• Title/Summary/Keyword: event log

Search Result 147, Processing Time 0.028 seconds

Decision Support System to Detect Unauthorized Access in Smart Work Environment (스마트워크 환경에서 이상접속탐지를 위한 의사결정지원 시스템 연구)

  • Lee, Jae-Ho;Lee, Dong-Hoon;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.797-808
    • /
    • 2012
  • In smart work environment, a company provides employees a flexible work environment for tele-working using mobile phone or portable devices. On the other hand, such environment are exposed to the risks which the attacker can intrude into computer systems or leak personal information of smart-workers' and gain a company's sensitive information. To reduce these risks, the security administrator needs to analyze the usage patterns of employees and detect abnormal behaviors by monitoring VPN(Virtual Private Network) access log. This paper proposes a decision support system that can notify the status by using visualization and similarity measure through clustering analysis. On average, 88.7% of abnormal event can be detected by this proposed method. With this proposed system, the security administrator can detect abnormal behaviors of the employees and prevent account theft.

Deep Learning-Based, Real-Time, False-Pick Filter for an Onsite Earthquake Early Warning (EEW) System (온사이트 지진조기경보를 위한 딥러닝 기반 실시간 오탐지 제거)

  • Seo, JeongBeom;Lee, JinKoo;Lee, Woodong;Lee, SeokTae;Lee, HoJun;Jeon, Inchan;Park, NamRyoul
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.25 no.2
    • /
    • pp.71-81
    • /
    • 2021
  • This paper presents a real-time, false-pick filter based on deep learning to reduce false alarms of an onsite Earthquake Early Warning (EEW) system. Most onsite EEW systems use P-wave to predict S-wave. Therefore, it is essential to properly distinguish P-waves from noises or other seismic phases to avoid false alarms. To reduce false-picks causing false alarms, this study made the EEWNet Part 1 'False-Pick Filter' model based on Convolutional Neural Network (CNN). Specifically, it modified the Pick_FP (Lomax et al.) to generate input data such as the amplitude, velocity, and displacement of three components from 2 seconds ahead and 2 seconds after the P-wave arrival following one-second time steps. This model extracts log-mel power spectrum features from this input data, then classifies P-waves and others using these features. The dataset consisted of 3,189,583 samples: 81,394 samples from event data (727 events in the Korean Peninsula, 103 teleseismic events, and 1,734 events in Taiwan) and 3,108,189 samples from continuous data (recorded by seismic stations in South Korea for 27 months from 2018 to 2020). This model was trained with 1,826,357 samples through balancing, then tested on continuous data samples of the year 2019, filtering more than 99% of strong false-picks that could trigger false alarms. This model was developed as a module for USGS Earthworm and is written in C language to operate with minimal computing resources.

Measurement of inconvenience, human errors, and mental workload of simulated nuclear power plant control operations

  • Oh, I.S.;Sim, B.S.;Lee, H.C.;Lee, D.H.
    • Proceedings of the ESK Conference
    • /
    • 1996.10a
    • /
    • pp.47-55
    • /
    • 1996
  • This study developed a comprehensive and easily applicable nuclear reactor control system evaluation method using reactor operators behavioral and mental workload database. A proposed control panel design cycle consists of the 5 steps: (1) finding out inconvenient, erroneous, and mentally stressful factors for the proposed design through evaluative experiments, (2) drafting improved design alternatives considering detective factors found out in the step (1), (3) comparative experiements for the design alternatives, (4) selecting a best design alternative, (5) returning to the step (1) and repeating the design cycle. Reactor operators behavioral and mental workload database collected from evaluative experiments in the step (1) and comparative experiments in the step (3) of the design cycle have a key roll in finding out defective factors and yielding the criteria for selection of the proposed reactor control systems. The behavioral database was designed to include the major informations about reactor operators' control behaviors: beginning time of operations, involved displays, classification of observational behaviors, dehaviors, decisions, involved control devices, classification of control behaviors, communications, emotional status, opinions for man-machine interface, and system event log. The database for mental workload scored from various physiological variables-EEG, EOG, ECG, and respir- ation pattern-was developed to indicate the most stressful situation during reactor control operations and to give hints for defective design factors. An experimental test for the evaluation method applied to the Compact Nuclear Simulator (CNS) installed in Korea Atomic Energy Research Institute (KAERI) suggested that some defective design factors of analog indicators should be improved and that automatization of power control to a target level would give relaxation to the subject operators in stressful situation.

  • PDF

Comparison of System Call Sequence Embedding Approaches for Anomaly Detection (이상 탐지를 위한 시스템콜 시퀀스 임베딩 접근 방식 비교)

  • Lee, Keun-Seop;Park, Kyungseon;Kim, Kangseok
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.2
    • /
    • pp.47-53
    • /
    • 2022
  • Recently, with the change of the intelligent security paradigm, study to apply various information generated from various information security systems to AI-based anomaly detection is increasing. Therefore, in this study, in order to convert log-like time series data into a vector, which is a numerical feature, the CBOW and Skip-gram inference methods of deep learning-based Word2Vec model and statistical method based on the coincidence frequency were used to transform the published ADFA system call data. In relation to this, an experiment was carried out through conversion into various embedding vectors considering the dimension of vector, the length of sequence, and the window size. In addition, the performance of the embedding methods used as well as the detection performance were compared and evaluated through GRU-based anomaly detection model using vectors generated by the embedding model as an input. Compared to the statistical model, it was confirmed that the Skip-gram maintains more stable performance without biasing a specific window size or sequence length, and is more effective in making each event of sequence data into an embedding vector.

Control-Path Driven Process-Group Discovery Framework and its Experimental Validation for Process Mining and Reengineering (프로세스 마이닝과 리엔지니어링을 위한 제어경로 기반 프로세스 그룹 발견 프레임워크와 실험적 검증)

  • Thanh Hai Nguyen;Kwanghoon Pio Kim
    • Journal of Internet Computing and Services
    • /
    • v.24 no.5
    • /
    • pp.51-66
    • /
    • 2023
  • In this paper, we propose a new type of process discovery framework, which is named as control-path-driven process group discovery framework, to be used for process mining and process reengineering in supporting life-cycle management of business process models. In addition, we develop a process mining system based on the proposed framework and perform experimental verification through it. The process execution event logs applied to the experimental effectiveness and verification are specially defined as Process BIG-Logs, and we use it as the input datasets for the proposed discovery framework. As an eventual goal of this paper, we design and implement a control path-driven process group discovery algorithm and framework that is improved from the ρ-algorithm, and we try to verify the functional correctness of the proposed algorithm and framework by using the implemented system with a BIG-Log dataset. Note that all the process mining algorithm, framework, and system developed in this paper are based on the structural information control net process modeling methodology.

Analysis of Perception Differences between Construction Workers and Managers Implementing for the Severe Accident Punishment Act: Focused on Measures to Improve Safety Management Effectiveness (중대재해처벌법 시행에 따른 건설현장 근로자와 관리자의 인식차 분석: 안전관리 실효성 향상 방안을 중심으로)

  • Jae-Hwan Cho;Sung Hak Chung
    • Journal of the Korea Safety Management & Science
    • /
    • v.26 no.1
    • /
    • pp.75-89
    • /
    • 2024
  • The objective of this study was to conduct research and analysis using Group Focus Interview to survey the between construction site workers and managers implementing for the Severe Accident Punishment Act. Focused on measures to improve safety management effectiveness for the effectiveness of establishing a safety management system. A plan to improve the efficient safety management system was presented to 50 construction industrial managers and workers. In order to ensure the industrial accident prevention policies appropriately, it is necessary to be aware of safety obligations for workers as well as business operators. In addition, despite the existence of a commentary on the Serious Accident Punishment Act, confusion in the field still persists, so in the event of a major accidents, the obligation to take safety and health education is strengthened, and effective case education is proposed by teaching actual accident cases suitable for actual working sites. It is necessary to make all training mandatory, and it is necessary to reconsider awareness through writing a daily safety log, awareness of risk factors, etc., and writing down risk information. Above all, at the construction ordering stage, it is necessary to keep the construction safety, request corrections and supplements for problems issues that arise, and consult between the orderer and the construction company about the problems issues. Rather than having only the construction company correct or supplement the safety management plan, the contents should be shared with supervisors and workers to establish a more practical solution. Results of this study will contribute to improving the effectiveness of the serious accident and construction safety management system.

School Experiences and the Next Gate Path : An analysis of Univ. Student activity log (대학생의 학창경험이 사회 진출에 미치는 영향: 대학생활 활동 로그분석을 중심으로)

  • YI, EUNJU;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.4
    • /
    • pp.149-171
    • /
    • 2020
  • The period at university is to make decision about getting an actual job. As our society develops rapidly and highly, jobs are diversified, subdivided, and specialized, and students' job preparation period is also getting longer and longer. This study analyzed the log data of college students to see how the various activities that college students experience inside and outside of school might have influences on employment. For this experiment, students' various activities were systematically classified, recorded as an activity data and were divided into six core competencies (Job reinforcement competency, Leadership & teamwork competency, Globalization competency, Organizational commitment competency, Job exploration competency, and Autonomous implementation competency). The effect of the six competency levels on the employment status (employed group, unemployed group) was analyzed. As a result of the analysis, it was confirmed that the difference in level between the employed group and the unemployed group was significant for all of the six competencies, so it was possible to infer that the activities at the school are significant for employment. Next, in order to analyze the impact of the six competencies on the qualitative performance of employment, we had ANOVA analysis after dividing the each competency level into 2 groups (low and high group), and creating 6 groups by the range of first annual salary. Students with high levels of globalization capability, job search capability, and autonomous implementation capability were also found to belong to a higher annual salary group. The theoretical contributions of this study are as follows. First, it connects the competencies that can be extracted from the school experience with the competencies in the Human Resource Management field and adds job search competencies and autonomous implementation competencies which are required for university students to have their own successful career & life. Second, we have conducted this analysis with the competency data measured form actual activity and result data collected from the interview and research. Third, it analyzed not only quantitative performance (employment rate) but also qualitative performance (annual salary level). The practical use of this study is as follows. First, it can be a guide when establishing career development plans for college students. It is necessary to prepare for a job that can express one's strengths based on an analysis of the world of work and job, rather than having a no-strategy, unbalanced, or accumulating excessive specifications competition. Second, the person in charge of experience design for college students, at an organizations such as schools, businesses, local governments, and governments, can refer to the six competencies suggested in this study to for the user-useful experiences design that may motivate more participation. By doing so, one event may bring mutual benefits for both event designers and students. Third, in the era of digital transformation, the government's policy manager who envisions the balanced development of the country can make a policy in the direction of achieving the curiosity and energy of college students together with the balanced development of the country. A lot of manpower is required to start up novel platform services that have not existed before or to digitize existing analog products, services and corporate culture. The activities of current digital-generation-college-students are not only catalysts in all industries, but also for very benefit and necessary for college students by themselves for their own successful career development.

Analyzing the weblog data of a shopping mall using process mining (프로세스 마이닝을 이용한 쇼핑몰 웹로그 데이터 분석)

  • Kim, Chae-Young;Yong, Hye-Ryeon;Hwang, Hyun-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.11
    • /
    • pp.777-787
    • /
    • 2020
  • With the development of the Internet and the spread of mobile devices, the online market is growing rapidly. As the number of customers using online shopping malls explodes, research is being conducted on the analysis of usage behavior from customer data, personalized product recommendations, and service development. Thus, this paper seeks to analyze the overall process of online shopping malls through process mining, and to identify the factors that influence users' purchases. The data used are from a large online shopping mall, and R was the analysis tool. The results show that customer activity was most prominent in categories with event elements, such as unconventional discounts and monthly giveaway events. On the other hand, searches, logins, and campaign activity were found to be less relevant than their importance. Those are very important, because they can provide clues to a customer's information and needs. Therefore, it is necessary to refine the recommendations from related search words, and to manage activity, such as coupons provided when customers log in. In addition to the previous discussion, this paper proposes various business strategies to enhance the competitiveness of online shopping malls and to increase profits.

A Study on ICS Security Information Collection Method Using CTI Model (CTI 모델 활용 제어시스템 보안정보 수집 방안 연구)

  • Choi, Jongwon;Kim, Yesol;Min, Byung-gil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.471-484
    • /
    • 2018
  • Recently, cyber threats are frequently occurring in ICS(industrial control systems) of government agencies, infrastructure, and manufacturing companies. In order to cope with such cyber threats, it is necessary to apply CTI to ICS. For this purpose, a security information collection system is needed. However, it is difficult to install security solution in control devices such as PLC. Therefor, it is difficult to collect security information of ICS. In addition, there is a problem that the security information format generated in various assets is different. Therefore, in this paper, we propose an efficient method to collect ICS security information. We utilize CybOX/STIX/TAXII CTI models that are easy to apply to ICS. Using this model, we designed the formats to collect security information of ICS assets. We created formats for system logs, IDS logs, and EWS application logs of ICS assets using Windows and Linux. In addition, we designed and implemented a security information collection system that reflects the designed formats. This system can be used to apply monitoring system and CTI to future ICS.

Characterization of Domestic Well Intrusion Events for the Safety Assessment of the Geological Disposal System (심지층 처분시스템의 안전성평가를 위한 국내 우물침입 발생 특성 평가)

  • Kim, Jung-Woo;Cho, Dong-Keun;Ko, Nak-Youl;Jeong, Jongtae
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.13 no.1
    • /
    • pp.1-10
    • /
    • 2015
  • In the safety assessment of the geological disposal system of the radioactive wastes, the abnormal scenarios, in which the system is impacted by the abnormal events, need to be considered in addition to the reference scenario. In this study, characterization and prediction of well intrusion as one of the abnormal events which will impact the disposal system were conducted probabilistically and statistically for the safety assessment. The domestic well development data were analyzed, and the prediction methodologies of the well intrusion were suggested with a computation example. From the results, the annual well development rate per unit area in Korea was about 0.8 well/yr/km2 in the conservative point of view. Considering the area of the overall disposal system which is about 1.5 km2, the annual well development rate within the disposal system could be 1.2 well/yr. That is, it could be expected that more than one well would be installed within the disposal system every year after the institutional management period. From the statistical analysis, the probabilistic distribution of the well depth followed the log-normal distribution with 3.0363 m of mean value and 1.1467 m of standard deviation. This study will be followed by the study about the impacts of the well intrusion on the geological disposal system, and the both studies will contribute to the increased reliability of safety assessment.