{"title":"基于Map-Reduce框架的风险分析监测与通知系统","authors":"Yoondeuk Seo, Jinho Ahn","doi":"10.7763/IJCTE.2015.V7.1000","DOIUrl":null,"url":null,"abstract":" Abstract—This paper presents a monitoring and notification system based on risk analysis using map-reduce framework that can do risk prediction using big data. By using social media and access records of their users, the proposed system determines their risks. Also, it monitors the restricted area through setting them and notifies the administrator as soon as the intrusions are detected. So, it will provide a control situation for administrator in real time and can detect the risky moments that may occur in advance. Therefore it can reduce the probability of risk of security penetration. Also, since it receives the control situation and provides real-time control screen via smartphone, it is possible to improve the convenience of intrusion management in a very fast and effective way.","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Monitoring and Notification System Based on Risk Analysis Using Map-Reduce Framework\",\"authors\":\"Yoondeuk Seo, Jinho Ahn\",\"doi\":\"10.7763/IJCTE.2015.V7.1000\",\"DOIUrl\":null,\"url\":null,\"abstract\":\" Abstract—This paper presents a monitoring and notification system based on risk analysis using map-reduce framework that can do risk prediction using big data. By using social media and access records of their users, the proposed system determines their risks. Also, it monitors the restricted area through setting them and notifies the administrator as soon as the intrusions are detected. So, it will provide a control situation for administrator in real time and can detect the risky moments that may occur in advance. Therefore it can reduce the probability of risk of security penetration. Also, since it receives the control situation and provides real-time control screen via smartphone, it is possible to improve the convenience of intrusion management in a very fast and effective way.\",\"PeriodicalId\":306280,\"journal\":{\"name\":\"International Journal of Computer Theory and Engineering\",\"volume\":\"41 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Computer Theory and Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.7763/IJCTE.2015.V7.1000\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computer Theory and Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.7763/IJCTE.2015.V7.1000","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Monitoring and Notification System Based on Risk Analysis Using Map-Reduce Framework
Abstract—This paper presents a monitoring and notification system based on risk analysis using map-reduce framework that can do risk prediction using big data. By using social media and access records of their users, the proposed system determines their risks. Also, it monitors the restricted area through setting them and notifies the administrator as soon as the intrusions are detected. So, it will provide a control situation for administrator in real time and can detect the risky moments that may occur in advance. Therefore it can reduce the probability of risk of security penetration. Also, since it receives the control situation and provides real-time control screen via smartphone, it is possible to improve the convenience of intrusion management in a very fast and effective way.