• Title/Summary/Keyword: Log management

Search Result 742, Processing Time 0.029 seconds

A Study on Impersonation Attack of Linux Sudoers Through Shadow File Manipulation (Shadow 파일 조작을 통한 리눅스 Sudoer의 위장공격에 대한 연구)

  • Kim, Sanghun;Cho, Taenam
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.7
    • /
    • pp.149-156
    • /
    • 2020
  • All operating systems have privileged administrator accounts for efficient management. Dangerous or sensitive tasks or resources should be banned from normal users and should only be accessible by administrators. One example of this privilege is to reset a user's password when the user loses his/her password. In this paper, the privileges of the sudoer group, the administrator group of Linux Ubuntu, and the management system of the sudoer group were analyzed. We show the danger that a sudoer can use the privilege to change the password of other users, including other sudoers, and modify the log, and suggest a countermeasure to prevent the manipulation of shadow files as a solution to this. In addition, the proposed method was implemented and the possibility of practical use was confirmed with excellent performance.

The Forecasting Model of the Repair Cost in Apartment Housing - Focused roof water proofing and Elevator work - (공동주택 공종별 수선비용 예측모델 연구 - 옥상방수 공사와 승강기 공사를 중심으로 -)

  • Lee, KangHee;Chae, ChangU
    • KIEAE Journal
    • /
    • v.15 no.6
    • /
    • pp.63-68
    • /
    • 2015
  • Purpose: Most if buildings need various repair works for preventing or delaying the deterioration which gives rise to affect the living condition or function after constructed. Therefore, a long-term repair schedule should be planned and a repair cost is required. In this paper, it aimed at providing the statistical forecast model for a repair cost in roof water-proofing work and elevator work using statistical approach with three variables such as number of household, management area and a elapsed year. Data are collected in apartment housings which are located in Seoul area and conducted with interview and questionnaire sheet. Each analyzed work is divided into a partly work and fully work. Results of this study are shown that, first, the regression model takes a multiplying type like a Cobb-Douglas function and is changed into the log-linear type to include the three variable simultaneously. Second, the goodness-of-fit of the repair cost forecasting model has a good statistics in determinant's coefficient and Dubin-Watson value. Third, the management area is stronger factor than other the number of household and an elapsed year in roof water-proofing work and elevator work.

Dynamic Linkages between Food Inflation and Its Volatility: Evidence from Sri Lankan Economy

  • MOHAMED MUSTAFA, Abdul Majeed;SIVARAJASINGHAM, Selliah
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.6 no.4
    • /
    • pp.139-145
    • /
    • 2019
  • This study examines the dynamic linkages between food price inflation and its volatility in the context of Sri Lanka. The empirical evidence derived from the monthly data for the period from 2003M1 to 2017M12 for Sri Lanka. The relationship between inflation rate and inflation volatility has attracted more attention by theoretical and empirical macroeconomists. Empirical studies on the relationship between food inflation and food inflation variability is scarce in the literature. Food price inflation is defined as log difference of food price series. The volatility of a food price inflation is measured by conditional variance generated by the FIGARCH model. Preliminary analysis showed that food inflation is stationary series. Granger causality test reveals that food inflation seems to exert positive impact on inflation variability. We find no evidence for inflation uncertainty affecting food inflation rates. Hence, the findings of the study supports the Friedman-Ball hypothesis in both cases of consumer food price inflation and wholesale food price inflation. This implies that past information on food inflation can help improve the one-step-ahead prediction of food inflation variability but not vice versa. Our results have some important policy implications for the design of monetary policy, food policy thereby promoting macroeconomic stability.

Personalized Battery Lifetime Prediction for Mobile Devices based on Usage Patterns

  • Kang, Joon-Myung;Seo, Sin-Seok;Hong, James Won-Ki
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.4
    • /
    • pp.338-345
    • /
    • 2011
  • Nowadays mobile devices are used for various applications such as making voice/video calls, browsing the Internet, listening to music etc. The average battery consumption of each of these activities and the length of time a user spends on each one determines the battery lifetime of a mobile device. Previous methods have provided predictions of battery lifetime using a static battery consumption rate that does not consider user characteristics. This paper proposes an approach to predict a mobile device's available battery lifetime based on usage patterns. Because every user has a different pattern of voice calls, data communication, and video call usage, we can use such usage patterns for personalized prediction of battery lifetime. Firstly, we define one or more states that affect battery consumption. Then, we record time-series log data related to battery consumption and the use time of each state. We calculate the average battery consumption rate for each state and determine the usage pattern based on the time-series data. Finally, we predict the available battery time based on the average battery consumption rate for each state and the usage pattern. We also present the experimental trials used to validate our approach in the real world.

Management Plan for Mobile Contents Bypassing In App Billing Application (모바일 컨텐츠 인앱 결제 우회 애플리케이션에 대한 대처 방안)

  • Lee, Sang-Ho;Shin, Miyea
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.3
    • /
    • pp.21-26
    • /
    • 2015
  • As mobile contents grow up, In App Billing is brisk at applications including mobile contents. But some of users don't pay and use charged content for free to use cheating payment module or hacking through applications. Call this bypass payment. Applications, helping bypass, are Freedom, IAP Cracker, and DNS server suggested by the hacker named Borodin. In case of mobile game, Despite sell a lot of charged content but income is different revenue in sales log with real profits. Because of users using bypass payment application. Management plan to bypass payment are checking OrderID, encrypting public key and verifying receipt.

  • PDF

Improvement Strategies of Arriving Time to the Scene by Enhancing EMTs' Recognition of Triage (구급출동지령서 개선을 통한 구급대원 현장 도착시간 단축방안)

  • Oh, Won Sin;Joung, Suck Hwan;Yoon, Myong Oh
    • Journal of the Korea Safety Management & Science
    • /
    • v.17 no.1
    • /
    • pp.45-52
    • /
    • 2015
  • The purpose of this investigation is to enhance the survival rate of patients by transporting them to the hospital within the golden hour through the operational improvement of emergency dispatch instruction. To this end, problems and improvements of current operating system were derived by carrying out a survey against paramedics of Incheon city in 2012 and analyzing the current emergency dispatch instruction. This study analyzed the emergency activity daily reports for one year from January 1 through December 31, 2012 and researched the consciousness of 119 emergency medical technician. According to the analysis of the survey, there were no meaningful differences in the on-site arrival times per triage. Therefore, the item of 'Emergency Classification' specified in the emergency dispatch instruction needs to be integrated in the scheme of "triage". Also, the feedbacks of the emergency action log and the emergency dispatch instruction are necessary for 'duty for operation' to review the adequacy to the severity after the end of emergency operation. Finally, the improvement of the system for the continuous communication between the paramedics and the command staff is necessary. This improvements as stated above are expected to contribute to raise survival rate of patients.

User Authentication Technology using Multiple SSO in the Cloud Computing Environment

  • Cho, Min-Hee;Jang, Eun-Gyeom;Choi, Yong-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.4
    • /
    • pp.31-38
    • /
    • 2016
  • The interface between servers and clients and system management in the cloud computing environment is different from the existing computing environment. The technology for information protection. Management and user authentication has become an important issue. For providing a more convenient service to users, SSO technology is applied to this cloud computing service. In the SSO service environment, system access using a single key facilitates access to several servers at the same time. This SSO authentication service technology is vulnerable to security of several systems, once the key is exposed. In this paper, we propose a technology to solve problems, which might be caused by single key authentication in SSO-based cloud computing access. This is a distributed agent authentication technology using a multiple SSO agent to reinforce user authentication using a single key in the SSO service environment. For user authentication reinforcement, phased access is applied and trackable log information is used when there is a security problem in system to provide a safe cloud computing service.

An Efficient and Secure Method for Managing Logs of Certified e-Document Authority Using Hash Tree (공인전자문서 보관소에서 생성되는 로그의 효율적이고 안전한 보관방법에 대한 연구)

  • Kang, Shin-Myung;Moon, Jong-Sub
    • Convergence Security Journal
    • /
    • v.9 no.2
    • /
    • pp.23-32
    • /
    • 2009
  • CeDA (Certified e-Document Authority) was adopted in March 2005. It is possible to register/store/send/receive/transfer/revoke e-documents by using trusted third party, CeDA. It is important to store not only e-documents of users but also logs produced by CeDA. Thus all logs must be electronically signed using certificate of CeDA. But management of electronically signed logs is difficult. In this paper, the method which can be applicable to authenticate all logs of CeDA using "Hash Tree" is present.

  • PDF

A Comparative Study on Software Reliability Model for NHPP Intensity Function Following a Decreasing Pattern (강도함수가 감소패턴을 따르는 NHPP 소프트웨어 신뢰모형에 관한 비교 연구)

  • Kim, Hee Cheul;Kim, Jong Buam;Moon, Song Chul
    • Journal of Information Technology Applications and Management
    • /
    • v.23 no.4
    • /
    • pp.117-125
    • /
    • 2016
  • Software reliability in the software development process is an important issue. In infinite failure non-homogeneous Poisson process software reliability models, the failure occurrence rates per fault. can be presented constant, monotonic increasing or monotonic decreasing pattern. In this paper, the reliability software cost model considering decreasing intensity function was studied in the software product testing process. The decreasing intensity function that can be widely used in the field of reliability using power law process, log-linear processes and Musal-Okumoto process were studied and the parameter estimation method was used for maximum likelihood estimation. In this paper, from the software model analysis, we was compared by applying a software failure interval failure data considering the decreasing intensity function The decreasing intensity function model is also efficient in terms of reliability in the arena of the conservative model can be used as an alternating model can be established. From this paper, the software developers have to consider life distribution by preceding information of the software to classify failure modes which can be gifted to support.

A Study on Injury Characteristics by Working Place in the Saw Milling Industry (일반제재업종에서의 작업공정별 재해특성 연구)

  • Rhee, Hong Suk;Yi, Kwan Hyung;Kim, Young Sun
    • Journal of the Korea Safety Management & Science
    • /
    • v.16 no.3
    • /
    • pp.45-54
    • /
    • 2014
  • The average injury rate in sawmilling industry for the last 5 years is 4.99%, which means that more than 200 injuries have occurred in that industry every year. Because the first step in risk assessment is the hazard identification, it is very important to know how to define the hazard and nature of harm. We analyzed 643 accident records of three years(2010-2012) and carried out site survey for the same cases. As a result, the most common types of work at the time of injury in sawmilling industry were removing jammed wood 81(12.8%), wood carrying task 52(8.1%), wood cutting 49(7.6%), travelling table log band saw 41(6.4%), maintenance 37(5.8%) etc. In addition, there were statistically significant differences in some analysis factors such as injured body parts, employment size, and handling material among different working places. Therefore, it is concluded that differentiated prevention efforts are necessary in each workplace.