• Title/Summary/Keyword: event processing

Search Result 692, Processing Time 0.025 seconds

Trends on U.S. Cyber Security Event Notifications and its Implications

  • Byun, Ye-Eun;Shin, Ick-Hyun;Kwon, Kook-Heui;Kim, Sang-Woo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.449-451
    • /
    • 2015
  • When cyber attacks are discovered in nuclear facilities, licensees are required to notify regulatory organizations for quick action. This also helps regulatory organizations to strengthen regulatory capabilities for cyber security. Currently the U.S. issued the final draft rule for Cyber Security Event Notifications. Domestic regulatory activities being at an early stage for cyber security need to implement law for Cyber Security Event Notifications. Since the current laws are focused on the aspect of safety, they are in need of more specific laws for cyber security.

A Model for Illegal File Access Tracking Using Windows Logs and Elastic Stack

  • Kim, Jisun;Jo, Eulhan;Lee, Sungwon;Cho, Taenam
    • Journal of Information Processing Systems
    • /
    • v.17 no.4
    • /
    • pp.772-786
    • /
    • 2021
  • The process of tracking suspicious behavior manually on a system and gathering evidence are labor-intensive, variable, and experience-dependent. The system logs are the most important sources for evidences in this process. However, in the Microsoft Windows operating system, the action events are irregular and the log structure is difficult to audit. In this paper, we propose a model that overcomes these problems and efficiently analyzes Microsoft Windows logs. The proposed model extracts lists of both common and key events from the Microsoft Windows logs to determine detailed actions. In addition, we show an approach based on the proposed model applied to track illegal file access. The proposed approach employs three-step tracking templates using Elastic Stack as well as key-event, common-event lists and identify event lists, which enables visualization of the data for analysis. Using the three-step model, analysts can adjust the depth of their analysis.

Effects of Information Processing Types and Product Ownership on Usage Intention

  • CHOI, Nak-Hwan
    • The Journal of Industrial Distribution & Business
    • /
    • v.12 no.5
    • /
    • pp.47-58
    • /
    • 2021
  • Purpose - Current research aimed at exploring the effect differences between the two types of processing product information such as the imagining and the considering on psychological product ownership which could influence the intent to purchase or use the product, and focused on identifying the interaction effects of activated memory information type and advertising information type on each of the information processing types. Research design, data, and methodology - This study divided the information processing types into imagining and considering, and the consumer's memories were divided into autobiographical or episodic and semantic memory. The advertising information was approached in each of event information being together with the product and product feature information. At empirical study, 2(two types of memory activation: episodic and semantic memory activation) ∗ 2(two types of advertising information: event-focused and product feature-focused advertising information) between-subjects design was used to make four types of questionnaire according to the type of experimental groups. Through the survey platform, 'questionnaire stars' of 'WeChat' in China, 219 questionnaire data were collected for empirical study. The structural equation model in AMOS 26 and Anova were used to verify hypotheses. Results - First, the ownership affected the usage intent positively. Second, the imagining did not affect the psychological ownership but did directly affect the usage intention, and the considering affected the ownership positively. Third, the episodic memory activation positively influenced the imagining and negatively affected the considering, whereas the semantic memory activation positively influenced the considering and negatively affected the imagining. Fourth, event-advertising information increased the effects of the activated episodic memory on the imagining, and feature-advertising information increased the effects of the activated semantic memory on the considering. Conclusions - marketers should develop and advertise their product-related event message to trigger the imaging that directly increase the intent to purchase or use their product, when consumers are under the activation of their episodic memory. And marketers should advertise their product feature-related message to trigger the considering that could induce consumers' ownership for their product to increase the intent to purchase or use their product, when they are under the activation of their semantic memory.

Low-cost privacy protection integrated monitoring system using interest emphasis method (관심강조 방법을 활용한 저비용 사생활보호 통합관제시스템)

  • Shin, Kwang-Seong;Shin, Seong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.2
    • /
    • pp.234-239
    • /
    • 2021
  • Recently, as the installation of a large number of high-performance CCTVs for crime prevention and traffic control has increased rapidly, the problem of increasing system requirements for response to privacy infringement factors and analysis of high-definition image information transmitted from multiple cameras has been actively emerging. Accordingly, there is a need for a method for responding to privacy infringement and a method for efficiently processing surveillance images input from multiple cameras. In this paper, in order to reduce the processing cost of the input image and improve the processing speed, an integrated image is generated by grouping images input from a plurality of cameras. After analyzing the pre-generated integrated video, it detects a preset privacy event or an event that highlights interest. Depending on whether or not an event is detected, you will perform an editing operation corresponding to the event.

Enhancement of Clock Advancement in Parallel Logic Simulation (병렬처리 논리 시뮬레이션에서 클럭 진행의 개선)

  • 정연모
    • Journal of the Korea Society for Simulation
    • /
    • v.3 no.2
    • /
    • pp.15-25
    • /
    • 1994
  • Efficient event evaluation and propagation techniques are proposed to enhance the advancement of simulation clocks of conservative and optimistic logic simulation protocols on parallel processing environments. The first idea of the techniques proposed in this paper is to allow more than one event evaluation per simulation cycle and to pack more than one propagation event in a single message. The second idea is to use advancement windows resulted in good performance in parallelism and execution times.

  • PDF

Enhancement of Internal Control by expanding Security Information Event Management System

  • Im, DongSung;Kim, Yongmin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.8
    • /
    • pp.35-43
    • /
    • 2015
  • Recently, internal information leaks is increasing rapidly by internal employees and authorized outsourcing personnel. In this paper, we propose a method to integrate internal control systems like system access control system and Digital Rights Managements and so on through expansion model of SIEM(Security Information Event Management system). this model performs a analysis step of security event link type and validation process. It develops unit scenarios to react illegal acts for personal information processing system and acts to bypass the internal security system through 5W1H view. It has a feature that derives systematic integration scenarios by integrating unit scenarios. we integrated internal control systems like access control system and Digital Rights Managements and so on through expansion model of Security Information Event Management system to defend leakage of internal information and customer information. We compared existing defense system with the case of the expansion model construction. It shows that expanding SIEM was more effectively.

Finding Association Rules based on the Significant Rare Relation of Events with Time Attribute (시간 속성을 갖는 이벤트의 의미있는 희소 관계에 기반한 연관 규칙 탐사)

  • Han, Dae-Young;Kim, Dae-In;Kim, Jae-In;Song, Myung-Jin;Hwang, Bu-Hyun
    • The KIPS Transactions:PartD
    • /
    • v.16D no.5
    • /
    • pp.691-700
    • /
    • 2009
  • An event means a flow which has a time attribute such as the a symptom of patients, an interval event has the time period between the start-time-point and the end-time-point. Although there are many studies for temporal data mining, they do not deal with discovering knowledge from interval event such as patient histories and purchase histories. In this paper, we suggest a method of temporal data mining that finds association rules of event causal relationships and predicts an occurrence of effect event based on discovered rules. Our method can predict the occurrence of an event by summarizing an interval event using the time attribute of an event and finding the causal relationship of event. As a result of simulation, this method can discover better knowledge than others by considering a lot of supports of an event and finding the significant rare relation on interval events which means an essential cause of an event, regardless of an occurrence support of an event in comparison with conventional data mining techniques.

Real-Time Web Middleware Framework for Supporting Electronic Commerce (전자상거래를 지원하기 위한 실시간 웹 미들웨어 프레임워크)

  • Yoon, Eun-Young;Yoon, Yong-Ik
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.5S
    • /
    • pp.1666-1675
    • /
    • 2000
  • This paper proposes a RTWM (Real-Time Web Middleware) framework for real-time EC(Electronic Commerce) systems. RTWM system is extended the existing COS( CORBA Object Service) model added to the event monitoring, real-time scheduler, real-time event filtering for supporting real-time concept of EC systems. Especially, this paper is concentrated on providing suitable event filtering function for EC system in order to meed various user time requirements under distributed system environment. It stores time constraint requirements an interesting event information input from users into QoS repository, then processes the data through appropriate RTFA(Real-Time Filtering Agent) module when real-time events occur. From this method, users can get the filtered event result reflected their requirements about real-time filtering. It means this system provides thigh QoS to users. In addition, it results in decreasing network traffic as unnecessary event information is filtered from network.

  • PDF

Event and Service registry system for USN Application Services (USN응용 서비스를 위한 이벤트 및 서비스 레지스트리 시스템)

  • Yeom, Sung-Kun;Kim, Yong-Woon;Yoo, Sang-Keun;Kim, Hyung-Jun;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.7
    • /
    • pp.1459-1466
    • /
    • 2009
  • In ubiquitous environment, various and amount of sensor data information occur continuously and periodically about thing and user from RHO, sensor network of various space. Such, the users from among many of provider who provide sensor service should find service that themselves is wanted. And when service use, service right to user should be provided. But in the current environment of the USN(Ubiquitous Sensor Network) Application Service, there is no the registry to find these services but only business- oriented UDDI(Universal Description Discovery, and integration). In addition, when service use, service right to user should be provided but current services provided only services one of the conditions or events. Therefore, rules-based processing system of service event that can provide service according various conditions and events is need. In this paper research into service registry for sensor service search with reference to existing UDDI and event processing system for USN application service with reference to event rule based on web service as WS-ECA(Web Service-Event Condition Action).

Real-time system control for the 6-DOF simulation (6-DOF 시뮬레이터의 real-time 시스템 제어에 관한 연구)

  • 김영대;김충영;백인철;민성기
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1989.10a
    • /
    • pp.17-21
    • /
    • 1989
  • 6-DOE simulator system is designed to real-time processing for motion control, data acquisition, image generation and image processing etc.. In this paper, we introduce hardware and software design technologies for distributed processing, event-trapping, system monitoring and time scheduling procedure in 6-DOF simulator system design.

  • PDF