• Title/Summary/Keyword: Log server

Search Result 172, Processing Time 0.025 seconds

User Identification and Session completion in Input Data Preprocessing for Web Mining (웹 마이닝을 위한 입력 데이타의 전처리과정에서 사용자구분과 세션보정)

  • 최영환;이상용
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.9
    • /
    • pp.843-849
    • /
    • 2003
  • Web usage mining is the technique of data mining that analyzes web users' usage patterns by large web log. To use the web usage mining technique, we have to classify correctly users and users session in preprocessing, but can't classify them completely by only log files with standard web log format. To classify users and user session there are many problems like local cache, firewall, ISP, user privacy, cookey etc., but there isn't any definite method to solve the problems now. Especially local cache problem is the most difficult problem to classify user session which is used as input in web mining systems. In this paper we propose a heuristic method which solves local cache problem by using only click stream data of server side like referrer log, agent log and access log, classifies user sessions and completes session.

A Study on Personalization System Using Web Log and Purchasing Database (웹 로그와 구매 DB를 이용한 개인화 시스템에 관한 연구)

  • 김영태;이성주
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09b
    • /
    • pp.23-26
    • /
    • 2003
  • In this paper, a methodolgy for customizing web pages for indivisual users is suggested. It shows an efficient way to personalize web pages by predicting one's site access pattern. In addition, the prediction can reflect one's tendency after actual purchase. By using the APRIORI algorithm, one of the association rule search methods, the associativity among the purchase items can be inferred. This inferrence is based on the log data in a web server and database about purchase. Finally, a web page which contains the relationship, relative links on other web pages, and inferred items can be generated after this process.

  • PDF

Internet Survey System Construction and Utilization of Web log Data - APM SURVEYOR 1.5 -

  • Cha, Kyung-Joon;Jung, Jae-Woo
    • Communications for Statistical Applications and Methods
    • /
    • v.9 no.1
    • /
    • pp.39-51
    • /
    • 2002
  • In this paper, we propose a poll system on the interned. This poll system makes use of APM which are useful in web and PC using for a server. These tools are all free to obtain, so we can construct this system with the minimum computing environment and the minimum cost. We mention merits and demerits about interned survey and propose how to overcome using this system, and utilize web log data to get an additional information of panel. Finally, we suggest extensibilities of internet survey and the proposed system

An Log Visualization Method of Network Security Equipment for Private Information Security (개인정보 보호를 위한 네트워크 보안장비의 로그 가시화 방법 연구)

  • Sim, Hee-Youn;Kim, Hyung-Jong
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.31-40
    • /
    • 2008
  • Recently, network forensic research which analyzes intrusion-related information for tracing of attackers, has been becoming more popular than disk forensic which analyzes remaining evidences in a system. Analysis and correlation of logs from firewall, IDS(Intrusion Detect System) and web server are important part in network forensic procedures. This work suggests integrated graphical user interface of network forensic for private information leakage detection. This paper shows the necessity of various log information for network forensic and a design of graphical user interface for security managers who need to monitor the leakage of private information.

  • PDF

Scheme for Raising Effectiveness of Servers by Log Management of RAID System (RAID 시스템의 Log 관리에 의한 서버효율성 향상기법연구)

  • Park, Woo-Young;Kim, Jae-Jung;Kwack, Kae-Dal;Shin, Seung-Jung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.955-956
    • /
    • 2009
  • 이 Paper는 Server 솔루션에서 사용되는 RAID 컨트롤러가 Disk 상의 에러(Error)를 처리하는 behavior를 분석하고 이를 개선할 수 있는 방법을 제안한다. RAID Level 중에 가장 기본인 RAID 0는 주로 Internet portal site의 Search Engines 이나 Media streaming Servers, 그리고 HD 영상 편집 시스템에서 사용된다. 그러나 Fault tolerance가 지원되지 않기 때문에 Data Volume(logical Disk)의 보존성이 약한 취약점을 가지고 있다. 따라서 이것을 개선하고 Data 보존성을 높일 수 있는 방안을 제시한다.

Automating Configuration System and Protocol for Next-Generation Home Appliances

  • Lee, Eun-Seo;Lee, Hark-Jin;Lee, Kwangil;Park, Jun-Hee
    • ETRI Journal
    • /
    • v.35 no.6
    • /
    • pp.1094-1104
    • /
    • 2013
  • Home appliance manufacturers have recently been trying to provide smart products capable of various Internet services. For example, one health care manufacturer provides a Wi-Fi-capable scale. Once users register their information with the manufacturer's server, their weight and body fat records are automatically uploaded to the server whenever they measure their weight. The users can then watch and check their weight log easily using a smart device, such as a smartphone or tablet. One of the biggest problems, however, is that the initial configuration of the appliances and the user registration process may be quite complicated to typical users who are unfamiliar with such IT devices. This paper proposes an autoconfiguration system structure and protocol for Internet-capable home appliances, which supports the initial configuration and remote maintenance service of the device with only little user effort. Manufacturers can develop their own information appliances and provide differentiated services using the proposed system and protocol.

A Study of Weighted Disk Cache Method for World Wide Web (WWW를 위한 가중화 디스크 캐시 기법에 대한 연구)

  • 박해우;강병욱
    • Proceedings of the IEEK Conference
    • /
    • 2002.06c
    • /
    • pp.153-156
    • /
    • 2002
  • As the use of world wide web is increasing, the number of connections to servers is increasing also. These interactions increase the load of networks and servers. therefore efficient caching strategies for web documents are needed to reduce server load and network traffics by migrating copies of server files closer to the clients that use those files. As One idea of caching policy, we propose a Weighted Disk Cache Replacement Policy(WDCRP) which analyses user's interaction to WWW and adds weight value to each web document. Especially the WDCRP takes account of the history data of cache log, the characteristics of Web requests and the importance of user interactive-actions.

  • PDF

A Generic Framework for Reliable Mobile Client-Server System in Mobile Database Environments (모바일 데이터베이스 환경의 신뢰성 보장 모바일 클라이언트-서버 프레임워크)

  • Joo, Hae-Jong;Hong, Suk-Joo;Park, Young-Bae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.35-38
    • /
    • 2005
  • 본 논문은 모바일 클라이언트-서버(Mobile Client-Server) 환경에서 모바일 데이터베이스 시스템 특성상 가질 수 있는 무선 네트워크의 약한 연결성 및 접속성 단절로 인한 데이터베이스 비축(Database Hoarding)과 관련된 문제, 공유 데이터(Shared Data)의 일관성(Consistency) 유지 문제, 그리고 로그(Log) 최적화 문제를 해결하기 위한 모바일 질의 처리 시스템(MQPS : Mobile Query Processing System)을 포함하는 새로운 모바일 클라이언트-서버 시스템을 제안하는데 목적이 있다.

  • PDF

A Study of System Log and Volatile Information Collection for Computer Forensics (컴퓨터 포렌식스 지원을 위한 시스템 로그 및 휘발성 정보 수집에 관한 연구)

  • Gho, Eun-Ju;Oh, Se-Min;Jang, Eun-Gyeom;Lee, Jong-Sub;Choi, Yong-Rak
    • The Journal of Information Technology
    • /
    • v.10 no.4
    • /
    • pp.41-56
    • /
    • 2007
  • In Digital Computing Environment, volatile information such as register, cache memory, and network information are hard to make certain of a real-time collection because such volatile information are easily modified or disappeared. Thus, a collection of volatile information is one of important step for computer forensics system on ubiquitous computing. In this paper, we propose a volatile information collection module, which collects variable volatile information of server system based on memory mapping in real-time.

  • PDF

API Server Transport Layer Security Packets Real-Time Decryption and Visualization System in Kubernetes (쿠버네티스 API server의 Transport Layer Security 패킷 실시간 복호화 및 시각화 시스템)

  • Kim, Tae-Hyun;Kim, Tae-Young;Choi, Me-Hee;Jin, Sunggeun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.16 no.3
    • /
    • pp.99-105
    • /
    • 2021
  • The cloud computing evolution has brought us increasing necessity to manage virtual resources. For this reason, Kubernetes has developed to realize autonomous resource management in a large scale. It provides cloud computing infrastructure to handle cluster creations and deletions in a secure virtual computing environment. In the paper, we provide a monitoring scheme in which users can observe securely encrypted protocols while each Kubernetes component exchanges their packets. Eventually, users can utilize the proposed scheme for debugging as well as monitoring.