Amazon Lookout for Equipment로 설비 데이터 실시간 전송하기

2022-02-18 KENNETH 0

Amazon Lookout for Equipment로 설비 데이터 실시간 전송하기 설비의 가동률을 높이려고 하는 많은 제조 기업들이 제조 설비에 부착된 센서를 통해서 설비 이상 예측을 하기 위해서 대용량 센서 데이터를 모니터링하고 있습니다. 하지만, 많은 수의 센서를 사람이 직접 보고 설비의 이상 유무를 판단하는 것은 한계가 있습니다. 설비 이상 예측을 성공적으로 구현하려면 많은 기계 센서에서 수집된 특정 데이터를 기계학습(ML)에 적용하여 매우 정확한 예측을 수행해야 합니다. 그러나 장비에 맞는 기계 학습 솔루션을 구현하려면 어렵고 시간이 오래 걸릴 수 있습니다. 이 글에서는 설비의 센서 데이터를 실시간으로 Amazon S3로 보내고 Amazon Lookout for Equipment가 이해할 수 있는 형태로 데이터를 변환하여 설비의 이상을 예측하는 방법을 소개합니다. Amazon Lookout for Equipment란? Amazon Lookout for Equipment는 장비 이상 동작을 감지하여 적합한 조치를 취하고 예기치 않은 다운 타임을 방지할 수 있도록 하는 Machine Learning(ML) 산업용 장비 모니터링 서비스입니다. 기존 센서의 데이터를 사용하여 장비에 맞는 사용자 지정 기계 학습 모델을 구축합니다. [ more… ]

No Image

USN-5292-3: snapd vulnerabilities

2022-02-18 KENNETH 0

USN-5292-3: snapd vulnerabilities USN-5292-1 fixed several vulnerabilities in snapd. This update provides the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. Original advisory details: James Troup discovered that snap did not properly manage the permissions for the snap directories. A local attacker could possibly use this issue to expose sensitive information. (CVE-2021-3155) Ian Johnson discovered that snapd did not properly validate content interfaces and layout paths. A local attacker could possibly use this issue to inject arbitrary AppArmor policy rules, resulting in a bypass of intended access restrictions. (CVE-2021-4120) The Qualys Research Team discovered that snapd did not properly validate the location of the snap-confine binary. A local attacker could possibly use this issue to execute other arbitrary binaries and escalate privileges. (CVE-2021-44730) The Qualys Research Team discovered that a race condition existed in the snapd snap-confine binary [ more… ]

No Image

USN-5292-2: snapd vulnerabilities

2022-02-18 KENNETH 0

USN-5292-2: snapd vulnerabilities USN-5292-1 fixed vulnerabilities in snapd. This update provides the corresponding update for the riscv64 architecture. Original advisory details: James Troup discovered that snap did not properly manage the permissions for the snap directories. A local attacker could possibly use this issue to expose sensitive information. (CVE-2021-3155) Ian Johnson discovered that snapd did not properly validate content interfaces and layout paths. A local attacker could possibly use this issue to inject arbitrary AppArmor policy rules, resulting in a bypass of intended access restrictions. (CVE-2021-4120) The Qualys Research Team discovered that snapd did not properly validate the location of the snap-confine binary. A local attacker could possibly use this issue to execute other arbitrary binaries and escalate privileges. (CVE-2021-44730) The Qualys Research Team discovered that a race condition existed in the snapd snap-confine binary when preparing a private mount [ more… ]

No Image

USN-5295-1: Linux kernel (HWE) vulnerabilities

2022-02-18 KENNETH 0

USN-5295-1: Linux kernel (HWE) vulnerabilities It was discovered that the Packet network protocol implementation in the Linux kernel contained a double-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-22600) Jann Horn discovered a race condition in the Unix domain socket implementation in the Linux kernel that could result in a read-after-free. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-4083) Kirill Tkhai discovered that the XFS file system implementation in the Linux kernel did not calculate size correctly when pre-allocating space in some situations. A local attacker could use this to expose sensitive information. (CVE-2021-4155) Sushma Venkatesh Reddy discovered that the Intel i915 graphics driver in the Linux kernel did not perform a GPU TLB flush [ more… ]

No Image

USN-5294-1: Linux kernel vulnerabilities

2022-02-18 KENNETH 0

USN-5294-1: Linux kernel vulnerabilities It was discovered that the Packet network protocol implementation in the Linux kernel contained a double-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-22600) Szymon Heidrich discovered that the USB Gadget subsystem in the Linux kernel did not properly restrict the size of control requests for certain gadget types, leading to possible out of bounds reads or writes. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-39685) Jann Horn discovered a race condition in the Unix domain socket implementation in the Linux kernel that could result in a read-after-free. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-4083) Kirill Tkhai discovered [ more… ]