• Title/Summary/Keyword: Information Amplification

Search Result 313, Processing Time 0.176 seconds

Improvement of RocksDB Performance via Large-Scale Parameter Analysis and Optimization

  • Jin, Huijun;Choi, Won Gi;Choi, Jonghwan;Sung, Hanseung;Park, Sanghyun
    • Journal of Information Processing Systems
    • /
    • v.18 no.3
    • /
    • pp.374-388
    • /
    • 2022
  • Database systems usually have many parameters that must be configured by database administrators and users. RocksDB achieves fast data writing performance using a log-structured merged tree. This database has many parameters associated with write and space amplifications. Write amplification degrades the database performance, and space amplification leads to an increased storage space owing to the storage of unwanted data. Previously, it was proven that significant performance improvements can be achieved by tuning the database parameters. However, tuning the multiple parameters of a database is a laborious task owing to the large number of potential configuration combinations. To address this problem, we selected the important parameters that affect the performance of RocksDB using random forest. We then analyzed the effects of the selected parameters on write and space amplifications using analysis of variance. We used a genetic algorithm to obtain optimized values of the major parameters. The experimental results indicate an insignificant reduction (-5.64%) in the execution time when using these optimized values; however, write amplification, space amplification, and data processing rates improved considerably by 20.65%, 54.50%, and 89.68%, respectively, as compared to the performance when using the default settings.

Study on the near-real time DNS query analyzing system for DNS amplification attacks (DNS 증폭 공격 탐지를 위한 근실시간 DNS 질의 응답 분석 시스템에 관한 연구)

  • Lee, Ki-Taek;Baek, Seung-Soo;Kim, Seung-Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.303-311
    • /
    • 2015
  • DNS amplification is a new type of DDoS Attack and nowadays the attack occurs frequently. The previous studies showed the several detection ways such as the traffic analysis based on DNS queries and packet size. However, those methods have some limitations such as the uncertainty of packet size which depends on IP address type and vulnerabilities against distributed amplification attack. Therefore, we proposed a novel traffic analyzing algorithm using Success Rate and implemented the query analyzing system.

The Wireless Network Optimization of Power Amplification via User Volume in the Microcell Terrain

  • Guo, Shengnan;Jiang, Xueqin;Zhang, Kesheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2581-2594
    • /
    • 2018
  • The microcell terrain is the most common wireless network terrain in our life. In order to solve wireless network optimization of weak coverage in the microcell terrain, improve call quality and reduce the cost of the premise, power amplifiers in base stations should be adjusted according to user volume. In this paper, characteristics of microcell topography are obtained after analysis. According to the topography characteristics of different microcells, changes in the number of users at different times have been estimated, meanwhile, the number of scatter users are also obtained by monitoring the PCCPCH RSCP and other parameters. Then B-Spline interpolation method has been applied to scatter users to obtain the continuous relationship between the number of users and time. On this basis, power amplification can be chosen according to changes in the number of users. The methods adopted by this paper are also applied in the engineering practice, sampling and interpolation are used to obtain the number of users at all times, so that the power amplification can be adjusted by the number of users in a microcell. Such a method is able to optimize wireless network and achieve a goal of expanding the area of base stations, reduce call drop rate and increase capacity.

Security Amplification of Partially Trusted Quantum Key Distribution System (부분 신뢰성을 갖는 양자 키 분배 시스템의 보안성 증폭)

  • Lee, Sun Yui;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.4
    • /
    • pp.152-156
    • /
    • 2017
  • This paper introduces the concept of random security amplification to amplify security in a quantum key distribution system. It seems to provide security amplification using the relationship between quantum error correction and security. In addition;we show that random security amplification in terms of security amplification offers better security than using existing universal hash function. We explain how the universal hash function enhances security using the BB84 protocol, which is a typical example of QKD. Finally, the proposed random security amplification and the conventional scheme compare the security according to the key generation rate in the quantum QKD.

A Study on Amplification DRDoS Attacks and Defenses (DRDoS 증폭 공격 기법과 방어 기술 연구)

  • Choi, Hyunsang;Park, Hyundo;Lee, Heejo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.5
    • /
    • pp.429-437
    • /
    • 2015
  • DDoS attacks have been used for paralyzing popular Internet services. Especially, amplification attacks have grown dramatically in recent years. Defending against amplification attacks is challenging since the attacks usually generate extremely hugh amount of traffic and attack traffic is coming from legitimate servers, which is hard to differentiate from normal traffic. Moreover, some of protocols used by amplification attacks are widely adopted in IoT devices so that the number of servers susceptible to amplification attacks will continue to increase. This paper studies on the analysis of amplification attack mechanisms in detail and proposes defense methodologies for scenarios where attackers, abused servers or victims are in a monitoring network.

Zero Cerenkov Radiation Angle Effect in Optical Parametric Amplification in the Cerenkov-idler Configuration (Cerenkov-idler configuration 광 매개증폭에서의 0° 체렌코프 복사각도 효과)

  • Suh, Zung-Shik
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.1
    • /
    • pp.225-232
    • /
    • 2014
  • Optical parametric amplification has been analyzed for the Cerenkov-idler configuration in planar waveguides. The coupled-mode theory is employed for the analysis. The coupled-mode equations are derived and the approximate analytic solution is obtained for no pump depletion. From the analytic solution, it is shown that the signal power gain can be enhanced as the Cerenkov radiation angle of the idler approaches to zero. The numerical example is also shown for the effect of the Cerenkov radiation angle approaching zero.

Applications of SMCRE Model on Social Amplification of MERS Risk Information and its Implications (메르스 위험정보유통의 사회적 확산에 관한 SMCRE 모형의 적용과 함의)

  • Choi, Choong-Ik;Bae, Suk-Kyeong;Kim, Chul-Min
    • Journal of Distribution Science
    • /
    • v.14 no.6
    • /
    • pp.89-98
    • /
    • 2016
  • Purpose - This article tackles risk communication issues and aims to address the characteristics of MERS risk information distribution in South Korea, and secondly to examine the communicative behavior of the public health authority in terms of the quality of communication strategies. Thirdly, the study attempts to figure out the risk communication to cope with MERS through the applications of SMCRE model in chronological order. We employ the social amplification of risk framework for analyzing the emergent public response as one of the main approaches. Research Design, Data and Methodology - The main framework of this study is theoretically based on the social amplification of risk, which describes signals about risk transmitted and processed by individuals and social groups. The model also reflects the interactions between social groups and institutes about disaster-related risk issues, which are potential amplifiers or attenuators of communication signals. S-M-C-R-E Model is methodologically employed to examine the social amplification for MERS risk information in each period, which we defined operationally. The proposed methodology allows the assessment of effectiveness and ineffectiveness on risk communication to be conceptualized as a countermeasure against disasters. The paper focuses on exploring how social risk amplification can be applied and organized in each stage. Results - The SMCRE model describes the exchange of risk information and is also applied to all forms of communication between stakeholders including public health authority, local government and media. Each factor of risk communication includes source, message, channel, receiver and effect. The results support that the effective risk communication involves not only the improved reliability of public health authority as a key factor of risk communication, but also a close cooperation and good collaboration with local governments. It does not seem to be possible that the government-initiated risk communication based on controllability and management cope effectively with infectious disease in early stage. The results of this study imply that the shared risks between local, regional and national authorities can enhance risk communication system. Conclusions - The study supports that the disparities in how disaster-related risk information is interpreted and coded, have made effective risk communication and public sense-making impeded. Our findings support a more communicative discussion about the role of risk information sharing between governments for the improvement of emergency management and underline the importance of social elements in the risk communication, such as relationship and trust building. Findings suggest that trust building between stakeholders could be added to help explain the processes of social amplification and attenuation of risk. It would be recommended that the continuous risk communication with all the involved stakeholders will be able to help national health promotion policy to be improved regarding emergency management. Furthermore, risk communication has to be a scientific approach for the communication pertaining to potentially sensitive or controversial situations with public concerns and low public trust.

How to defend against car smart key amplification attacks (자동차 스마트키 증폭 공격을 방어하는 방법)

  • Bae, Dong-ki;Kwon, Yong-gyu;Lee, Dong-hun;Lee, Daesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.467-469
    • /
    • 2016
  • Car smart key system is a technology that allows you to turn activate / deactivate the auto lock through the contact form of electronic keys on the remote control and turn on the ignition by pressing the button. Smart key system is regarded as one of the essential options of the car as it is increasingly convenient to user, but there is no response yet for an attack to this situation. Therefore, in this paper, through an analysis of the amplification attack of a smart key we propose a way to stop the amplification attack and stop the car seized in case the car door opened due to the amplification attack.

  • PDF

Convergence Analysis of Noise Robust Modified AP(affine projection) Algorithm

  • Kim, Hyun-Tae;Park, Jang-Sik
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.1
    • /
    • pp.23-28
    • /
    • 2010
  • According to increasing projection order, the AP algorithm bas noise amplification problem in large background noise. This phenomenon degrades the performances of the AP algorithm. In this paper, we analyze convergence characteristic of the AP algorithm and then suggest a noise robust modified AP algorithm for reducing this problem. The proposed algorithm normalizes the update equation to reduce noise amplification of AP algorithm, by adding the multiplication of error power and projection order to auto-covariance matrix of input signal. By computer simulation, we show the improved performance than conventional AP algorithm.

Single Logarithmic Amplification and Deep Learning-based Fixed-threshold On-off Keying Detection for Free-space Optical Communication

  • Qian-Wen Jing;Yan-Qing Hong
    • Current Optics and Photonics
    • /
    • v.8 no.3
    • /
    • pp.239-245
    • /
    • 2024
  • This paper proposes single logarithmic amplification (single-LA) and deep learning (DL)-based fixed-threshold on-off keying (OOK) detection for free-space optical (FSO) communication. Multilevel LAs (MLAs) can be used to mitigate intensity fluctuations in the received OOK signal by their nonlinear gain characteristics; however, it is ineffective in the case of high scintillation, owing to degradation of the OOK signal's extinction ratio. Therefore, a DL technique is applied to realize effective scintillation compensation in single-LA applications. Fully connected (FC) networks and fully connected neural networks (FCNN), which have nonlinear modeling characteristics, are deployed in this work. The performance of the proposed method is evaluated through simulations under various scintillation effects. Simulation results show that the proposed method outperforms the conventional adaptive-threshold-decision, single-LA-based, MLA-based, FC-based, and FCNN-based OOK detection techniques.