• Title/Summary/Keyword: web log

Search Result 294, Processing Time 0.034 seconds

Detection and Location-based Visualization of Anomalous Web Sessions (비정상 웹 세션 탐지 및 지역 기반 시각화)

  • Kim, Sang-Rok;Lee, Jun-Sup;Seo, Jeong-Seok;Cha, Sung-Deok
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10c
    • /
    • pp.616-620
    • /
    • 2006
  • 한 해에도 수많은 해킹 사고가 발생하고 있고, 이 중에서 웹 해킹이 차지하는 비율은 급격하게 증가하고 있다. 또한 최근의 해킹 동향을 분석해 보았을 때 웹 해킹의 비율은 더욱 증가할 것이라고 예상된다. HTTP 프로토콜을 이용한 공격의 특성 상 정상행위와 비정상 행위의 구분이 어렵다. 따라서 웹 서비스에 특화된 침입탐지 시스템이 요구된다. 또한 웹 사이트 관리자는 빠른 탐지와 대응을 위해 이상 행위에 대한 신속하고 정확한 인식을 필요로 한다. 본 논문에서는 이러한 필요성을 기반으로 Location-based Visualization Tool을 제안한다. 웹 사용 현황 및 이상행위에 대해 시각적인 정보를 제공하기 위해 웹 서버의 access log를 분석하여 이상 행위를 탐지하였고, IP정보를 기반으로 지역 정보의 시각화를 구현하였다.

  • PDF

A Study on the Development of Internet Purchase Support Systems Based on Data Mining and Case-Based Reasoning (데이터마이닝과 사례기반추론 기법에 기반한 인터넷 구매지원 시스템 구축에 관한 연구)

  • 김진성
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.28 no.3
    • /
    • pp.135-148
    • /
    • 2003
  • In this paper we introduce the Internet-based purchase support systems using data mining and case-based reasoning (CBR). Internet Business activity that involves the end user is undergoing a significant revolution. The ability to track users browsing behavior has brought the vendor and end customer's closer than ever before. It is now possible for a vendor to personalize his product message for individual customers at massive scale. Most of former researchers, in this research arena, used data mining techniques to pursue the customer's future behavior and to improve the frequency of repurchase. The area of data mining can be defined as efficiently discovering association rules from large collections of data. However, the basic association rule-based data mining technique was not flexible. If there were no inference rules to track the customer's future behavior, association rule-based data mining systems may not present more information. To resolve this problem, we combined association rule-based data mining with CBR mechanism. CBR is used in reasoning for customer's preference searching and training through the cases. Data mining and CBR-based hybrid purchase support mechanism can reflect both association rule-based logical inference and case-based information reuse. A Web-log data gathered in the real-world Internet shopping mall is given to illustrate the quality of the proposed systems.

Research about Asynchronous LAS Advanced & WRC Weblog Analysis of Practical use ESM (LAS Advanced & WRC 웹로그 분석을 활용한 ESM에 관한 연구)

  • Woo, Seung-Ho;Kang, Soon-Duk
    • The Journal of Information Technology
    • /
    • v.7 no.4
    • /
    • pp.9-20
    • /
    • 2004
  • Result Dos that materialization KNU Virus Wall to solve serious problem Hurtfulness Virus is present network chiefly in this research to do not become and do correct disposal in situation such as internet and Multiple Protocol that is done intelligence anger for ESM, CIS and MIS side as secondary to solve this problem about out log analysis system embody. As a result, could use comprehensively, and can click by Site Design, Packet transmission, and used to interior internet (GroupWare) in information protection aspect because intelligence enemy to face each other ESM's various hacking and virus uses Enterprise Security Management system and CIS, whole web through Smart View and relation of security could do monitoring.

  • PDF

A Multimedia Recommender System Using User Playback Time (사용자의 재생 시간을 이용한 멀티미디어 추천 시스템)

  • Kwon, Hyeong-Joon;Chung, Dong-Keun;Hong, Kwang-Seok
    • Journal of Internet Computing and Services
    • /
    • v.10 no.1
    • /
    • pp.111-121
    • /
    • 2009
  • In this paper, we propose a multimedia recommender system using user's playback time. Proposed system collects multimedia content which is requested by user and its user‘s playback time, as web log data. The system predicts playback time.based preference level and related contents from collected transaction database by fuzzy association rule mining. Proposed method has a merit which sorts recommendation list according to preference without user’s custom preference data, and prevents a false preference. As an experimental result, we confirm that proposed system discovers useful rules and applies them to recommender system from a transaction which doesn‘t include custom preferences.

  • PDF

Implementation of Linux Server System Monitoring and Control Solution for Administrator (관리자를 위한 리눅스 서버 시스템 모니터링 및 제어 솔루션 구현)

  • Yoon, Hyo-Jun;Park, Byung-Ho;Choi, Yong-Seok;Kim, Chong-Soo;Seong, Hyeon-Kyeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.125-128
    • /
    • 2010
  • Linux server offers various kinds of service including web, FTP, and SSH. The users of these kinds of service are trying to hack by making use of it. That’s why some countermeasures are required for the security of the server. In this thesis, each type of service log of multiple Linux server was analyzed, and a solution was developed to monitor and control the multiple Linux server system not based on Linux but based on Windows.

  • PDF

Tele-Control of Rapid Prototyping Machine System Via Internet (인터넷 기반의 원격 제어를 이용한 RP 시스템 개발)

  • 최태림;송용억;강신일
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2001.04a
    • /
    • pp.24-27
    • /
    • 2001
  • Nowadays, increasing demand of the customized products has led to an increased usage of rapid prototyping in the product development. However, the acquisition price of a rapid prototyping equipment is still too high that not every body can afford to buy one. To offer a wide access to the users who need physical prototypes, a connection of the rapid prototyping equipment to the Internet is a viable step. It would allow a large group of customers all over the world to use the manufacturing capability of a service provider offering this kind of manufacturing service. To realize how such an e-manufacturing concept can look like, a LOM-type 3D printer developed at KIST has been used as test site and connected to the Internet. A possible user can log on to the server of the equipment and view his STL file and start the building operation from a remote place. To see whether the operation runs properly, a CCD camera is used to transmit the actual state of operation online. The result so far proves the feasibility of rapid prototyping on the Internet as well as an order-adaptive manufacturing system via web.

  • PDF

VCS: Tool for Visualizing Copy Number Variation and Single Nucleotide Polymorphism

  • Kim, HyoYoung;Sung, Samsun;Cho, Seoae;Kim, Tae-Hun;Seo, Kangseok;Kim, Heebal
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.27 no.12
    • /
    • pp.1691-1694
    • /
    • 2014
  • Copy number variation (CNV) or single nucleotide phlyorphism (SNP) is useful genetic resource to aid in understanding complex phenotypes or deseases susceptibility. Although thousands of CNVs and SNPs are currently avaliable in the public databases, they are somewhat difficult to use for analyses without visualization tools. We developed a web-based tool called the VCS (visualization of CNV or SNP) to visualize the CNV or SNP detected. The VCS tool can assist to easily interpret a biological meaning from the numerical value of CNV and SNP. The VCS provides six visualization tools: i) the enrichment of genome contents in CNV; ii) the physical distribution of CNV or SNP on chromosomes; iii) the distribution of log2 ratio of CNVs with criteria of interested; iv) the number of CNV or SNP per binning unit; v) the distribution of homozygosity of SNP genotype; and vi) cytomap of genes within CNV or SNP region.

A Study of Relationship with User Characteristics and Paid Contents Consumption on IPTV Services (IPTV 서비스 이용자 특성과 유료 콘텐츠 구매의 관련성에 대한 연구)

  • Sawng, Yeong-Wha;Kim, Juil;Kim, Myung-Jung;Park, Sun-Young
    • Journal of Information Technology Applications and Management
    • /
    • v.21 no.2
    • /
    • pp.15-29
    • /
    • 2014
  • This study analyzes the influence factors of IPTV users on the purchase of paid contents. This study carries out a web-log analysis of the actual users of the service provided by the domestic IPTV providers and classifies the influence factors on the purchase of paid contents largely into VOC, switching barriers, and content consumption pattern to conduct an empirical analysis. As analysis procedure, first, this study analyzes the preceding researches related to the core influence factors and content-purchasing patterns, and second, conducts a basic statistics analysis of the distribution of basic characteristics of the logs used, as presented in the above. Third, this study carries out a multiple regression analysis as an estimating equation of the number of purchasing the paid content depending on switching barriers of IPTV service, VOC, and content consumption pattern. As a statistical package, Stata version 11.2 was used. Through the empirical analysis, this study found that of the service use logs, VOC and content consumption pattern had a multi-dimensional impact on the purchase of premium contents. On the other hand, this study also found that the impact of switching barriers such as combination state with other products and current status of holding a point did not have a significant impact on the purchase of paid contents.

A Study on Implementation and Operation Management of Virtual Programming Lab based on Cloud Computing (클라우드 컴퓨팅 기반의 가상 프로그래밍 실습 환경 구현 및 운영 관리 방안 연구)

  • Park, Jungho;Choi, Eunyoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.578-580
    • /
    • 2013
  • In order to provide the virtual desktop service for computer programing training, User group to use the service should be created for each subject. And the management program to manage development tools, disk images, user account information, log data is required. In this study, we implemented the web-based operation management system to manage the virtual desktop service for computer programming training. We can provide rapid provisioning for the virtual desktop service by using the implemented system.

  • PDF

Survey of Automatic Query Expansion for Arabic Text Retrieval

  • Farhan, Yasir Hadi;Noah, Shahrul Azman Mohd;Mohd, Masnizah
    • Journal of Information Science Theory and Practice
    • /
    • v.8 no.4
    • /
    • pp.67-86
    • /
    • 2020
  • Information need has been one of the main motivations for a person using a search engine. Queries can represent very different information needs. Ironically, a query can be a poor representation of the information need because the user can find it difficult to express the information need. Query Expansion (QE) is being popularly used to address this limitation. While QE can be considered as a language-independent technique, recent findings have shown that in certain cases, language plays an important role. Arabic is a language with a particularly large vocabulary rich in words with synonymous shades of meaning and has high morphological complexity. This paper, therefore, provides a review on QE for Arabic information retrieval, the intention being to identify the recent state-of-the-art of this burgeoning area. In this review, we primarily discuss statistical QE approaches that include document analysis, search, browse log analyses, and web knowledge analyses, in addition to the semantic QE approaches, which use semantic knowledge structures to extract meaningful word relationships. Finally, our conclusion is that QE regarding the Arabic language is subjected to additional investigation and research due to the intricate nature of this language.