• Title/Summary/Keyword: network log analysis

Search Result 129, Processing Time 0.023 seconds

A Design and Development of Big Data Indexing and Search System using Lucene (루씬을 이용한 빅데이터 인덱싱 및 검색시스템의 설계 및 구현)

  • Kim, DongMin;Choi, JinWoo;Woo, ChongWoo
    • Journal of Internet Computing and Services
    • /
    • v.15 no.6
    • /
    • pp.107-115
    • /
    • 2014
  • Recently, increased use of the internet resulted in generation of large and diverse types of data due to increased use of social media, expansion of a convergence of among industries, use of the various smart device. We are facing difficulties to manage and analyze the data using previous data processing techniques since the volume of the data is huge, form of the data varies and evolves rapidly. In other words, we need to study a new approach to solve such problems. Many approaches are being studied on this issue, and we are describing an effective design and development to build indexing engine of big data platform. Our goal is to build a system that could effectively manage for huge data set which exceeds previous data processing range, and that could reduce data analysis time. We used large SNMP log data for an experiment, and tried to reduce data analysis time through the fast indexing and searching approach. Also, we expect our approach could help analyzing the user data through visualization of the analyzed data expression.

TIME-SERIES PHOTOMETRY OF VARIABLE STARS IN THE GLOBULAR CLUSTER NGC 288

  • Lee, Dong-Joo;Koo, Jae-Rim;Hong, Kyeongsoo;Kim, Seung-Lee;Lee, Jae Woo;Lee, Chung-Uk;Jeon, Young-Beom;Kim, Yun-Hak;Lim, Beomdu;Ryu, Yoon-Hyun;Cha, Sang-Mok;Lee, Yongseok;Kim, Dong-Jin;Park, Byeong-Gon;Kim, Chun-Hwey
    • Journal of The Korean Astronomical Society
    • /
    • v.49 no.6
    • /
    • pp.295-306
    • /
    • 2016
  • We present the results of BV time-series photometry of the globular cluster NGC 288. Observations were carried out to search for variable stars using the Korea Microlensing Telescope Network (KMTNet) 1.6-m telescopes and a 4k pre-science CCD camera during a test observation from August to December, 2014. We found a new SX Phe star and confirmed twelve previously known variable stars in NGC 288. For the semi-regular variable star V1, we newly determined a period of 37.3 days from light curves spanning 137 days. The light-curve solution of the eclipsing binary V10 indicates that the system is probably a detached system. The pulsation properties of nine SX Phe stars were examined by applying multiple frequency analysis to their light curves. We derived a new Period-Luminosity (P-L) relation, ${\langle}M_V{\rangle}=-2.476({\pm}0.300){\log}P-0.354({\pm}0.385)$, from six SX Phe stars showing the fundamental mode. Additionally, the period ratios of three SX Phe stars that probably have a double-radial mode were investigated; $P_{FO}/P_F=0.779$ for V5, $P_{TO}/P_{FO}=0.685$ for V9, $P_{SO}/P_{FO}=0.811$ for V11. This paper is the first contribution in a series assessing the detections and properties of variable stars in six southern globular clusters with the KMTNet system.

A Study on Image Acquisition and Usage Trace Analysis of Stick-PC (Stick-PC의 이미지 수집 및 사용흔적 분석에 대한 연구)

  • Lee, Han Hyoung;Bang, Seung Gyu;Baek, Hyun Woo;Jeong, Doo Won;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.7
    • /
    • pp.307-314
    • /
    • 2017
  • Stick-PC is small and portable, So it can be used like a desktop if you connect it to a display device such as a monitor or TV anytime and anywhere. Accordingly, Stick-PC can related to various crimes, and various evidence may remain. Stick-PC uses the same Windows version of the operating system as the regular Desktop, the artifacts to be analyzed are the same. However, unlike the Desktop, it can be used as a meaningful information for forensic investigation if it is possible to identify the actual user and trace the usage by finding the traces of peripheral devices before analyzing the system due to the mobility. In this paper, We presents a method of collecting images using Bootable OS, which is one of the image collection methods of Stick-PC. In addition, we show how to analyze the trace of peripheral connection and network connection trace such as Display, Bluetooth through the registry and event log, and suggest the application method from the forensic point of view through experimental scenario.

A Study on the Development of Services Supporting Personal Relationship Management - focusing on relationship management using mobile phones (인간 관계관리 지원 서비스 개발을 위한 연구 - 휴대전화를 이용한 관계 관리를 중심으로)

  • Kim, Ju-Yong;Lee, Chang-Hee;Lee, Se-Young;Lee, Jun-Ho
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.239-244
    • /
    • 2008
  • We lead a life in our community, beginning a new relationship with a stranger or maintaining or stopping existing relationships. Relationships with others are sustained through social activities based on communication. Generally speaking, by exchanging feelings and information through communication, relationships are formed and continued, and strengthened through active communication As a result of the development of technologies and information technology over the recent 10 years, a mobile phone has stood as a communication channel, and now it has become such a universal, and highly intimate and important means of communication that almost all the Koreans use more often than wired phones. Today, people have their communication channel available for others, by using a mobile phone at any time and anywhere. Like this, mobile phones have been playing a key role in helping people maintain, repair and strengthen their personal relationship, but from the perspective of personal relationship management, they still remain as an aid to help communication, failing to provide a positive help for actual relationship management. This study was designed to provide services supporting user's personal relationship management, focusing on the use of mobile phones as a major tool of communication, aiming to enable users to understand current state of their relationship and make relationship management efforts, or communication behaviors, by informing who needs communication, on the basis of data on mobile phone calls. To this end, the study established a method to extract intimacy between users and callers and develop a prototype of services supporting personal relationship management, using relationship characteristics in terms of mobile communication.

  • PDF

Properties and Fractal Analysis of Joints around the Moryang Fault (모량단층 주변 절리의 분포 특성과 프랙탈 해석)

  • 최한우;장태우
    • The Journal of Engineering Geology
    • /
    • v.9 no.2
    • /
    • pp.119-134
    • /
    • 1999
  • Joints developed around the Moryang fault were investigated by traverse and inventory methods in order to characterize their orientation, spacing and density. The results of the traverse method show that the orientation of the dominant joint sets of the study area is NNE and EW, and that joint spacing distribution is a negative exponential distribution to the center of the fault and a log-normal distribution to the margin of the fault. The results of the inventory method show that the orientation of the dominant joint sets on joint map is NW and NE, and that joint density tends to increase toward the center of the fault. Fractal dimension was determined by using Box-counting method and Cantor's dust method to quantify the distribution of joint network and to evaluate the dimension around the fault. The dimension determined by Box-counting method ranges from 1.31 to 1.70 and shows the tendency of increasing value toward the center of the fault. Comparing fractal dimension by Box-counting method with joint density, fractal dimension is directly proportional to joint density. Nevertheless, fractal dimension could be varied due to the different distribution patterns of the joints with same density. The dimensions determined by Cantor's dust method show different values with respect to the orientation of scan lines. This results form the anisotropy of joint distribution.

  • PDF

A Study on Ransomware Detection Methods in Actual Cases of Public Institutions (공공기관 실제 사례로 보는 랜섬웨어 탐지 방안에 대한 연구)

  • Yong Ju Park;Huy Kang Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.499-510
    • /
    • 2023
  • Recently, an intelligent and advanced cyber attack attacks a computer network of a public institution using a file containing malicious code or leaks information, and the damage is increasing. Even in public institutions with various information protection systems, known attacks can be detected, but unknown dynamic and encryption attacks can be detected when existing signature-based or static analysis-based malware and ransomware file detection methods are used. vulnerable to The detection method proposed in this study extracts the detection result data of the system that can detect malicious code and ransomware among the information protection systems actually used by public institutions, derives various attributes by combining them, and uses a machine learning classification algorithm. Results are derived through experiments on how the derived properties are classified and which properties have a significant effect on the classification result and accuracy improvement. In the experimental results of this paper, although it is different for each algorithm when a specific attribute is included or not, the learning with a specific attribute shows an increase in accuracy, and later detects malicious code and ransomware files and abnormal behavior in the information protection system. It is expected that it can be used for property selection when creating algorithms.

COVID-19 Vaccination Alters NK Cell Dynamics and Transiently Reduces HBsAg Titers Among Patients With Chronic Hepatitis B

  • Hyunjae Shin;Ha Seok Lee;Ji Yun Noh;June-Young Koh;So-Young Kim;Jeayeon Park;Sung Won Chung;Moon Haeng Hur;Min Kyung Park;Yun Bin Lee;Yoon Jun Kim;Jung-Hwan Yoon;Jae-Hoon Ko;Kyong Ran Peck;Joon Young Song;Eui-Cheol Shin;Jeong-Hoon Lee
    • IMMUNE NETWORK
    • /
    • v.23 no.5
    • /
    • pp.39.1-39.15
    • /
    • 2023
  • Coronavirus disease 2019 (COVID-19) vaccination may non-specifically alter the host immune system. This study aimed to evaluate the effect of COVID-19 vaccination on hepatitis B surface Ag (HBsAg) titer and host immunity in chronic hepatitis B (CHB) patients. Consecutive 2,797 CHB patients who had serial HBsAg measurements during antiviral treatment were included in this study. Changes in the HBsAg levels after COVID-19 vaccination were analyzed. The dynamics of NK cells following COVID-19 vaccination were also examined using serial blood samples collected prospectively from 25 healthy volunteers. Vaccinated CHB patients (n=2,329) had significantly lower HBsAg levels 1-30 days post-vaccination compared to baseline (median, -21.4 IU/ml from baseline), but the levels reverted to baseline by 91-180 days (median, -3.8 IU/ml). The velocity of the HBsAg decline was transiently accelerated within 30 days after vaccination (median velocity: -0.06, -0.39, and -0.04 log10 IU/ml/year in pre-vaccination period, days 1-30, and days 31-90, respectively). In contrast, unvaccinated patients (n=468) had no change in HBsAg levels. Flow cytometric analysis showed that the frequency of NK cells expressing NKG2A, an NK inhibitory receptor, significantly decreased within 7 days after the first dose of COVID-19 vaccine (median, -13.1% from baseline; p<0.001). The decrease in the frequency of NKG2A+ NK cells was observed in the CD56dimCD16+ NK cell population regardless of type of COVID-19 vaccine. COVID-19 vaccination leads to a rapid, transient decline in HBsAg titer and a decrease in the frequency of NKG2A+ NK cells.

Intelligent Brand Positioning Visualization System Based on Web Search Traffic Information : Focusing on Tablet PC (웹검색 트래픽 정보를 활용한 지능형 브랜드 포지셔닝 시스템 : 태블릿 PC 사례를 중심으로)

  • Jun, Seung-Pyo;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.93-111
    • /
    • 2013
  • As Internet and information technology (IT) continues to develop and evolve, the issue of big data has emerged at the foreground of scholarly and industrial attention. Big data is generally defined as data that exceed the range that can be collected, stored, managed and analyzed by existing conventional information systems and it also refers to the new technologies designed to effectively extract values from such data. With the widespread dissemination of IT systems, continual efforts have been made in various fields of industry such as R&D, manufacturing, and finance to collect and analyze immense quantities of data in order to extract meaningful information and to use this information to solve various problems. Since IT has converged with various industries in many aspects, digital data are now being generated at a remarkably accelerating rate while developments in state-of-the-art technology have led to continual enhancements in system performance. The types of big data that are currently receiving the most attention include information available within companies, such as information on consumer characteristics, information on purchase records, logistics information and log information indicating the usage of products and services by consumers, as well as information accumulated outside companies, such as information on the web search traffic of online users, social network information, and patent information. Among these various types of big data, web searches performed by online users constitute one of the most effective and important sources of information for marketing purposes because consumers search for information on the internet in order to make efficient and rational choices. Recently, Google has provided public access to its information on the web search traffic of online users through a service named Google Trends. Research that uses this web search traffic information to analyze the information search behavior of online users is now receiving much attention in academia and in fields of industry. Studies using web search traffic information can be broadly classified into two fields. The first field consists of empirical demonstrations that show how web search information can be used to forecast social phenomena, the purchasing power of consumers, the outcomes of political elections, etc. The other field focuses on using web search traffic information to observe consumer behavior, identifying the attributes of a product that consumers regard as important or tracking changes on consumers' expectations, for example, but relatively less research has been completed in this field. In particular, to the extent of our knowledge, hardly any studies related to brands have yet attempted to use web search traffic information to analyze the factors that influence consumers' purchasing activities. This study aims to demonstrate that consumers' web search traffic information can be used to derive the relations among brands and the relations between an individual brand and product attributes. When consumers input their search words on the web, they may use a single keyword for the search, but they also often input multiple keywords to seek related information (this is referred to as simultaneous searching). A consumer performs a simultaneous search either to simultaneously compare two product brands to obtain information on their similarities and differences, or to acquire more in-depth information about a specific attribute in a specific brand. Web search traffic information shows that the quantity of simultaneous searches using certain keywords increases when the relation is closer in the consumer's mind and it will be possible to derive the relations between each of the keywords by collecting this relational data and subjecting it to network analysis. Accordingly, this study proposes a method of analyzing how brands are positioned by consumers and what relationships exist between product attributes and an individual brand, using simultaneous search traffic information. It also presents case studies demonstrating the actual application of this method, with a focus on tablets, belonging to innovative product groups.

Clickstream Big Data Mining for Demographics based Digital Marketing (인구통계특성 기반 디지털 마케팅을 위한 클릭스트림 빅데이터 마이닝)

  • Park, Jiae;Cho, Yoonho
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.3
    • /
    • pp.143-163
    • /
    • 2016
  • The demographics of Internet users are the most basic and important sources for target marketing or personalized advertisements on the digital marketing channels which include email, mobile, and social media. However, it gradually has become difficult to collect the demographics of Internet users because their activities are anonymous in many cases. Although the marketing department is able to get the demographics using online or offline surveys, these approaches are very expensive, long processes, and likely to include false statements. Clickstream data is the recording an Internet user leaves behind while visiting websites. As the user clicks anywhere in the webpage, the activity is logged in semi-structured website log files. Such data allows us to see what pages users visited, how long they stayed there, how often they visited, when they usually visited, which site they prefer, what keywords they used to find the site, whether they purchased any, and so forth. For such a reason, some researchers tried to guess the demographics of Internet users by using their clickstream data. They derived various independent variables likely to be correlated to the demographics. The variables include search keyword, frequency and intensity for time, day and month, variety of websites visited, text information for web pages visited, etc. The demographic attributes to predict are also diverse according to the paper, and cover gender, age, job, location, income, education, marital status, presence of children. A variety of data mining methods, such as LSA, SVM, decision tree, neural network, logistic regression, and k-nearest neighbors, were used for prediction model building. However, this research has not yet identified which data mining method is appropriate to predict each demographic variable. Moreover, it is required to review independent variables studied so far and combine them as needed, and evaluate them for building the best prediction model. The objective of this study is to choose clickstream attributes mostly likely to be correlated to the demographics from the results of previous research, and then to identify which data mining method is fitting to predict each demographic attribute. Among the demographic attributes, this paper focus on predicting gender, age, marital status, residence, and job. And from the results of previous research, 64 clickstream attributes are applied to predict the demographic attributes. The overall process of predictive model building is compose of 4 steps. In the first step, we create user profiles which include 64 clickstream attributes and 5 demographic attributes. The second step performs the dimension reduction of clickstream variables to solve the curse of dimensionality and overfitting problem. We utilize three approaches which are based on decision tree, PCA, and cluster analysis. We build alternative predictive models for each demographic variable in the third step. SVM, neural network, and logistic regression are used for modeling. The last step evaluates the alternative models in view of model accuracy and selects the best model. For the experiments, we used clickstream data which represents 5 demographics and 16,962,705 online activities for 5,000 Internet users. IBM SPSS Modeler 17.0 was used for our prediction process, and the 5-fold cross validation was conducted to enhance the reliability of our experiments. As the experimental results, we can verify that there are a specific data mining method well-suited for each demographic variable. For example, age prediction is best performed when using the decision tree based dimension reduction and neural network whereas the prediction of gender and marital status is the most accurate by applying SVM without dimension reduction. We conclude that the online behaviors of the Internet users, captured from the clickstream data analysis, could be well used to predict their demographics, thereby being utilized to the digital marketing.