• Title/Summary/Keyword: Log analysis

Search Result 2,152, Processing Time 0.037 seconds

Utilization of Log Data Reflecting User Information-Seeking Behavior in the Digital Library

  • Lee, Seonhee;Lee, Jee Yeon
    • Journal of Information Science Theory and Practice
    • /
    • v.10 no.1
    • /
    • pp.73-88
    • /
    • 2022
  • This exploratory study aims to understand the potential of log data analysis and expand its utilization in user research methods. Transaction log data are records of electronic interactions that have occurred between users and web services, reflecting information-seeking behavior in the context of digital libraries where users interact with the service system during the search for information. Two ways were used to analyze South Korea's National Digital Science Library (NDSL) log data for three days, including 150,000 data: a log pattern analysis, and log context analysis using statistics. First, a pattern-based analysis examined the general paths of usage by logged and unlogged users. The correlation between paths was analyzed through a χ2 analysis. The subsequent log context analysis assessed 30 identified users' data using basic statistics and visualized the individual user information-seeking behavior while accessing NDSL. The visualization shows included 30 diverse paths for 30 cases. Log analysis provided insight into general and individual user information-seeking behavior. The results of log analysis can enhance the understanding of user actions. Therefore, it can be utilized as the basic data to improve the design of services and systems in the digital library to meet users' needs.

A Security Log Analysis System using Logstash based on Apache Elasticsearch (아파치 엘라스틱서치 기반 로그스태시를 이용한 보안로그 분석시스템)

  • Lee, Bong-Hwan;Yang, Dong-Min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.2
    • /
    • pp.382-389
    • /
    • 2018
  • Recently cyber attacks can cause serious damage on various information systems. Log data analysis would be able to resolve this problem. Security log analysis system allows to cope with security risk properly by collecting, storing, and analyzing log data information. In this paper, a security log analysis system is designed and implemented in order to analyze security log data using the Logstash in the Elasticsearch, a distributed search engine which enables to collect and process various types of log data. The Kibana, an open source data visualization plugin for Elasticsearch, is used to generate log statistics and search report, and visualize the results. The performance of Elasticsearch-based security log analysis system is compared to the existing log analysis system which uses the Flume log collector, Flume HDFS sink and HBase. The experimental results show that the proposed system tremendously reduces both database query processing time and log data analysis time compared to the existing Hadoop-based log analysis system.

A Method for Analyzing Web Log of the Hadoop System for Analyzing a Effective Pattern of Web Users (효과적인 웹 사용자의 패턴 분석을 위한 하둡 시스템의 웹 로그 분석 방안)

  • Lee, Byungju;Kwon, Jungsook;Go, Gicheol;Choi, Yonglak
    • Journal of Information Technology Services
    • /
    • v.13 no.4
    • /
    • pp.231-243
    • /
    • 2014
  • Of the various data that corporations can approach, web log data are important data that correspond to data analysis to implement customer relations management strategies. As the volume of approachable data has increased exponentially due to the Internet and popularization of smart phone, web log data have also increased a lot. As a result, it has become difficult to expand storage to process large amounts of web logs data flexibly and extremely hard to implement a system capable of categorizing, analyzing, and processing web log data accumulated over a long period of time. This study thus set out to apply Hadoop, a distributed processing system that had recently come into the spotlight for its capacity of processing large volumes of data, and propose an efficient analysis plan for large amounts of web log. The study checked the forms of web log by the effective web log collection methods and the web log levels by using Hadoop and proposed analysis techniques and Hadoop organization designs accordingly. The present study resolved the difficulty with processing large amounts of web log data and proposed the activity patterns of users through web log analysis, thus demonstrating its advantages as a new means of marketing.

Discontinuity Analysis Using Well Log Methods from a Borehole-PABH1 in the Pungam Sedimentary Basin (풍암퇴적분지 내 시추공 PABH1에서 불연속면에 대한 물리검층방법의 적용)

  • 김영화;장승익;김중열;현혜자
    • The Journal of Engineering Geology
    • /
    • v.8 no.3
    • /
    • pp.261-273
    • /
    • 1998
  • Multiple well log analysis technique consisting of geophysical well log and geological core log has been made to analysis the discontinuities of a test borehole-PABH1 located in Pungam sedimentary basin, Sosok, Hongchon-gun, Kangwon Province. Well log methods consist of normal resistivity log, focussed log, single point resistance log, SP log, gamma log, natural gamma log as well as acoustic televiewer log and borehole television log. Core scanning technique was used as an aid for geological core log. The analysis was made by comparing firstly the televiewer and core discontinuities, and then the results from conventional geophysical log analysis were compared to those from core log and acoustic televiewer log. Fractures deduced from the acoustic televiewer log coincide well with discontinuities shown on the core and conventional geophysical logs. Particularly close coincidence could be observed between fractures derived from acoustic televiewer and conventional geophysical log analysis. It has been noted that the geophysical logs such as, caliper, resistivity, density and high resolution gamma gamma curves are effective in delineating the fractures. For example the ratio between density and resistivity (BRD/SHN) provides also an alternative indicator for discerning the fracture condition in the study area.

  • PDF

A Precursor Phenomena Analysis of APT Hacking Attack and IP Traceback (APT 해킹 공격에 대한 전조현상 분석 및 IP역추적)

  • Noh, Jung Ho;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.275-278
    • /
    • 2013
  • Log is a file system, a system that uses all remaining data. Want situation now being issued in the IT, media Nate on information disclosure, the press agency server hack by numbness crime occurred. Hacking crisis that's going through this log analysis software professionally for professional analysis is needed. The present study, about APT attacks happening intelligently Log In case of more than traceback in advance to prevent the technology to analyze the pattern for log analysis techniques.

  • PDF

A New Analysis Method of the Consolidation Test Data for an Undisturbed Clay (불교란 점토 압밀시험 결과의 새로운 해석법)

  • 박종화;고우모또타쯔야
    • Magazine of the Korean Society of Agricultural Engineers
    • /
    • v.44 no.6
    • /
    • pp.106-114
    • /
    • 2002
  • In this study, the results of a series of consolidation test for undisturbed Ariake clay in Japan were analyzed by three methods, e-log p (e: void ratio, p: consolidation pressure), log e-log p and n-log p (n: porosity). Moreover, the characteristics of each analysis method were studied. For undisturbed Ariake clay, the log o-Log p and the n-log p relationships can be found as two groups of straight lines of different gradients, but both the elastic consolidation and plastic consolidation regions of e-log p relationship are expressed as a curve. In this paper, the porosity of consolidation yield n$\_$y/, consolidation yield stress p$\_$y/, and the gradient of the plastic consolidation region C$\_$p/ were represented by the log e-log p method, and n$\_$c/, P$\_$cn/ and C$\_$cn/ were represented by the n-log p method. The meaning and the relationships of each value were studied, and the interrelationships among compression indices i.e. C$\_$cn/, C$\_$p/ and C$\_$c/ are obtained from each analysis method as a function of initial porosity n$\_$0/.

A Study on the Improvement of Information Service Using Information System Log Analysis (정보 시스템 이용기록 분석을 통한 정보 서비스 개선방안 연구)

  • Jho, Jae-Hyeong
    • Journal of Information Management
    • /
    • v.36 no.4
    • /
    • pp.137-153
    • /
    • 2005
  • For the improvement of information service, users' transaction log can be stored to the system, and the log analysis should be included in the process of service improvement. Also there are differences within kinds of users' log records and methods of analysis according to the institution's strategy. This paper describes the kinds of log records from users' behavior on information system. And its goal is to consider the case of information center which operates log analysis, and to derive a plan for improvement of information services.

Analysis of Microbiological Contamination in Kimchi and Its Ingredients

  • Lee, Ji-Hyun;Ha, Ji-Hyoung;Lee, Hae-Won;Lee, Jae Yong;Hwang, Ye-Seul;Lee, Hee Min;Kim, Sung Hyun;Kim, Su-Ji
    • Journal of Food Hygiene and Safety
    • /
    • v.33 no.2
    • /
    • pp.94-101
    • /
    • 2018
  • Although Kimchi has health benefits, food poisoning associated with consumption of Kimchi has been frequently reported. Accordingly, microbiological properties of Kimchi (100 samples) and washing effects on microbial reduction against its ingredients (200 samples) were examined. Total aerobic bacteria, coliforms, Escherichia coli, Bacillus cereus, and Clostridium perfringens were quantified. In addition, B. cereus, Salmonella spp., Enterohemorrhagic E. coli, C. perfringens, Campylobacter jejuni/coli, Staphylococcus aureus, Vibrio parahaemolyticus, Listeria monocytogenes, and Yersinia enterocolitica were analysed qualitatively. Total aerobic bacteria count was approximately 1.4-9.0 log CFU/g, which were highest in ginger (8.8 log CFU/g), and Chonggak Kimchi (9.0 log CFU/g). The range of coliform counts detected in all raw materials was 0.5-7.3 log CFU/g and ginger showed the greatest number 7.3 log CFU/g among others. Contamination was decreased to 0.2-3.2, 0.3-2.7, and 1.0-3.9 log CFU/g for total aerobic bacteria, coliforms, and B. cereus, respectively, after washing. Minimising microbial contamination in Kimchi ingredients is necessary to ensure the safety of Kimchi. These results indicate that washing is a useful method to reduce bacterial contamination in Kimchi.

XML-based Windows Event Log Forensic tool design and implementation (XML기반 Windows Event Log Forensic 도구 설계 및 구현)

  • Kim, Jongmin;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.27-32
    • /
    • 2020
  • The Windows Event Log is a Log that defines the overall behavior of the system, and these files contain data that can detect various user behaviors and signs of anomalies. However, since the Event Log is generated for each action, it takes a considerable amount of time to analyze the log. Therefore, in this study, we designed and implemented an XML-based Event Log analysis tool based on the main Event Log list of "Spotting the Adversary with Windows Event Log Monitoring" presented at the NSA.