• Title/Summary/Keyword: SQL 분석

Search Result 234, Processing Time 0.027 seconds

Testing Transactions based on Verification of Isolation Levels (고립화 수준을 검증하기 위한 트랜잭션의 시험)

  • Hong, Seok-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.7
    • /
    • pp.75-84
    • /
    • 2008
  • Concurrency and synchronization problems are often caused by database applications concurrently accessing databases managed by DBMS. Most commercial DBMSs support isolation levels to resolve these problems. Verification of isolation levels are most important because consistency and integrity constraints of the database can be violated according to isolation levels of transactions that consists of database applications. We propose a test tool set to verify and reveal faulty settings of isolation levels and implement a prototype of the test tool set. The proposed tool set analyzes the SQL statements of ESQL/C programs, attaches the test codes to verify isolation levels, runs the test transactions and detects errors.

A Design of Intelligent Home Network Service using Wireless Sensor Network (무선 센서 네트워크를 이용한 지능형 홈 네트워크 서비스 설계)

  • Na, Sun-Wung;Lee, Sang-Jeong;Kim, Dong-Kyun;Choi, Young-Kil
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.183-193
    • /
    • 2006
  • This paper suggests a service model which uses a wireless sensor network in home network environment. The sensor network consists of fixed sensor nodes and user identification nodes which is attached to each user. With the input information of the user preference profile and the collected data from the sensor nodes, the database is constructed as a context information and analyzed by a home server to provide a service that establishes and controls automatically home appliances according to each user's preference. The proposed service model is implemented and tested on a Linux server with MySQL database and sensor nodes on TinyOS.

  • PDF

The Development of the Data Mining Agent for eCRM (eCRM을 위한 데이터마이닝 에지전트의 개발)

  • Son, Dal-Ho;Hong, Duck-Hoon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.5
    • /
    • pp.236-244
    • /
    • 2006
  • Many attempts have been made to track the web usage patterns and provide suggestions that might help web operators get the information they need. These tracking mechanisms rely on mining web log files for usage patterns. The purpose of this study is to verify a web agent prototype that was built for mining web log files. The web agent for this paper was made by Java and ASP and the agent came into being as part of a cookie for a short-term data storage. For long-term data storage, the agent used a My-SQL as a Data Base. This agent system could inform that if the data comes from the web data mining agent, it could be a rapid information providing method rather than the case of data coming into a data mining tool. Therefore, the developed tool in this study will be helpful as a new kind of decision making system and expert system.

  • PDF

Development of Hydrologic Data Management System Based on Relational Database (관계형 데이터베이스를 이용한 수문자료 관리시스템 개발)

  • Kim, Hak-Kwan;Park, Seung-Woo;Kim, Sang-Min
    • Journal of Korea Water Resources Association
    • /
    • v.39 no.10 s.171
    • /
    • pp.855-866
    • /
    • 2006
  • In this paper, the Hydrologic Data Management System (HDMS) was developed for the efficient management of hydrologic data. The applicability of the system was demonstrated using the hydrologic data of study watershed located in the southwest from Suwon city MySQL 5.0, relational database management system, and MS Visual Basic 6.0 were used for the development of MS windows based HDMS. The primary components of the HDMS are data search system, data management system, and data analysis system. Data search and management systems provide basic functions for the efficient data search, storage, update and export. Data analysis system enables the users to get the further and diverse hydrologic statistical information from the stored data. Furthermore, the accuracy and quality of hydrologic data was analyzed and evaluated through data analysis system.

Implementation of a Real-time Network Traffic Management System (실시간 네트워크 트래픽 매니지먼트 시스템 구현)

  • Yong, Ki-Tak;Lee, Chae-Woo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.8
    • /
    • pp.106-113
    • /
    • 2008
  • In this paper, we will design and substantiate the Network Traffic management system(MAGI), which makes up for the weak points of existing Network Monitoring tools and realize dynamic firewall; MRTG, ntop, ethereal, and nettest. The Network Traffic Monitoring and analyzing system differs from existing software-based Network Monitoring tools as MAGI is a combination of software and hardware. Not only the innovative web user interface applied to the software makes analyzing traffic simpler, but it also has a function for monitoring and managing conditions of the hardware. The web user interface implemented with PHP and MySQL helps to use the database and as a result, analyzing data becomes easier. On the hardware part, the appliance is configured as a bridge in a network. As a result, managed system does not have overload.

Performance Evaluation of I/O Intensive Stress Test in Cluster File System SANiqueTM (집중적인 입출력 스트레스 테스트를 통한 클러스터 파일 시스템 SANiqueTM의 성능평가)

  • Lee, Kyu-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.415-420
    • /
    • 2010
  • This paper describes the design overview of shared file system $SANique^{TM}$ and analyzes the performance evaluation results of I/O intensive stress test based on various cluster file system architectures. Especially, we illustrate the performance analysis for the comparison results between the $SANique^{TM}$ and the Linux file system EXT3 system that is used to generally in Unix world. In order to perform our evaluation, Oracle 10g database system is operated on the top of cluster file system, and we developed the various kinds of testing tools which are compiled by ESQL/C from Oracle. Three types of architectures are used in this performance evaluation. Those are the cluster file system $SANique^{TM}$, EXT3 and the combined architecture of $SANique^{TM}$ and EXT3. In this paper, we present that the results of $SANique^{TM}$ outperforms other cluster file systems in the overhead for providing the true sharing over the connecting server nodes.

Detection of Source Code Security Vulnerabilities Using code2vec Model (code2vec 모델을 활용한 소스 코드 보안 취약점 탐지)

  • Yang, Joon Hyuk;Mo, Ji Hwan;Hong, Sung Moon;Doh, Kyung-Goo
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.45-52
    • /
    • 2020
  • Traditional methods of detecting security vulnerabilities in source-code require a lot of time and effort. If there is good data, the issue could be solved by using the data with machine learning. Thus, this paper proposes a source-code vulnerability detection method based on machine learning. Our method employs the code2vec model that has been used to propose the names of methods, and uses as a data set, Juliet Test Suite that is a collection of common security vulnerabilities. The evaluation shows that our method has high precision of 97.3% and recall rates of 98.6%. And the result of detecting vulnerabilities in open source project shows hopeful potential. In addition, it is expected that further progress can be made through studies covering with vulnerabilities and languages not addressed here.

Design and Implementation of Tools for Security Patch Management (보안패치 관리도구의 설계 및 구현)

  • Kim, Yun-Ju;Moon, Jong-Sub
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.1011-1014
    • /
    • 2005
  • 1.25 대란을 일으켰던 SQL Slammer 웜과 최근 IRCBot웜을 비롯한 다양한 악성코드들은 보안 취약점을 이용하여 전파되고 있다. 이러한 공격의 대부분은 사전에 보안패치를 적용하는 것만으로 막을 수 있기 때문에, 네트워크의 각 시스템들이 최신 패치 버전으로 업데이트 되었는지 점검하고 필요한 보안패치를 분배하는 자동화된 도구의 필요성은 강조되어 왔다. 본 논문에서는 보안패치 관리도구가 관리대상 컴퓨터의 취약점을 분석하는 방안을 제시하고, 제시한 방안을 적용한 보안패치 관리도구를 설계 및 구현하였다.

  • PDF

A Study of N-IDS Detection regarding a DoS Attack and Packet Analysis (DoS공격에 대한 N-IDS 탐지 및 패킷 분석 연구)

  • Chun, Woo-Sung;Park, Dae-Woo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2008.06a
    • /
    • pp.175-182
    • /
    • 2008
  • 2008년에 있었던 우리나라 금융기관과 정부기관에 대한 DoS 공격에 대한 연구이다. 실험실 환경에서 실제 DoS 공격 툴을 이용하여 공격을 실시한다. DoS 공격을 탐지하기 위하여 네트워크 상에서 Snort를 이용한 N-IDS를 설치하고, 패킷을 탐지하기 위한 Winpcap과 패킷의 저장 및 분석하기 위한 MySQL, HSC, .NET Framework 등을 설치한다. e-Watch 등의 패킷 분석 도구를 통해 해커의 DoS 공격에 대한 패킷량과 TCP, UDP 등의 정보, Port, MAC과 IP 정보 등을 분석한다. 본 논문 연구를 통하여 유비쿼터스 정보화 사회의 역기능인 사이버 DoS, DDoS 공격에 대한 자료를 분석하여 공격자에 대한 포렌식자료 및 역추적 분석 자료를 생성하여 안전한 인터넷 정보 시스템을 확보하는데 의의가 있다.

  • PDF

POLICE STATION SITE SELECTION IN INCHEON USING AHP, GIS (AHP 기법과 GIS를 이용한 인천 지역의 경찰서 적지 선정)

  • Kim, YounSoo;Lee, JuHong;Song, JaeWon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.1143-1145
    • /
    • 2012
  • 본 연구에서는 인천 지역의 범죄의 특성 지역을 분석하기 위하여 기존의 이론적인 논의에 기초하며 AHP와 GIS와 연계를 통해 분석하고자 하였다. 이를 위해 인천의 범죄 우발지역을 볼 수 있는 공간적 패턴과 경찰서 내지 파출소의 적지를 선정하고 자료 분석 및 데이터 수집과 통틀어 공간 분석을 수행하며 이러한 분석을 통해 얻어진 여러 가지 요인들과 범죄 율을 나타내어 최종 자료를 구현하기 위한 연구를 한다. 범죄 율의 공간적 표현을 위해서 수식을 이용하여 범죄 율을 구했으며 인구 및 정확한 데이터들을 수집하여 분석하고 그대로 반영한다. AHP를 이용하여 설문조사 및 객관적인 판단과 가중치를 판단할 수 있는 중요한 척도가 되었으며, 이것들을 반영하여 최종 결과물에 현실성을 더하여, 실제로 예방조치를 취할 수 있도록 할 수 있을 것이다. 또한 GIS 소프트웨어에서 제공되는 좌표체계와 데이터베이스 및 SQL 등을 이용하여 현실성과 정밀성을 더하여 활용될 수 있음을 확인하였다.