• 제목/요약/키워드: logs

Search Result 718, Processing Time 0.021 seconds

Anonymized Network Monitoring for Intrusion Detection Systems

  • Srinivas, DB;Mohan, Sagar
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.191-198
    • /
    • 2022
  • With the ever-increasing frequency of public sector and smalls-cale industries going live on the internet in developing countries, their security of which, while crucial, is often overlooked in most cases. This is especially true in Government services, whilst essential, are poorly monitored if at all. This is due to lack of funds and personnel. Most available software which can help these organizations monitor their services are either expensive or very outdated. Thus, there is a need for any developing country to develop a networking monitoring system. However, developing a network monitoring system is still a challenge and expensive and out sourcing network monitoring system to third party is a security threat. Therefore, in this article we propose a method to anonymize network logs and outsource networking monitoring system to third-party without breach in integrity of their network logs.

Physical and Mechanical Properties of Sawdust Board Made of Thinning Logs (II) - The Effect of Density and Additive Quantity of Powder Phenolic Resin -

  • Oh, Seung-Won
    • Journal of the Korean Wood Science and Technology
    • /
    • v.31 no.3
    • /
    • pp.17-23
    • /
    • 2003
  • As a fundamental study of developing sawdust board from thinning softwood logs from three species (Pinus densiflora S. et Z., Larix leptolepis G. and Pinus koraiensis S. et Z.), this study examined the effect of board density and resin content on physical and mechanical properties of sawdust board. As the board density increase, thickness swelling, bending strength, and Brinell hardness increased while water absorption decreased. With increasing the resin content, the bending strength and hardness increased while water absorption and thickness swelling decreased. The board made of L. leptolepis was slightly low in its water absorption, and the one made of P. koraiensis was a little high in its bending strength, while there was no definite difference between each kind of trees in their hardness values.

Nail Withdrawal Behavior for Domestic Small Diameter Logs

  • Cha, Jae-Kyung
    • Journal of the Korean Wood Science and Technology
    • /
    • v.30 no.3
    • /
    • pp.104-108
    • /
    • 2002
  • Nail withdrawal tests were conducted on clear wood of domestic small diameter logs. Nails were driven into the cross and longitudinal sections of each specimen, then nail withdrawal tests were performed. Nail withdrawal loads are strongly dependent on the direction of nail positions. The average load values for the nail withdrawal both in cross section and longitudinal section are higher in high specific gravity (SG) wood of sawtooth oak (Quercus acutissima Carr.) than those in low SG wood of Korean red pine (Pinus densiflora Sieb. et Zucc.) and pitch pine (Pinus rigida Mill.). The average ratio of the nail withdrawal loads for side-grain and end-grain are higher in the low SG wood than that in the high SG of wood. Both linear and non-linear regression analyses were conducted on nail withdrawal load with SG, good correlations were obtained between nail withdrawal load and SG.

A Study on Log Collection to Analyze Causes of Malware Infection in IoT Devices in Smart city Environments

  • Donghyun Kim;Jiho Shin;Jung Taek Seo
    • Journal of Internet Computing and Services
    • /
    • v.24 no.1
    • /
    • pp.17-26
    • /
    • 2023
  • A smart city is a massive internet of things (IoT) environment, where all terminal devices are connected to a network to create and share information. In accordance with massive IoT environments, millions of IoT devices are connected, and countless data are generated in real time. However, since heterogeneous IoT devices are used, collecting the logs for each IoT device is difficult. Due to these issues, when an IoT device is invaded or is engaged in malicious behavior, such as infection with malware, it is difficult to respond quickly, and additional damage may occur due to information leakage or stopping the IoT device. To solve this problem, in this paper, we propose identifying the attack technique used for initial access to IoT devices through MITRE ATT&CK, collect the logs that can be generated from the identified attack technique, and use them to identify the cause of malware infection.

Lithology Determination by Log Analysis from a Borehole-PABH1 in the Pungam Sedimentary Basin (풍암퇴적분지 내 시추공 PABH1에서의 물리검층에 의한 암상의 판정)

  • 김영화;장승익
    • The Journal of Engineering Geology
    • /
    • v.8 no.2
    • /
    • pp.163-173
    • /
    • 1998
  • Suite of log analysis techniques consisting of geophysical well log, geological core log, and physical core log have been made to understand the well log responses and to determine the lithology of a test borehole-PABH1 located in Pungam sedimentary basin, Sosok, Hongchon-gun, Kangwon Province. Geological core logging has been precisely made over the cores taken between 64 and 124 meters, and 11 groups of rock types were deduced. Using the core samples divided by 11 groups, geophysical property measurements consisting of resistivity, natural gamma and density were made. Each rock group in the area is shown to have its characteristic physical response from geophysical well log and geophysical core logs. The outstanding physical responses particularly shown from siltstone, coarse sandstone to conglomerate, and granitic gneiss in the area were effectively used as keybeds in correlating the geophysical well logs to the result of geological core logs.

  • PDF

Proximity Measurement between Communication Objects (통신 객체들 간의 친밀도 측정)

  • Kwon, Jeong-Eun;Song, Ji-Hwan;Kim, Myoung-Ho
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.4
    • /
    • pp.275-279
    • /
    • 2009
  • Many countries including the US and ED oblige telecommunication service providers to retain communication logs for a certain amount of time. The retained data are used for the purpose of the investigation, detection, or prosecution of serious crimes, but of huge size. In order to efficiently extract information such as a correlation between criminals and suspects, we must eliminate unnecessary data that occupy a large portion of communication logs. In this paper, we propose how to measure the proximity between communication objects using communication logs. The proximity let the collected data be analyzed efficiently: analyzing the data in the decreasing order of proximities or removing the data with low proximities before analyzing. The experimental results show that there is a correlation between proximities of our proposed measurement and estimation by people.

An Efficient Logging Scheme based on Dynamic Block Allocation for Flash Memory-based DBMS (플래시 메모리 기반의 DBMS를 위한 동적 블록 할당에 기반한 효율적인 로깅 방법)

  • Ha, Ji-Hoon;Lee, Ki-Yong;Kim, Myoung-Ho
    • Journal of KIISE:Databases
    • /
    • v.36 no.5
    • /
    • pp.374-385
    • /
    • 2009
  • Flash memory becomes increasingly popular as data storage for various devices because of its versatile features such as non-volatility, light weight, low power consumption, and shock resistance. Flash memory, however, has some distinct characteristics that make today's disk-based database technology unsuitable, such as no in-place update and the asymmetric speed of read and write operations. As a result, most traditional disk-based database systems may not provide the best attainable performance on flash memory. To maximize the database performance on flash memory, some approaches have been proposed where only the changes made to the database, i.e., logs, are written to another empty place that has born erased in advance. In this paper, we propose an efficient log management scheme for flash-based database systems. Unlike the previous approaches, the proposed approach stores logs in specially allocated blocks, called log blocks. By evenly distributing logs across log blocks, the proposed approach can significantly reduce the number of write and erase operations. Our performance evaluation shows that the proposed approaches can improve the overall system performance by reducing the number of write and erase operation compared to the previous ones.

Correlation Analysis of Event Logs for System Fault Detection (시스템 결함 분석을 위한 이벤트 로그 연관성에 관한 연구)

  • Park, Ju-Won;Kim, Eunhye;Yeom, Jaekeun;Kim, Sungho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.2
    • /
    • pp.129-137
    • /
    • 2016
  • To identify the cause of the error and maintain the health of system, an administrator usually analyzes event log data since it contains useful information to infer the cause of the error. However, because today's systems are huge and complex, it is almost impossible for administrators to manually analyze event log files to identify the cause of an error. In particular, as OpenStack, which is being widely used as cloud management system, operates with various service modules being linked to multiple servers, it is hard to access each node and analyze event log messages for each service module in the case of an error. For this, in this paper, we propose a novel message-based log analysis method that enables the administrator to find the cause of an error quickly. Specifically, the proposed method 1) consolidates event log data generated from system level and application service level, 2) clusters the consolidated data based on messages, and 3) analyzes interrelations among message groups in order to promptly identify the cause of a system error. This study has great significance in the following three aspects. First, the root cause of the error can be identified by collecting event logs of both system level and application service level and analyzing interrelations among the logs. Second, administrators do not need to classify messages for training since unsupervised learning of event log messages is applied. Third, using Dynamic Time Warping, an algorithm for measuring similarity of dynamic patterns over time increases accuracy of analysis on patterns generated from distributed system in which time synchronization is not exactly consistent.