result also indicates that favorable STC result can be obtained from three-receiver sonic log provided with the help of the first arrival picking method.

Study on Windows Event Log-Based Corporate Security Audit and Malware Detection (윈도우 이벤트 로그 기반 기업 보안 감사 및 악성코드 행위 탐지 연구)

  • Kang, Serim;Kim, Soram;Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.591-603
    • /
    • 2018
  • Windows Event Log is a format that records system log in Windows operating system and methodically manages information about system operation. An event can be caused by system itself or by user's specific actions, and some event logs can be used for corporate security audits, malware detection and so on. In this paper, we choose actions related to corporate security audit and malware detection (External storage connection, Application install, Shared folder usage, Printer usage, Remote connection/disconnection, File/Registry manipulation, Process creation, DNS query, Windows service, PC startup/shutdown, Log on/off, Power saving mode, Network connection/disconnection, Event log deletion and System time change), which can be detected through event log analysis and classify event IDs that occur in each situation. Also, the existing event log tools only include functions related to the EVTX file parse and it is difficult to track user's behavior when used in a forensic investigation. So we implemented new analysis tool in this study which parses EVTX files and user behaviors.

Application of Fuzzy Math Simulation to Quantitative Risk Assessment in Pork Production (돈육 생산공정에서의 정량적 위해 평가에 fuzzy 연산의 적용)

  • Im, Myung-Nam;Lee, Seung-Ju
    • Korean Journal of Food Science and Technology
    • /
    • v.38 no.4
    • /
    • pp.589-593
    • /
    • 2006
  • The objective of this study was to evaluate the use of fuzzy math strategy to calculate variability and uncertainty in quantitative risk assessment. We compared the propagation of uncertainty using fuzzy math simulation with Monte Carlo simulation. The risk far Listeria monocytogenes contamination was estimated for carcass and processed pork by fuzzy math and Monte Carlo simulations, respectively. The data used in these simulations were taken from a recent report on pork production. In carcass, the mean values for the risk from fuzzy math and Monte Carlo simulations were -4.393 log $CFU/cm^2$ and -4.589 log $CFU/cm^2$, respectively; in processed pork, they were -4.185 log $CFU/cm^2$ and -4.466 log $CFU/cm^2$ respectively. The distribution of values obtained using the fuzzy math simulation included all of the results obtained using the Monte Carlo simulation. Consequently, fuzzy math simulation was found to be a good alternative to Monte Carlo simulation in quantitative risk assessment of pork production.

Combined Chlorite-Monochloramine Application for Controlling Nitrifying and Heterotrophic Bacteria in Drinking Water Distribution System (상수관망에서 Chlorite-Monochloramine 소독제를 이용한 질산화 세균 및 종속영양세균의 제어)

  • Park, Se-Keun;Kim, Yeong-Kwan;Choi, Sung-Chan
    • Korean Journal of Microbiology
    • /
    • v.49 no.4
    • /
    • pp.321-327
    • /
    • 2013
  • In the present work, the reactors that harbor bacterial biofilms including ammonia-oxidizing bacteria (AOB) and heterotrophic bacteria were treated with a continuous dose of chlorite ($0.66{\pm}0.01mg/L$) either with or without monochloramine at $1.77{\pm}0.03mg/L$. Both chlorite alone and combined chlorite-monochloramine applications effectively reduced biofilm and bulk AOB levels to near or below the detection limit ($0.6MPN/cm^2$ and 0.2 MPN/ml). The combined chlorite-monochloramine application exhibited greater AOB inactivation than chlorite alone. Unlike AOB, heterotrophic plate count (HPC) was unaffected by chlorite alone. In contrast to chlorite-only application, a combination of chlorite and monochloramine resulted in a significant reduction in HPC levels with log reductions of 3.1 and 3.0 for biofilm and bulk water, respectively. The results demonstrate that the combined chlorite-monochloramine application can provide an effective treatment for the inhibition of AOB and heterotrophic bacteria in a drinking water distribution system.