• Title/Summary/Keyword: 로그 데이터

Search Result 893, Processing Time 0.022 seconds

기업보안 강화를 위한 취약점 진단 통합관리 체계 구축

  • Mun, Ho-Geon;Park, Seong-Cheol
    • Information and Communications Magazine
    • /
    • v.31 no.5
    • /
    • pp.39-45
    • /
    • 2014
  • 기업활동에서 IT에 대한 의존도가 증가함에 따라 기업들은 다양한 소프트웨어 및 하드웨어 플랫폼에서 제공되는 서비스들을 운영하고 있다. 서비스들이 보급, 확대되는 과정에서 새로운 보안 취약점들이 나타나고, 이들 취약점을 악용한 기업정보의 유출 및 해킹 등 보안사고의 발생도 비례하여 증가하고 있다[1]. 특히 다양한 유형의 사업을 운영하는 지주회사 또는 대기업 그룹사의 경우, 사업영역별로 운영 중인 IT 인프라의 보안 취약점이 네트워크로 연결된 타 사업용 IT 인프라에 대한 사이버 침해의 통로로 악용될 가능성이 있다. 이 같은 문제의 해결을 위해 기업들은 사업영역 별로 보유한 IT 인프라의 보안 취약점 진단과 대응을 위한 솔루션들을 도입, 운영해 오고 있다. 하지만 기업의 보안 거버넌스 관점에서 보안 취약점 관리도 전사적인 보안 정책과의 연계 강화, 투자 중복의 방지, 효과적인 관리와 통제에 대한 필요성이 대두되기 시작했다. 보안 거버넌스 체계 강화에 대한 기업의 요구변화에 맞춰 보안 취약점의 통합관리를 지원하는 상용 솔루션들이 일부 출시되고 있으나 기업들이 기 운영하고 있는 개별 취약점 진단 솔루션과의 연동, 로그관리 및 기업이 요구하는 특화된 기능 구현 등의 어려움이 도입에 장애가 되고 있다. 따라서, 대기업을 중심으로 개별 보안 취약점 진단 솔루션들을 연동하여 기업보안 거버넌스를 효과적으로 지원할 수 있도록 취약점 관리업무 프로세스의 재설계와 함께 취약점 진단 통합관리 체계를 구축하고 있다[2][3][4]. 본고는 보안 취약점 관리업무의 문제점을 소개하고, 최근 대 기업을 중심으로 활발히 구축이 추진되고 있는 웹 기반의 취약 점 진단 통합관리 체계의 개념, 기능 및 운영 프로세스를 소개한다. 아울러, 기업 IT 인프라에 대한 보안 취약점 진단 데이터를 축적하여 기업 내부의 보안위험 요소를 사전예측하고, 정보보호의 투자 대비 효과(ROSI: Security Return on Investment)를 효과적으로 산정하는 인프라로서 활용 가치를 소개한다.

A Study of Acquisition and Analysis on the Bios Firmware Image File in the Digital Forensics (디지털 포렌식 관점에서 BIOS 펌웨어 이미지 파일 수집 및 분석에 관한 연구)

  • Jeong, Seung Hoon;Lee, Yun Ho;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.491-498
    • /
    • 2016
  • Recently leakages of confidential information and internal date have been steadily increasing by using booting technique on portable OS such as Windows PE stored in portable storage devices (USB or CD/DVD etc). This method allows to bypass security software such as USB security or media control solution installed in the target PC, to extract data or insert malicious code by mounting the PC's storage devices after booting up the portable OS. Also this booting method doesn't record a log file such as traces of removable storage devices. Thus it is difficult to identify whether the data are leaked and use trace-back technique. In this paper is to propose method to help facilitate the process of digital forensic investigation or audit of a company by collecting and analyzing BIOS firmware images that record data relating to BIOS settings in flash memory and finding traces of portable storage devices that can be regarded as abnormal events.

Analysis of Commercial Continuous Media Server Workloads on Internet (인터넷 환경에서의 상용 연속미디어 서버의 부하 분석)

  • Kim, Ki-Wan;Lee, Seung-Won;Park, Seong-Ho;Chung, Ki-Dong
    • The KIPS Transactions:PartB
    • /
    • v.10B no.1
    • /
    • pp.87-94
    • /
    • 2003
  • A study on the characteristics of server workloads based on user access pattern offers insights for the strategies on continuous media caching and network workloads distribution. This paper analyses characteristics of continuous media filet in each fervor and user access requests to each of them, using log data of three commercial sites, which are providing continuous media files in the form of real time streaming on the Internet. These servers have more continuous files than ones in the previously reported studies and are processing very large number of user access requests. We analyse the characteristics of continuous media files in each server by the size of files. playback time and encoding bandwidth. We also analyse the characteristics of user access requests by the distribution of user requests to continuous media files, user access time, access rate based on the popularity of the files and the number if access requests to serial continuous media files.

Development of Estimation Method for Degree of Congestion on Expressway Using VMS Information (고속도로 VMS 정보를 활용한 지정체도 산출방안 개발)

  • Lee, Seung-Jun;Park, Jae-Beom;Kim, Soo-Hee;Bok, Ki-Chan
    • International Journal of Highway Engineering
    • /
    • v.11 no.1
    • /
    • pp.25-36
    • /
    • 2009
  • Everyday congestion length (distance) and duration (time) data are collected and recorded in Expressway Traffic Information Center. These records are based on the information that the operators watch CCTV and decide traffic condition in order to present information about congestion on VMS. Using VMS message has some merits like that it doesn't need a great lot of cost to construct hardware such like FTMS because operators can check traffic condition by watching CCTV only. Of cause in the aspect of accuracy, using VMS message has the limitation that it is based on subject decision compared with FTMS. However, it can be said that the value of using VMS message is very large. The object of this study is to use the VMS information record (log file) usefully to provide information of traffic condition on expressway for users (drivers) without keeping the VMS information record in dead storage. To do so, in this research, congestion calculation method able to understand traffic congestion condition on expressway was developed.

  • PDF

Method and Application of Searching Hot Spot For Reengineering Software Using AOP (AOP를 이용한 재공학에서의 핫 스팟 탐색과 응용)

  • Lee, Ei-Sung;Choi, Eun-Man
    • The KIPS Transactions:PartD
    • /
    • v.16D no.1
    • /
    • pp.83-92
    • /
    • 2009
  • Complicated business logic makes program complexity more complicated. It's inevitable that the program must undergo reengineering processes all the way of in its lifetime. Hot spot analysis that has diverse purposes is getting an important question more and more. As a rule, reengineering process is done by UML model-based approach to analyze the legacy system. The smallest fragment of targets to be analysed is unit, that is function or class. Today's software development is to deal with huge change of software product and huge class including heavy quantity of LOC(Lines Of Code). However, analysis of unit is not precise approach process for reliable reengineering consequence. In this paper, we propose very precise hot spot analysis approach using Aspect-Oriented Programming languages, such as AspectJ. Typically the consistency between UML and source is needed code to redefine the modified library or framework boundaries. But reengineering approach using AOP doesn't need to analyze UML and source code. This approach makes dynamic event log data that contains detailed program interaction information. This dynamic event log data makes it possible to analyze hot spot.

Defense System Acquisition Management System Considering SBA Effectiveness Analysis (SBA 효과도 분석을 고려한 국방 무기체계도입 관리시스템 구조)

  • Kim, Hyung Jong;Lee, Hae Young
    • Journal of the Korea Society for Simulation
    • /
    • v.25 no.4
    • /
    • pp.137-144
    • /
    • 2016
  • This paper proposes characteristics of management system for defense system development. This research shows how effectiveness of SBA (simulation-based acquisition) can be represented even necessity of SBA is recognized by researchers. To achieve this goal there are two key information, (1)the cost for modeling and simulation and (2) number of trial and error of a certain step in a phase. This paper presents user interface of gathering those two key information and a way of showing the effectiveness of SBA using those two information. In this work, all the data gathering for calculation of effectiveness should be considered as a saving logs. The contribution of this research is in presenting quantitative value representing effectiveness of SBA and proposing a system architecture for deriving the quantitative effectiveness.

A Study on the Usage Patterns of Electronic Commerce Web System (수용도 향상을 위한 소비자의 쇼핑몰 사용패턴특성 분류 및 분석)

  • 곽효연;손일문
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.3
    • /
    • pp.149-157
    • /
    • 2002
  • Todays, electronic commerce(EC) results to the revolution and new paradigm of business, more and more Web-based EC applications have emerged. But, it's web systems should be satisfied by customers and it should be successful to buying some goods in virtual stores with easy to use. The usability and acceptance of the EC web system is one of the key factors in the successful construction of EC system. In this paper, we considered the characteristics of information search and decision making process in the design of EC web system to be used easily and to be more acceptable to customers. On the basis of these characteristics, we could classified with the activities of the process of buying in the domestic web systems. And, the log files of experimental tasks were analyzed by the statistical method of data mining. As the these results, the important factors of the process of buying could be summarized, 5 user groups could be seen in EC customers, and the usage patterns of these groups were described. These results could be very useful to design user-oriented EC web system.

  • PDF

Spiral Drawing-based Real-time Crystallization Mosaic Tchnique (나선 드로잉 기반 실시간 결정화 모자이크 기법)

  • Kim, Jae Kyoung;Kim, Young Ho;Park, Jin Wan
    • Journal of the Korean Society for Computer Game
    • /
    • v.31 no.4
    • /
    • pp.137-144
    • /
    • 2018
  • In the past, mosaics were made by laying cloth on the floor and manually tiling the tiles. However, due to recent developments in technology, the data storage method has evolved from analog to digital, so that image representation and conversion can be realized through computer. Also, various expression techniques of mosaic are developed, and it is also used as a method of art representation in digital. There are various studies on the production process of mosaic. The proposed method is a crystallization mosaic that spreads spirally in real time and uses 3D quartz as a tile element. Although existing researches are mostly focused on the purpose of rendering images in more detail, this technique combines untried spiral drawing and crystallization, and attempts to explore new expression techniques in 3D space by attempting a new mosaic method in 3D space. 'Spiral Crystallization Photo', based on this technique, was selected as Top27 in MWU Award 18 and exhibited at Unite Seoul 2018.

Detecting Abnormalities in Fraud Detection System through the Analysis of Insider Security Threats (내부자 보안위협 분석을 통한 전자금융 이상거래 탐지 및 대응방안 연구)

  • Lee, Jae-Yong;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.153-169
    • /
    • 2018
  • Previous e-financial anomalies analysis and detection technology collects large amounts of electronic financial transaction logs generated from electronic financial business systems into big-data-based storage space. And it detects abnormal transactions in real time using detection rules that analyze transaction pattern profiling of existing customers and various accident transactions. However, deep analysis such as attempts to access e-finance by insiders of financial institutions with large scale of damages and social ripple effects and stealing important information from e-financial users through bypass of internal control environments is not conducted. This paper analyzes the management status of e-financial security programs of financial companies and draws the possibility that they are allies in security control of insiders who exploit vulnerability in management. In order to efficiently respond to this problem, it will present a comprehensive e-financial security management environment linked to insider threat monitoring as well as the existing e-financial transaction detection system.

Estimating speech parameters for ultrasonic Doppler signal using LSTM recurrent neural networks (LSTM 순환 신경망을 이용한 초음파 도플러 신호의 음성 패러미터 추정)

  • Joo, Hyeong-Kil;Lee, Ki-Seung
    • The Journal of the Acoustical Society of Korea
    • /
    • v.38 no.4
    • /
    • pp.433-441
    • /
    • 2019
  • In this paper, a method of estimating speech parameters for ultrasonic Doppler signals reflected from the articulatory muscles using LSTM (Long Short Term Memory) RNN (Recurrent Neural Networks) was introduced and compared with the method using MLP (Multi-Layer Perceptrons). LSTM RNN were used to estimate the Fourier transform coefficients of speech signals from the ultrasonic Doppler signals. The log energy value of the Mel frequency band and the Fourier transform coefficients, which were extracted respectively from the ultrasonic Doppler signal and the speech signal, were used as the input and reference for training LSTM RNN. The performance of LSTM RNN and MLP was evaluated and compared by experiments using test data, and the RMSE (Root Mean Squared Error) was used as a measure. The RMSE of each experiment was 0.5810 and 0.7380, respectively. The difference was about 0.1570, so that it confirmed that the performance of the method using the LSTM RNN was better.