This is an automated email from the ASF dual-hosted git repository.

ako pushed a commit to branch new-web
in repository https://gitbox.apache.org/repos/asf/age-website.git


The following commit(s) were added to refs/heads/new-web by this push:
     new dd4e9dad Fix PR #312 (#314)
dd4e9dad is described below

commit dd4e9dad729b0326d0a3f49863ce0688958ccad9
Author: dpdjvhxm <[email protected]>
AuthorDate: Tue Apr 23 10:37:10 2024 +0900

    Fix PR #312 (#314)
    
    * Test
    
    * Update gatsby-config.js
    
    * Changes search result text
    
    * Fix gatsby-config.js and title
    
    * Change meta description
    
    * Fix sitemap.xml for broken links
    
    * Update landing page: Key Update and image
    
    * Create Blog 
“2024-04-21-how-to-integrate-langchain-with-apache-age-for-graph-database-applications”
    
    * Update Blog 
“2024-04-21-how-to-integrate-langchain-with-apache-age-for-graph-database-applications”
    
    * Update Blog 
“2024-04-21-how-to-integrate-langchain-with-apache-age-for-graph-database-applications”
    
    * Update blog, cms
    
    * Update blog
    
    * Fix spelling error
    
    * Activate "blog"
    
    * Update download page, modified blog
    
    * modified footer, download
    
    * Update landing image and blog scss
    
    * modified:   src/components/styles/Blog-post.scss
    
    * modified:   src/pages/download/index.md
    
    * modified:   src/templates/blog-post.js
    
    * Create Blog 
“2024-04-23-beyond-chatgpt-how-to-maximize-the-use-of-chatgpt-with-interactive-graph-models”
    
    * Create Blog 
“2024-04-23-combating-cyber-attack-with-apache-ages-link-analysis”
---
 ...use-of-chatgpt-with-interactive-graph-models.md | 69 +++++++++++++++++++++
 ...-cyber-attack-with-apache-ages-link-analysis.md | 72 ++++++++++++++++++++++
 src/templates/blog-post.js                         |  2 +-
 3 files changed, 142 insertions(+), 1 deletion(-)

diff --git 
a/src/pages/blog/2024-04-23-beyond-chatgpt-how-to-maximize-the-use-of-chatgpt-with-interactive-graph-models.md
 
b/src/pages/blog/2024-04-23-beyond-chatgpt-how-to-maximize-the-use-of-chatgpt-with-interactive-graph-models.md
new file mode 100644
index 00000000..a1fb7cf6
--- /dev/null
+++ 
b/src/pages/blog/2024-04-23-beyond-chatgpt-how-to-maximize-the-use-of-chatgpt-with-interactive-graph-models.md
@@ -0,0 +1,69 @@
+---
+templateKey: blog-post
+title: "Beyond ChatGPT: How to Maximize the Use of ChatGPT with Interactive
+  Graph Models."
+date: 2024-04-23T01:18:22.687Z
+description: "Beyond ChatGPT: How to Maximize the Use of ChatGPT with
+  Interactive Graph Models."
+featuredpost: true
+featuredimage: /img/logo.png
+---
+<!--StartFragment-->
+
+n just a matter of a year, ChatGPT has taken the world by storm, ushering in a 
new era of AI transformation. Its remarkable text-to-text generation 
capabilities have set new standards for informative and high-quality responses. 
Knowledge creation AI models like ChatGPT excel at engaging in conversations 
and retrieving information from vast databases. However, while it produces 
accurate and diverse answers, the delivery in text format can sometimes be hard 
to resonate with and fall short  [...]
+
+##### The Role of Graph Data Modeling
+
+A graph is a data structure that mirrors the natural interconnectedness found 
in the real world, enabling it to offer not just the desired information but 
also to suggest and provide additional, related data and information.
+
+Figure 1. Recommendation system use case, expressing the meta information of a 
movie through connection relationship in the Graph Model
+
+Learn more about the mechanics of Graph Databases->
+
+##### The intricacies of Input Text & Output Text
+
+To maximize the potential of ChatGPT, we must extend our goal beyond relying 
solely on existing text data and embrace the inclusion of "unstructured" 
information like images in the knowledge generation process. ChatGPT excels at 
delivering accurate answers, but achieving this precision often demands 
intricate and nuanced text prompts. Navigation and instruction of ChatGPT could 
often be challenging without guidance in the input text methods. In this 
regard, it is imperative to harness GP [...]
+
+To extend the information output from ChatGPT meaningfully, the specific 
information that the user needs must be identified from the collected pieces of 
information derived. In reality, however, GPT offers multifaceted textual 
information, which can be overwhelming for users seeking value within its 
output. To address this challenge, transforming the information produced by GPT 
into a 'knowledge graph' becomes a valuable approach. By mapping the 
connections between data points output by  [...]
+
+
+
+Figure 2. ChatGPT's text output in over 70 lines
+
+##### Creation and management of GPT knowledge using image information and 
graphs
+
+Beyond obtaining information through 'text-to-text', let's elucidate on how to 
easily manage knowledge in the form of a graph by inputting images as a service 
using an example prompt, 'Generate Food Recipes from the Fridge.
+
+In today's fast-paced world, many individuals have encountered the predicament 
of having to prepare a meal when faced with limited ingredients. Furthermore, 
tailoring a dish to one's specific dietary needs and personal preferences can 
be challenging. Let's tackle this by leveraging ChatGPT's capabilities along 
with the knowledge graph framework, empowering users to access top-tier 
insights with the simplest of inputs.
+
+
+
+
+
+Figure 3. Information extraction process using ChatGPT from an image of the 
ingredients in the fridge
+
+The above two models are used for extracting food recipes and information from 
the images of the ingredients in the fridge. As a first prompt, using object 
detection algorithms such as R-CNN or YOLO models, the ingredients present in 
the fridge are extracted. As for the second input value, it pertains to the 
user's unique preferences. To ensure accurate prompts, predefined options such 
as select boxes or radio buttons are employed.
+
+In this workflow, both the ingredient list and the user's preferences are 
integrated into the ChatGPT prompt using a standardized format. Subsequently, 
GPT employs this data to craft a text output encompassing potential dishes, 
ingredients, recipes, and nutritional insights tailored to the user's specific 
traits, including factors like appetite, age, and time zone. This meticulous 
prompt engineering, which leverages both images and user characteristics, 
yields high-quality information to [...]
+
+##### Knowledge management using Graphs
+
+When you input ingredients and user preferences into ChatGPT, the generated 
output comprises a 'dish,' 'recipe,' available ingredients, and additional 
ingredients suitable for the user. In Figure 4. below, by entering items like 
cabbage, tomato, and seaweed in your pantry, along with dinner preferences, 
dietary requirements, and age, GPT generates results related to 'cooking' and 
'nutritional ingredients' as illustrated. This information is easily visualized 
through graphs and can be ext [...]
+
+
+
+Figure 4. Utilization of information extracted by ChatGPT using a graph (a 
circle with red border is information that can be obtained through ChatGPT, red 
dotted arrow indicates additional information that is recommended from 
information through ChatGPT)
+
+Given that actual GPT information often spans over 70 lines of text, 
comprehending the desired details and their relationships can be challenging. 
Utilizing a graphical representation, you can observe that 'cabbage salad' was 
suggested as a recommended dish, along with 'salt and pepper' as essential 
cooking ingredients. Furthermore, dietary insights like 'dietary fiber' and 
'digestion' were provided for users in the 'elderly' age group.
+
+By leveraging these complex information interconnections, users can extract 
knowledge from GPT-generated data and discern common patterns among essential 
information elements.
+
+This graph model can further be advanced into meal planning recommendations 
using the ingredients or nutrients in the food information. For example, by 
clicking on the 'cabbage, and 'tomato' nodes of an ingredient and putting them 
back into the GPT input prompt, it returns a dish that can be made with those 
ingredients, such as 'tomato-cabbage stir-fry'. If one clicks on the 'dietary 
fiber' and 'digestion' nodes in the nutrition component, 'older' and 'diet' are 
the most relevant charact [...]
+
+This way, knowledge management using graphs enables users to secure visibility 
and identity and explore relationships between information to identify 
causality and relevance. A simple graph-type UI/UX also helps improve the 
productivity of ChatGPT by clicking on the appropriate node providing a data 
environment in a simple form that allows other food recommendations without 
having to separate prompt engineering.
+
+##### Bringing the utilization of ChatGPT to the next level
+
+ChatGPT holds significant promise for seamless integration with other models 
and efficient knowledge management. With a broader data spectrum and 
user-friendly graph-based knowledge management, it unlocks new insights and 
expands effortlessly across various domains. In particular, Apache AGE makes it 
easy to search and extract various knowledge by storing data in a graph. Being 
an extension to PostgreSQL, AGE allows a hybrid approach to databases combining 
the capabilities of both relati [...]
+
+<!--EndFragment-->
\ No newline at end of file
diff --git 
a/src/pages/blog/2024-04-23-combating-cyber-attack-with-apache-ages-link-analysis.md
 
b/src/pages/blog/2024-04-23-combating-cyber-attack-with-apache-ages-link-analysis.md
new file mode 100644
index 00000000..b268fada
--- /dev/null
+++ 
b/src/pages/blog/2024-04-23-combating-cyber-attack-with-apache-ages-link-analysis.md
@@ -0,0 +1,72 @@
+---
+templateKey: blog-post
+title: Combating cyber attack with Apache AGE's link analysis.
+date: 2024-04-23T01:28:20.437Z
+description: |-
+  Combating cyber attack with Apache AGE's link
+  analysis.
+featuredpost: true
+featuredimage: /img/logo.png
+---
+<!--StartFragment-->
+
+##### Cybersecurity Background
+
+In today's world, the internet has transformed how we connect, work, and 
access information, bringing unparalleled convenience and connectivity. This 
digital revolution, however, has its challenges, especially in cybersecurity. 
As we depend more on technology, the need to protect sensitive data and 
counteract cyber threats becomes increasingly critical.
+
+Cybersecurity is about safeguarding our computer systems, networks, and data 
from theft, damage, or unauthorized access. A key part of this field is network 
intrusion detection. It's like a digital watchdog, constantly monitoring 
network traffic for any signs of suspicious activities, such as hacking 
attempts or unauthorized entries. The aim is to catch and address these threats 
early, preventing any harm to our networks or data.
+
+In essence, cybersecurity and network intrusion detection are vital in our 
tech-driven world, ensuring our digital safety and resilience against 
ever-evolving cyber threats.
+
+##### Data Overview
+
+In the realm of cybersecurity, graph analysis plays a crucial role. To 
illustrate this, we use the CIDDS-001 dataset, specifically designed for 
network intrusion detection. This dataset serves as a benchmark for evaluating 
how different intrusion detection systems perform in identifying network 
attacks. It simulates a small business environment, complete with clients and 
servers, like email and web servers. The behaviors on these clients are 
mimicked using Python scripts, and the dataset [...]
+
+![img](../../img/xai-1.png)
+
+##### Figure1. Graph Modeling
+
+Graph analysis in cybersecurity involves transforming relational data into a 
graph format, consisting of nodes (points) and edges (connections). There are 
two main types of graphs:
+
+1. **Homogeneous Graphs:** These have nodes and edges of a single type, 
similar to what you'd find in social networks with user nodes connected by 
'follow' edges.
+2. **Heterogeneous Graphs:** These contain multiple types of nodes and edges, 
like in e-commerce networks where interactions between users and items are 
tracked through different types of connections such as 'buy,' 'cart,' and 
'view.'
+
+Using the [CIDDS-001 
dataset](https://www.hs-coburg.de/forschung/forschungsprojekte-oeffentlich/informationstechnologie/cidds-coburg-intrusion-detection-data-sets.html)
 , we create a graph for network flow analysis. This includes nodes 
representing start and end points in the network, and edges of various types 
like 'benign,' 'dos,' 'portscan,' 'pingscan,' and 'bruteforce.' A key feature 
of this graph is the detailed information attached to each node and edge, such 
as ports, packet sizes [...]
+
+##### Cypher Query with Analysis Scenario
+
+In this section, we explore how the PostgreSQL extension [Apache 
AGE's](https://age.apache.org/) graph analysis capabilities, particularly 
through Cypher queries, can be leveraged in cybersecurity. We'll look at three 
different scenarios, each demonstrating the power and flexibility of Cypher 
queries in analyzing network data.
+
+![img](../../img/xai-2.png)
+
+##### Figure2. Graph Query with Condition
+
+Figure 2 showcases a Cypher query that focuses on identifying network packets 
larger than a certain size. This is a prime example of the 'condition' function 
in Apache AGE, which is crucial for pinpointing specific scenarios. Here, the 
query filters out packets larger than 10 units, helping analysts spot potential 
anomalies or threats in network traffic. This function isn't limited to just 
packet size; it can be tailored to various criteria, making it a versatile tool 
for cybersecurity a [...]
+
+![img](../../img/xai-3.png)
+
+##### Figure3. Multi-path Search with Union Query
+
+In Figure 3, we see a union query in [Apache AGE](https://age.apache.org/), 
demonstrating its ability to handle complex, multi-path searches. This is 
particularly useful in scenarios where you need to analyze data across 
different types of connections, like 'eg_portscan' and 'eg_pingscan.' [Apache 
AGE](https://age.apache.org/) also enhances this analysis with visual aids, 
like representing the weight of packets through the thickness of edges in the 
graph, making it easier to interpret th [...]
+
+![img](../../img/xai-4.png)
+
+##### Figure4. Bi-directional Path Search
+
+The final example, illustrated in Figure 4, is a bi-directional path search. 
This Cypher query uncovers one-to-many relationships between nodes, providing a 
detailed view of network interactions and potential security incidents. It's 
particularly adept at revealing complex patterns and relationships that might 
be missed with traditional analysis methods. By tracing paths involving 
different types of nodes and connections, this query helps in identifying 
multi-step attack patterns and pot [...]
+
+In summary, these scenarios highlight the strength of [Apache 
AGE](https://age.apache.org/) in cybersecurity. Through its advanced graph 
analysis capabilities, [Apache AGE](https://age.apache.org/) enables 
cybersecurity professionals to uncover deep insights into network activities, 
detect threats more effectively, and enhance the overall security of network 
infrastructures.
+
+##### Conclusion
+
+Throughout this discussion, we've delved into the essentials of cybersecurity, 
examined the CIDDS-001 dataset for cyber intrusion analysis, and explored the 
dynamic use of Cypher queries in data analysis. The journey underscores the 
immense value of graph analysis in cybersecurity, offering profound insights 
and robust tools to combat digital threats.
+
+[Apache AGE](https://age.apache.org/) stands out in this landscape, 
particularly for its user-friendly approach to graph analysis. The use of 
Cypher queries, known for their power and intuitiveness, simplifies complex 
data analysis. This language enables cybersecurity experts to craft detailed 
queries, uncovering complex attack patterns and suspicious network activities. 
Such flexibility is crucial in enhancing threat detection and response 
capabilities.
+
+Graph visualization emerges as a key player in making intricate cybersecurity 
data more understandable and actionable. By graphically representing network 
nodes, edges, and their attributes, it becomes easier for analysts to decode 
complex structures, spot anomalies, and respond swiftly to potential threats. 
This visual approach aids in proactive security measures, allowing teams to 
trace unusual activities, map out attack routes, and pinpoint potential sources 
of cyber threats, thereby  [...]
+
+Another significant aspect of [Apache AGE's](https://age.apache.org/)graph 
analysis is the labeled property graph model. This approach enriches nodes and 
edges with detailed metadata, capturing essential information about cyber 
incidents. Such rich data representation not only aids in precise threat 
categorization but also supports thorough post-incident analysis. This helps 
organizations learn from past experiences, enhancing their defensive strategies 
against future cyber threats.
+
+In conclusion, [Apache AGE](https://age.apache.org/) presents a powerful suite 
of tools for cybersecurity professionals, significantly bolstering their 
ability to detect, investigate, and neutralize cyber threats. The combination 
of easy-to-use Cypher queries and effective graph visualization positions 
[Apache AGE](https://age.apache.org/) as an indispensable asset in contemporary 
cybersecurity operations. By adopting graph analysis, organizations can 
effectively stay ahead of cyber adve [...]
+
+<!--EndFragment-->
\ No newline at end of file
diff --git a/src/templates/blog-post.js b/src/templates/blog-post.js
index 9fca3d8f..b7b653ca 100644
--- a/src/templates/blog-post.js
+++ b/src/templates/blog-post.js
@@ -5,7 +5,7 @@ import { Helmet } from "react-helmet";
 import { graphql, Link, navigate } from "gatsby"; // 'navigate'를 임포트합니다.
 import Layout from "../components/Layout";
 import Content, { HTMLContent } from "../components/Content";
-import style from "../components/styles/blog-post.scss"
+import style from "../components/styles/Blog-post.scss"
 
 // eslint-disable-next-line
 export const BlogPostTemplate = ({

Reply via email to