• Title/Summary/Keyword: network log analysis

Search Result 129, Processing Time 0.026 seconds

Proposal of Log Analysis System using SDN Quarantined Network (SDN을 활용한 검역 시스템에서의 로그 분석 시스템 제안)

  • Kim, Tae-Young;Kim, Nam-Uk;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.442-444
    • /
    • 2015
  • 정보통신기술의 발전으로 컴퓨터에 대한 의존도가 높아지고 있다. 이런 높은 의존도는 곧 사이버 보안적인 측면에서 문제가 생길 경우 국가적으로 큰 혼란이 발생한다는 것을 국내에서 발생한 사고들을 통해 알 수 있다. 이에 대응하기 위해 많은 보안 솔루션들이 존재함에도 불구하고 보안 사고들이 지속적으로 발생하고 있는 것은 특정 기능에 국한되어 중복과 취약점이 존재하고 있기 때문이다. 이러한 정보보호 환경의 한계를 극복하고자 새로운 개념의 SDN을 활용한 검역 시스템을 제안되었으며, 본 논문에서는 SDN을 활용한 검역 시스템 내에서 적용할 로그 분석 시스템을 제안한다.

Bioinformatics Analysis Reveals Significant Genes and Pathways to Targetfor Oral Squamous Cell Carcinoma

  • Jiang, Qian;Yu, You-Cheng;Ding, Xiao-Jun;Luo, Yin;Ruan, Hong
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.5
    • /
    • pp.2273-2278
    • /
    • 2014
  • Purpose: The purpose of our study was to explore the molecular mechanisms in the process of oral squamous cells carcinoma (OSCC) development. Method: We downloaded the affymetrix microarray data GSE31853 and identified differentially expressed genes (DEGs) between OSCC and normal tissues. Then Gene Ontology (GO) and Protein-Protein interaction (PPI) networks analysis was conducted to investigate the DEGs at the function level. Results: A total 372 DEGs with logFCI >1 and P value < 0.05 were obtained, including NNMT, BAX, MMP9 and VEGF. The enriched GO terms mainly were associated with the nucleoplasm, response to DNA damage stimuli and DNA repair. PPI network analysis indicated that GMNN and TSPO were significant hub proteins and steroid biosynthesis and synthesis and degradation of ketone bodies were significantly dysregulated pathways. Conclusion: It is concluded that the genes and pathways identified in our work may play critical roles in OSCC development. Our data provides a comprehensive perspective to understand mechanisms underlying OSCC and the significant genes (proteins) and pathways may be targets for therapy in the future.

Study on Detection Technique of Privacy Distribution Route based on Interconnection of Security Documents and Transaction ID (보안문서와 트랜잭션ID 연계기반 개인정보유통경로 탐지기법 연구)

  • Shin, Jae-ho;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1435-1447
    • /
    • 2015
  • Finance Companies are operating a security solution such as E-DRM(Enterprise-Digital Right Management), Personal information search, DLP(Data Loss Prevention), Security of printed paper, Internet network separation system, Privacy monitoring system for privacy leakage prevention by insiders. However, privacy leakages are occurring continuously and it is difficult to the association analysis about relating to the company's internal and external distribution of private document. Because log system operated in the separate and independent security solutions. This paper propose a systematic chains that can correlatively analyze business systems and log among heterogeneous security solutions organically and consistently based on security documents. Also, we suggest methods of efficient detection for Life-Cycle management plan about security documents that are created in the personal computer or by individual through the business system and distribution channel tracking about security documents contained privacy.

An Integrated Face Detection and Recognition System (통합된 시스템에서의 얼굴검출과 인식기법)

  • 박동희;이규봉;이유홍;나상동;배철수
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.165-170
    • /
    • 2003
  • This paper presents an integrated approach to unconstrained face recognition in arbitrary scenes. The front end of the system comprises of a scale and pose tolerant face detector. Scale normalization is achieved through novel combination of a skin color segmentation and log-polar mapping procedure. Principal component analysis is used with the multi-view approach proposed in[10] to handle the pose variations. For a given color input image, the detector encloses a face in a complex scene within a circular boundary and indicates the position of the nose. Next, for recognition, a radial grid mapping centered on the nose yields a feature vector within the circular boundary. As the width of the color segmented region provides an estimated size for the face, the extracted feature vector is scale normalized by the estimated size. The feature vector is input to a trained neural network classifier for face identification. The system was evaluated using a database of 20 person's faces with varying scale and pose obtained on different complex backgrounds. The performance of the face recognizer was also quite good except for sensitivity to small scale face images. The integrated system achieved average recognition rates of 87% to 92%.

  • PDF

An Accurate Radio Channel Model for Wireless Sensor Networks Simulation

  • Alejandro Martfnez-Sala;Jose-Maria Molina-Garcia-Pardo;Esteban Egea-Lopez;Javier Vales-Alonso;Leandro Juan-Llacer;Joan Garcia-Haro
    • Journal of Communications and Networks
    • /
    • v.7 no.4
    • /
    • pp.401-407
    • /
    • 2005
  • Simulations are currently an essential tool to develop and test wireless sensor networks (WSNs) protocols and to analyze future WSNs applications performance. Researchers often simulate their proposals rather than deploying high-cost test-beds or develop complex mathematical analysis. However, simulation results rely on physical layer assumptions, which are not usually accurate enough to capture the real behavior of a WSN. Such an issue can lead to mistaken or questionable results. Besides, most of the envisioned applications for WSNs consider the nodes to be at the ground level. However, there is a lack of radio propagation characterization and validation by measurements with nodes at ground level for actual sensor hardware. In this paper, we propose to use a low-computational cost, two slope, log-normal path­loss near ground outdoor channel model at 868 MHz in WSN simulations. The model is validated by extensive real hardware measurements obtained in different scenarios. In addition, accurate model parameters are provided. This model is compared with the well-known one slope path-loss model. We demonstrate that the two slope log-normal model provides more accurate WSN simulations at almost the same computational cost as the single slope one. It is also shown that the radio propagation characterization heavily depends on the adjusted model parameters for a target deployment scenario: The model parameters have a considerable impact on the average number of neighbors and on the network connectivity.

Analysis of Computer Simulated and Field Experimental Results of LoRa Considering Path Loss under LoS and NLoS Environment (LoS 및 NLoS 환경에서의 경로 손실을 고려한 LoRa의 모의실험 및 실측 결과 분석)

  • Yi, Dong Hee;Kim, Suk Chan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.2
    • /
    • pp.444-452
    • /
    • 2017
  • Recently, a demand of Internet-of-things (IoT) rises dramatically and an interest in Low Power Wide Area (LPWA) grows larger accordingly. In this paper, performance in LoRa which is included in LPWA standard is analyzed. Particularly, after measuring Received Signal Strength Indication (RSSI) of received signal on Line-of-sight (LoS) and Non-line-of-sight (NLoS) environment and it is compared with RSSI which theoretical path loss model is applied to. Among many path loss models, the simulation for theoretical RSSI use Log-distance, Two-ray model and Okumura-Hata model that is based on the test database. Consequently, the result of Okumura-Hata model is the most similar with the measured RSSI. When a network based on LoRa is built, this result can used to decide optimal node arrangement.

A Study on the Group Routing Algorithm in DHT-based Peer-to-Peer System (DHT 기반 P2P 시스템을 위한 그룹 라우팅 알고리즘에 관한 연구)

  • Park, Yong-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.111-120
    • /
    • 2012
  • As the P2P System is a distributed system that shares resources of nodes that participate in the system, all the nodes serve as a role of server and client. Currently, although systematic, structured P2P systems such as Chord, Pastry, and Tapestry were suggested based on the distributed hash table, these systems are limited to $log_2N$ for performance efficiency. For this enhanced performance efficiency limited, the article herein suggests group routing algorithm. The suggested algorithm is a node-to-group routing algorithm which divides circular address space into groups and uses a concept of pointer representing each group, which is an algorithm where routing is performed based on pointer. To evaluate algorithm performance, a comparative analysis was conducted on average hops, routing table size, and delayed transmission for chord and routing, a signature algorithm in P2P systems. Therefore, enhanced performance is verified for comparative items from the simulation results.

Component Based Face Detection for PC Camera (PC카메라 환경을 위한 컴포넌트 기반 얼굴 검출)

  • Cho, Chi-Young;Kim, Soo-Hwan
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02a
    • /
    • pp.988-992
    • /
    • 2006
  • 본 논문은 PC카메라 환경에서 명암왜곡에 강인한 얼굴검출을 위한 컴포넌트 기반 얼굴검출 기법을 제시한다. 영상 내의 얼굴검출을 위해 에지(edge) 분석, 색상 분석, 형판정합(template matching), 신경망(Neural Network), PCA(Principal Component Analysis), LDA(Linear Discriminant Analysis) 등의 기법들이 사용되고 있고, 영상의 왜곡을 보정하기 위해 히스토그램 분석(평활화, 명세화), gamma correction, log transform 등의 영상 보정 방법이 사용되고 있다. 그러나 기존의 얼굴검출 방법과 영상보정 방법은 검출대상 객체의 부분적인 잡음 및 조명의 왜곡에 대처하기가 어려운 단점이 있다. 특히 PC카메라 환경에서 획득된 이미지와 같이 전면과 후면, 상하좌우에서 비추어지는 조명에 의해 검출 대상 객체의 일부분이 왜곡되는 상황이 발생될 경우 기존의 방법으로는 높은 얼굴 검출 성능을 기대할 수 없는 상황이 발생된다. 본 논문에서는 기울어진 얼굴 및 부분적으로 명암 왜곡된 얼굴을 효율적으로 검출할 수 있도록 얼굴의 좌우 대칭성을 고려한 가로방향의 대칭평균화로 얼굴검출을 위한 모델을 생성하여 얼굴검출에 사용한다. 이 방법은 부분적으로 명암왜곡된 얼굴이미지를 기존의 영상 보정기법을 적용한 것 보다 잘 표현하며, 얼굴이 아닌 후보는 비얼굴 이미지의 형상을 가지게 하는 특성이 있다.

  • PDF

Using Transaction Logs to Better Understand User Search Session Patterns in an Image-based Digital Library (이미지 기반 디지털 도서관에서 이용자 검색 패턴의 효과적 이해를 위한 트랜잭션 로그 데이터 분석)

  • Han, Hye-Jung;Joo, Soohyung;Wolfram, Dietmar
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.25 no.1
    • /
    • pp.19-37
    • /
    • 2014
  • Server transaction logs containing complete click-through data from a digital library of primarily image-based documents were analyzed to better understand user search session behavior. One month of data was analyzed using descriptive statistics and network analysis methods. The findings reveal iterative search behaviors centered on result views and evaluation and topical areas of focus for the search sessions. The study is novel in its combined analytical techniques and use of click-through data for image collections.

Research about Asynchronous LAS Advanced & WRC Weblog Analysis of Practical use ESM (LAS Advanced & WRC 웹로그 분석을 활용한 ESM에 관한 연구)

  • Woo, Seung-Ho;Kang, Soon-Duk
    • The Journal of Information Technology
    • /
    • v.7 no.4
    • /
    • pp.9-20
    • /
    • 2004
  • Result Dos that materialization KNU Virus Wall to solve serious problem Hurtfulness Virus is present network chiefly in this research to do not become and do correct disposal in situation such as internet and Multiple Protocol that is done intelligence anger for ESM, CIS and MIS side as secondary to solve this problem about out log analysis system embody. As a result, could use comprehensively, and can click by Site Design, Packet transmission, and used to interior internet (GroupWare) in information protection aspect because intelligence enemy to face each other ESM's various hacking and virus uses Enterprise Security Management system and CIS, whole web through Smart View and relation of security could do monitoring.

  • PDF