• Title/Summary/Keyword: Information Network Analysis

Search Result 7,095, Processing Time 0.033 seconds

The Study on the Research Trend of Social Network Analysis and the its Applicability to Information Science (사회 연결망 분석 연구동향 및 정보학 분야에서의 활용가능성에 관한 연구)

  • Kim, Seong-Hee;Chang, Rho-Sa
    • Journal of the Korean Society for information Management
    • /
    • v.27 no.4
    • /
    • pp.71-87
    • /
    • 2010
  • In this study, we analyzed the research trend of social network analysis. We investigated how this topic can be linked to the information science. We analyzed 163 articles that were retrieved from searching "social network analysis" in the keyword search field from 2000 to 2009. The study revealed the fast growth of the research of social network analysis in recent years. Also, the study showed that social network analysis has been applied to many cognate disciplines including management science, education science, and administration science. Finally, the study showed that social network analysis is a field equally important to information science as to other disciplines. Particularly, the study demonstrated that social network analysis can be applied to bibliometrics, including webmetrics.

Prevention of DDoS Attacks for Enterprise Network Based on Traceback and Network Traffic Analysis

  • Ma, Yun-Ji;Baek, Hyun-Chul;Kim, Chang-Geun;Kim, Sang-Bok
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.2
    • /
    • pp.157-163
    • /
    • 2009
  • With the wide usage of internet in many fields, networks are being exposed to many security threats, such as DDoS attack and worm/virus. For enterprise network, prevention failure of network security causes the revealing of commercial information or interruption of network services. In this paper, we propose a method of prevention of DDoS attacks for enterprise network based on traceback and network traffic analysis. The model of traceback implements the detection of IP spoofing attacks by the cooperation of trusted adjacent host, and the method of network traffic analysis implements the detection of DDoS attacks by analyzing the traffic characteristic. Moreover, we present the result of the experiments, and compare the method with other methods. The result demonstrates that the method can effectively detect and block DDoS attacks and IP spoofing attacks.

A Study on the Insider Behavior Analysis Framework for Detecting Information Leakage Using Network Traffic Collection and Restoration (네트워크 트래픽 수집 및 복원을 통한 내부자 행위 분석 프레임워크 연구)

  • Kauh, Janghyuk;Lee, Dongho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.125-139
    • /
    • 2017
  • In this paper, we developed a framework to detect and predict insider information leakage by collecting and restoring network traffic. For automated behavior analysis, many meta information and behavior information obtained using network traffic collection are used as machine learning features. By these features, we created and learned behavior model, network model and protocol-specific models. In addition, the ensemble model was developed by digitizing and summing the results of various models. We developed a function to present information leakage candidates and view meta information and behavior information from various perspectives using the visual analysis. This supports to rule-based threat detection and machine learning based threat detection. In the future, we plan to make an ensemble model that applies a regression model to the results of the models, and plan to develop a model with deep learning technology.

A Study on the Construction of National Cultural Information Network Model through Feasibility Analysis (국가 문화정보망 구축 당위성 분석을 통한 모형 설정에 관한 연구)

  • Jeong, Dong-Youl
    • Journal of the Korean Society for information Management
    • /
    • v.22 no.3 s.57
    • /
    • pp.13-36
    • /
    • 2005
  • As the importance of cultural information becomes greater than before, there are some needs for a new national economic paradigm in the knowledge based society. The purpose of this paper is to suggest guidelines for building up a national cultural information network model that enable to promote government's recognition and cultural policy. This research includes feasibility analysis of cultural policy perspective, current situations, and economic effect of cultural industry.

Study on Determining Core Journals and Network Analysis in the Field of Disaster & Safety (재난안전 분야 핵심 학술지 탐색 및 네트워크 분석 연구)

  • Kim, Byungkyu;You, Beom-Jong
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.53 no.4
    • /
    • pp.373-397
    • /
    • 2019
  • Recent disasters are a complex and growing trend. In order to effectively prepare for and respond to disasters that occur without notice, it is very important to use scientific information related to disaster and safety in addition to the standardized disaster safety information that is used. In this paper, we searched and selected major journals in the field of disaster & safety and conducted various network analysis studies using the classification scheme for development of integrated metadata for disaster & safety information developed through Disaster & Safety Information Sharing Platform R&D project as well as KSCD. Also, we have constructed and analyzed citation network, co-authorship network and keyword network through data identification and preprocessing of research paper contents. As a result of this study, based on the network constructed by information analysis unit, the network structure between core domestic and foreign journals, major research institutes, core keywords and individual information by disaster & safety type was identified in detail, and the analysis results were presented on a case-by-case basis.

A Proposal of Combat Power Measurement Model of Army Warfare Information System Using Network Power based on Social Network Analysis (SNA 기반 네트워크 파워를 이용한 지상전장정보체계 전투력 효과측정 모델제안)

  • Jung, Chi-Young;Lee, Jae-Yeong
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.36 no.4
    • /
    • pp.1-16
    • /
    • 2011
  • It is important not only to introduce the C4I(Command and Control, Communication, Computer, Intelligence) system for realizing the NCW(Network Centric Warfare) but also to evaluate the synergistic effect by the C4I system. However, the study effort for evaluating the system's synergistic effect is insufficient compared with introducing the system. Therefore, in this paper, we proposed a model that measures the synergistic effect of combat power by the warfare information system. To measure the synergistic effect of warfare information system, the network power must be considered, so we also proposed a new methodology for measurement of network power based on SNA(Social Network Analysis), not Metcalfe's law. A model we proposed is a model that measures the raised combat power by the network effectiveness. The methodology and model we proposed in this paper will be used usefully to analyze the practical effect of constructing future warfare information system.

Topic Analysis of Scholarly Communication Research

  • Ji, Hyun;Cha, Mikyeong
    • Journal of Information Science Theory and Practice
    • /
    • v.9 no.2
    • /
    • pp.47-65
    • /
    • 2021
  • This study aims to identify specific topics, trends, and structural characteristics of scholarly communication research, based on 1,435 articles published from 1970 to 2018 in the Scopus database through Latent Dirichlet Allocation topic modeling, serial analysis, and network analysis. Topic modeling, time series analysis, and network analysis were used to analyze specific topics, trends, and structures, respectively. The results were summarized into three sets as follows. First, the specific topics of scholarly communication research were nineteen in number, including research resource management and research data, and their research proportion is even. Second, as a result of the time series analysis, there are three upward trending topics: Topic 6: Open Access Publishing, Topic 7: Green Open Access, Topic 19: Informal Communication, and two downward trending topics: Topic 11: Researcher Network and Topic 12: Electronic Journal. Third, the network analysis results indicated that high mean profile association topics were related to the institution, and topics with high triangle betweenness centrality, such as Topic 14: Research Resource Management, shared the citation context. Also, through cluster analysis using parallel nearest neighbor clustering, six clusters connected with different concepts were identified.

A Study on the Future Strategy of KREONET through Analysis of Achievement and Future Demand

  • Park, Seongjin;Noh, Minki;Kim, Seunghae;Kwon, Woochang;Park, Chanjin;Cho, Buseung
    • Journal of Information Science Theory and Practice
    • /
    • v.10 no.spc
    • /
    • pp.154-163
    • /
    • 2022
  • The purpose of this paper is to illuminate the role and importance of National Research & Education Network (NREN) in the national research and education field and to establish the future strategy of KREONET in Korea. To this end, we first carefully analyze the footsteps of NREN in major overseas countries, KREONET achievements, and future demand for KREONET. The history of NREN's development is divided into the 2000s, 2010s, and present by era, and classified into network infrastructure, network service, and next-generation network technology by subject. KREONET achievements are divided into advanced research support, network backbone and operation, and network service. Future demand analysis of users who use KREONET was conducted through Korea Research International Incorporation, a survey company. This paper presents the future development strategy of KREONET by analyzing KREONET achievements and future demand.

Design and Implementation Web-based Network Traffic Monitoring System (웹 기반 네트워크 트래픽 모니터링 시스템의 설계 및 구현)

  • 안용학;박진호
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.3
    • /
    • pp.64-71
    • /
    • 2001
  • In this paper we propose the network traffic monitoring system that can supported network and system operation, management, expansion, and design using network analysis and diagnosis to a network administrator. The proposed system consists of two parts: analysis server for collection and analysis of the network information. and supports real-time monitoring of network traffic, and client system shows user a graphical data that analyzed a returned result from the server This system implements web-based technology using java and contributes to enhance the effectiveness of network administrator's management.

  • PDF

Comparative Performance Analysis of Network Security Accelerator based on Queuing System

  • Yun Yeonsang;Lee Seonyoung;Han Seonkyoung;Kim Youngdae;You Younggap
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.269-273
    • /
    • 2004
  • This paper presents a comparative performance analysis of a network accelerator model based on M/M/l queuing system. It assumes the Poisson distribution as its input traffic load. The decoding delay is employed as a performance analysis measure. Simulation results based on the proposed model show only $15\%$ differences with respect to actual measurements on field traffic for BCM5820 accelerator device. The performance analysis model provides with reasonable hardware structure of network servers, and can be used to span design spaces statistically.

  • PDF