• Title/Summary/Keyword: network log analysis

Search Result 132, Processing Time 0.023 seconds

Component Based Face Detection for PC Camera (PC카메라 환경을 위한 컴포넌트 기반 얼굴 검출)

  • Cho, Chi-Young;Kim, Soo-Hwan
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02a
    • /
    • pp.988-992
    • /
    • 2006
  • 본 논문은 PC카메라 환경에서 명암왜곡에 강인한 얼굴검출을 위한 컴포넌트 기반 얼굴검출 기법을 제시한다. 영상 내의 얼굴검출을 위해 에지(edge) 분석, 색상 분석, 형판정합(template matching), 신경망(Neural Network), PCA(Principal Component Analysis), LDA(Linear Discriminant Analysis) 등의 기법들이 사용되고 있고, 영상의 왜곡을 보정하기 위해 히스토그램 분석(평활화, 명세화), gamma correction, log transform 등의 영상 보정 방법이 사용되고 있다. 그러나 기존의 얼굴검출 방법과 영상보정 방법은 검출대상 객체의 부분적인 잡음 및 조명의 왜곡에 대처하기가 어려운 단점이 있다. 특히 PC카메라 환경에서 획득된 이미지와 같이 전면과 후면, 상하좌우에서 비추어지는 조명에 의해 검출 대상 객체의 일부분이 왜곡되는 상황이 발생될 경우 기존의 방법으로는 높은 얼굴 검출 성능을 기대할 수 없는 상황이 발생된다. 본 논문에서는 기울어진 얼굴 및 부분적으로 명암 왜곡된 얼굴을 효율적으로 검출할 수 있도록 얼굴의 좌우 대칭성을 고려한 가로방향의 대칭평균화로 얼굴검출을 위한 모델을 생성하여 얼굴검출에 사용한다. 이 방법은 부분적으로 명암왜곡된 얼굴이미지를 기존의 영상 보정기법을 적용한 것 보다 잘 표현하며, 얼굴이 아닌 후보는 비얼굴 이미지의 형상을 가지게 하는 특성이 있다.

  • PDF

Using Transaction Logs to Better Understand User Search Session Patterns in an Image-based Digital Library (이미지 기반 디지털 도서관에서 이용자 검색 패턴의 효과적 이해를 위한 트랜잭션 로그 데이터 분석)

  • Han, Hye-Jung;Joo, Soohyung;Wolfram, Dietmar
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.25 no.1
    • /
    • pp.19-37
    • /
    • 2014
  • Server transaction logs containing complete click-through data from a digital library of primarily image-based documents were analyzed to better understand user search session behavior. One month of data was analyzed using descriptive statistics and network analysis methods. The findings reveal iterative search behaviors centered on result views and evaluation and topical areas of focus for the search sessions. The study is novel in its combined analytical techniques and use of click-through data for image collections.

Research about Asynchronous LAS Advanced & WRC Weblog Analysis of Practical use ESM (LAS Advanced & WRC 웹로그 분석을 활용한 ESM에 관한 연구)

  • Woo, Seung-Ho;Kang, Soon-Duk
    • The Journal of Information Technology
    • /
    • v.7 no.4
    • /
    • pp.9-20
    • /
    • 2004
  • Result Dos that materialization KNU Virus Wall to solve serious problem Hurtfulness Virus is present network chiefly in this research to do not become and do correct disposal in situation such as internet and Multiple Protocol that is done intelligence anger for ESM, CIS and MIS side as secondary to solve this problem about out log analysis system embody. As a result, could use comprehensively, and can click by Site Design, Packet transmission, and used to interior internet (GroupWare) in information protection aspect because intelligence enemy to face each other ESM's various hacking and virus uses Enterprise Security Management system and CIS, whole web through Smart View and relation of security could do monitoring.

  • PDF

Design for Zombie PCs and APT Attack Detection based on traffic analysis (트래픽 분석을 통한 악성코드 감염PC 및 APT 공격탐지 방안)

  • Son, Kyungho;Lee, Taijin;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.491-498
    • /
    • 2014
  • Recently, cyber terror has been occurred frequently based on advanced persistent threat(APT) and it is very difficult to detect these attacks because of new malwares which cannot be detected by anti-virus softwares. This paper proposes and verifies the algorithms to detect the advanced persistent threat previously through real-time network monitoring and combinatorial analysis of big data log. In the future, APT attacks can be detected more easily by enhancing these algorithms and adapting big data platform.

An Analysis of Network Structure in Housing Markets: the Case of Apartment Sales Markets in the Capital Region (주택시장의 네트워크 구조 분석: 수도권 아파트 매매시장의 사례)

  • Jeong, Jun Ho
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.17 no.2
    • /
    • pp.280-295
    • /
    • 2014
  • This paper analyzes the topological structure of housing market networks with an application of minimal spanning tree method into apartment sales markets in the Capital Region over the period 2003.7-2014.3. The characteristics of topological network structure gained from this application to some extent share with those found in equity markets, although there are some differences in their intensities and degrees, involving a hierarchical structure in networks, an existence of communities or modules in networks, a contagious diffusion of log-return rate across nodes over time, an existence of correlation breakdown due to the time-dependent structure of networks and so on. These findings could be partially attributed to the facts that apartments as a quasi-financial asset have been strongly overwhelmed by speculative motives over the period investigated and they can be regarded as a housing commodity with the highest level of liquidity in Korea.

  • PDF

Context-based Social Network Configuration Method between Users (컨텍스트 기반 사용자 간 소셜 네트워크 구성 방법)

  • Han, Jong-Hyun;Woo, Woon-Tack
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.11-14
    • /
    • 2009
  • In this paper, we propose the method configuring social networks among users based on users' context and profile. Recently, many researchers are concerned about social networks related with collaborative systems. In case of the existing researches, however, it is difficult to configure social networks dynamically because they are based on static data types, such as log and profile of users. The proposed method uses not only user profiles but also context reflecting users' behavior dynamically. It computes the similarity among users' behavior contexts using hierarchical structure of context domain knowledge model. And it calculates relationships between contexts by given weight factors of category of context model. In order to verify usefulness of the method, we conduct an experiment on configuring social network according to change of user context. We expect that it makes dynamic analysis of relationship of users possible.

  • PDF

Construction of an Hybrid Firewall for School Networks and Implementation of a Graphical Interface for Access Control Rules (학교망을 위한 혼합방화벽 구축 및 접근제어 규칙을 위한 그래픽 인터페이스 구현)

  • Park, Chan-Jung
    • The Journal of Korean Association of Computer Education
    • /
    • v.3 no.2
    • /
    • pp.67-75
    • /
    • 2000
  • Due to the advantages of Internet, many teachers use Internet as an educational tool and due to the computerized works in schools, the usages of the Internet increase. However, because of the openness of the Internet, the sensitive data of an organization are exposed to outsiders and the Internet-based working has some problems such as the corruptions of instructional data or on-line assessment results. The need for protecting a school network from outsiders increases but the school networks with firewalls rarely exist. In this paper, in order to solve the security problem of a school network, we construct a hybrid firewall for school networks. In addition, we implement a graphical user interface for teachers to set up the access control rules of a hybrid firewall easily. The interface also provides the facilities such as log analysis, a real-time monitor for network traffics, and the statistic on traffics.

  • PDF

Implementation of an Integrated Access Control Rule Script Language and Graphical User Interface for Hybrid Firewalls (혼합형 침입차단시스템을 위한 통합 접근제어 규칙기술 언어 및 그래픽 사용자 인터페이스 구현)

  • 박찬정
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.1
    • /
    • pp.57-70
    • /
    • 1999
  • Since a hybrid firewall filters packets at a network layer along with providing gateway functionalities at an application layer, it has a better performance than an If filtering firewall. In addition, it provides both the various kinds of access control mechanisms and transparent services to users. However, the security policies of a network layer are different from those of an application layer. Thus, the user interfaces for managing a hybrid firewalls in a consistent manner are needed. In this paper, we implement a graphical user interface to provide access control mechanisms and management facilities for a hybrid firewall such as log analysis, a real-time monitor for network traffics, and the statisics on traffics. And we also propose a new rule script language for specifying access control rules. By using the script language, users can generate the various forma of access control rules which are adapted by the existing firewalls.

A Digital Secret File Leakage Prevention System via Hadoop-based User Behavior Analysis (하둡 기반의 사용자 행위 분석을 통한 기밀파일 유출 방지 시스템)

  • Yoo, Hye-Rim;Shin, Gyu-Jin;Yang, Dong-Min;Lee, Bong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.11
    • /
    • pp.1544-1553
    • /
    • 2018
  • Recently internal information leakage in industries is severely increasing in spite of industry security policy. Thus, it is essential to prepare an information leakage prevention measure by industries. Most of the leaks result from the insiders, not from external attacks. In this paper, a real-time internal information leakage prevention system via both storage and network is implemented in order to protect confidential file leakage. In addition, a Hadoop-based user behavior analysis and statistics system is designed and implemented for storing and analyzing information log data in industries. The proposed system stores a large volume of data in HDFS and improves data processing capability using RHive, consequently helps the administrator recognize and prepare the confidential file leak trials. The implemented audit system would be contributed to reducing the damage caused by leakage of confidential files inside of the industries via both portable data media and networks.

Assessment of Water Distribution and Irrigation Efficiency in Agricultural Reservoirs using SWMM Model (SWMM 모형을 이용한 농업용 저수지 용수분배 모의 및 관개효율 평가)

  • Shin, Ji-Hyeon;Nam, Won-Ho;Bang, Na-Kyoung;Kim, Han-Joong;An, Hyun-Uk;Do, Jong-Won;Lee, Kwang-Ya
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.62 no.3
    • /
    • pp.1-13
    • /
    • 2020
  • The management of agricultural water can be divided into management of agricultural infrastructure and operation to determine the timing and quantity of water supply. The target of water management is classified as water-supply facilities, such as reservoirs, irrigation water supply, sluice gate control, and farmland. In the case of agricultural drought, there is a need for water supply capacity in reservoirs and for drought assessment in paddy fields that receive water from reservoirs. Therefore, it is necessary to analyze the water supply amount from intake capacity to irrigation canal network. The analysis of the irrigation canal network should be considered for efficient operation and planning concerning optimized irrigation and water allocation. In this study, we applied a hydraulic analysis model for agricultural irrigation networks by adding the functions of irrigation canal network analysis using the SWMM (Storm Water Management Model) module and actual irrigation water supply log data from May to August during 2015-2019 years in Sinsong reservoir. The irrigation satisfaction of ponding depth in paddy fields was analyzed through the ratio of the number of days the target ponding depth was reached for each fields. This hydraulic model can assist with accurate irrigation scheduling based on its simulation results. The results of evaluating the irrigation efficiency of water supply can be used for efficient water distribution and management during the drought events.