• Title/Summary/Keyword: 블룸

Search Result 76, Processing Time 0.03 seconds

Binary Search on Levels Using Bloom filter for IPv6 Address Lookup (IPv6 주소 검색을 위한 블룸 필터를 사용한 레벨에 따른 이진 검색 구조)

  • Park, Kyong-Hye;Lim, Hye-Sook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.403-418
    • /
    • 2009
  • IP version 6 (IPv6) is a new If addressing scheme that has 128-bit address space. IPv6 is proposed to solve the address space problem of IP version 4 (IPv4) which has 32-bit address space. For a given IPv6 routing set, if a forwarding table is built using a trio structure, the trio has a lot more levels than that for IPv4. Hence, for IPv6 address lookup, the binary search on trio levels would be more appropriate and give better search performance than linear search on trio levels. This paper proposes a new IPv6 address lookup algorithm performing binary search on trio levels. The proposed algorithm uses a Bloom filter in pre-filtering levels which do not have matching nodes, and hence it reduces the number of off-chip memory accesses. Simulation has been performed using actual IPv6 routing sets, and the result shows that an IPv6 address lookup can be performed with 1-3 memory accesses in average for a routing data set with 1096 prefixes.

AdvanSSD-Insider: Performance Improvement of SSD-Insider using BloomFilter with Optimization (블룸 필터와 최적화를 이용한 SSD-Insider 알고리즘의 탐지 성능 향상)

  • Kim, JeongHyeon;Jung, ChangHoon;Nyang, DaeHun;Lee, KyungHee
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.15 no.5
    • /
    • pp.7-19
    • /
    • 2019
  • Ransomware is a malicious program that requires the cost of decryption after encrypting files on the user's desktop. Since the frequency and the financial damage of ransomware attacks are increasing each year, ransomware prevention, detection and recovery system are needed. Baek et al. proposed SSD-Insider, an algorithm for detecting ransomware within SSD. In this paper, we propose an AdvanSSD-Insider algorithm that substitutes a hash table used for the overwriting check with a bloom filter in the SSD-Insider. Experimental results show that the AdvanSSD-Insider algorithm reduces memory usage by up to 90% and execution time by up to 77% compared to the SSD-Insider algorithm and achieves the same detection accuracy. In addition, the AdvanSSD-Insider algorithm can monitor 10 times longer than the SSD-Insider algorithm in same memory condition. As a result, detection accuracy is increased for some ransomware which was difficult to detect using previous algorithm.

Tuple Pruning Using Bloom Filter for Packet Classification (패킷 분류를 위한 블룸 필터 이용 튜플 제거 알고리즘)

  • Kim, So-Yeon;Lim, Hye-Sook
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.3
    • /
    • pp.175-186
    • /
    • 2010
  • Due to the emergence of new application programs and the fast growth of Internet users, Internet routers are required to provide the quality of services according to the class of input packets, which is identified by wire-speed packet classification. For a pre-defined rule set, by performing multi-dimensional search using various header fields of an input packet, packet classification determines the highest priority rule matching to the input packet. Efficient packet classification algorithms have been widely studied. Tuple pruning algorithm provides fast classification performance using hash-based search against the candidate tuples that may include matching rules. Bloom filter is an efficient data structure composed of a bit vector which represents the membership information of each element included in a given set. It is used as a pre-filter determining whether a specific input is a member of a set or not. This paper proposes new tuple pruning algorithms using Bloom filters, which effectively remove unnecessary tuples which do not include matching rules. Using the database known to be similar to actual rule sets used in Internet routers, simulation results show that the proposed tuple pruning algorithm provides faster packet classification as well as consumes smaller memory amount compared with the previous tuple pruning algorithm.

The Analysis of Educational Effect of The Horticultural Picture Books Focused on B.S. Bloom's Taxonomy of Educational Objectives (블룸(B.S. Bloom)의 교육목표에 따른 원예그림동화책과 교육적 효과분석)

  • Kwack, Hye Ran;Kim, Sun Ah
    • Journal of the Korean Society of Floral Art and Design
    • /
    • no.41
    • /
    • pp.155-169
    • /
    • 2019
  • This study aims at analyzing educational effects of the horticultural picture books, which are depending on B.S. Bloom's taxonomy of educational objectives. After collecting various horticulture-related picture books, this study classified them by the B.S bloom's educational taxonomy. There were objectives of the cognitive domain, objectives of the affective domain, psychomotor domain in plants and gardening activities. And the cognitive domain, affective domain, psychomotor domain subdivided into the sub-region can learn from the horticulture picture books to teach the unique characteristics could be found. To know the teachers' perceptions of the effectiveness of using picture books in the horticulture class, questionnaire were analyzed from the survey. As a result, by Bloom's educational taxonomy area they preferred children's books. Teacher think that fairy tale books promote the interest of the children and have the advantage of fostering creativity. In addition, an easy point to get in school, lack of hours in the effective education to help horticulture that was expected. The cognitions of most effective storytelling method of horticulture picture book was story immersion. And the effective activity after reading picture book was drawing picture. Also, the most effective teaching materials was a real-life picture.

An Analysis of Unit Evaluation Items in Middle School Science Textbooks (중학교 과학 교과서의 단원평가문항 분석)

  • Jo, Changhyun;choi, Wonho
    • Korean Educational Research Journal
    • /
    • v.38 no.1
    • /
    • pp.29-39
    • /
    • 2017
  • This study analyzes the items of acid base and redox unit in the middle school science textbook based on the 2009 revised science curriculum using Bloom's taxonomy of educational objectives. As a result of the analysis, the elements of knowledge area appeared the most in textbook items of all publishing companies, and those elements were less in order of understanding, application, analysis, synthesis and evaluation. And the sub-domain of cognitive domains were not evenly distributed by the publisher. Therefore, schools need to refer to the evaluation items of the textbooks of various publishing companies and use them in class.

  • PDF

Location Information Processing with Bloom Filter on PMIPv6 (블룸 필터를 이용한 Proxy Mobile IPv6에서의 위치 정보 처리)

  • Kim, Soo-Duek;Lee, Jong-Hyouk;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1190-1193
    • /
    • 2009
  • 최근 무선네트워크의 급격한 발달로 이동 중에도 통신을 할 수 있는 요구사항에 IETF에서는 Mobile IPv6(MIPv6)라는 기술을 제안하였다. MIPv6는 IPv6환경에서 모바일 노드(모바일 노드)가 이동을 하면서도 통신을 할 수 있는 기술인데, 실제 상용망에서는 사용되지 않고 있다. 그 이유는 모바일 노드에 이동성을 제공하는 모바일 스택의 탑재가 높은 오버헤드를 가지고 있고, 시그널링 비용이 많이 들기때문이다. 이와 같은 문제를 해결하기 위해서 지난 해 Proxy Mobile IPv6(PMIPv6)가 표준화 되었다. PMIPv6는 모바일 노드에 이동성을 제공하는 모바일 스택을 올리지 않고 네트워크 엔티티가 대신 모바일 스택을 가지고 시그널링을 처리하기 때문에 결과적으로 시그널링 비용을 줄였다. 하지만 PMIPv6에서는 인접한 네트워크 사이에서 패킷을 전송할 때 MAG간의 통신이 가능하지 않고, 오직 LMA를 통하여 대응 노드(대응 노드)에게 패킷을 전송할 수 있다. 게다가 같은 서브넷에 있는 대응 노드에게 패킷을 전송할 때도 LMA를 거치게 되는 불필요한 과정이 발생한다. 게다가 LMA를 통하여 패킷을 전송하는 방식은 지연과 리오더링(Re-Ordering)을 발생시켜본 패킷 재전송을 유발하여 전송 품질을 떨어뜨리게 된다. 본 논문에서는 인접한 MAG간의 통신, 또는 같은 서브넷 내에서의 통신에서 LMA를 거치지 않고 통신을 할 수 있는 방안으로 블룸 필터를 이용한 통신 기법을 제안한다.

Prediction of Void Crushing Behavior in Upset & Bloom Forging of Large Ingot (대형인곳의 업셋-블룸단조에서의 기공 압착 거동 예측)

  • Kwon I.K.;Kim K.H.;Youn Y.C.;Song M.C.
    • Proceedings of the Korean Society for Technology of Plasticity Conference
    • /
    • 2004.10a
    • /
    • pp.325-328
    • /
    • 2004
  • This paper deals with void crushing behavior by ingot forging process which consists of sequential operations of upset forging and bloom forging. The predicted results of void crushing behavior by the simplified global-local method using F.E. analysis showed that the inherent void at the top region of the ingots remains incompletely crushed even after several forging operations. From the results of the hot upset forging test using the billets with drilled voids, it was found that the bonding efficiency of the void after forging process increases with an increase in deformation, and a decrease of initial diameter of voids.

  • PDF

IP Address Lookup Algorithm Using a Vectored Bloom Filter (벡터 블룸 필터를 사용한 IP 주소 검색 알고리즘)

  • Byun, Hayoung;Lim, Hyesook
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.12
    • /
    • pp.2061-2068
    • /
    • 2016
  • A Bloom filter is a space-efficient data structure popularly applied in many network algorithms. This paper proposes a vectored Bloom filter to provide a high-speed Internet protocol (IP) address lookup. While each hash index for a Bloom filter indicates one bit, which is used to identify the membership of the input, each index of the proposed vectored Bloom filter indicates a vector which is used to represent the membership and the output port for the input. Hence the proposed Bloom filter can complete the IP address lookup without accessing an off-chip hash table for most cases. Simulation results show that with a reasonable sized Bloom filter that can be stored using an on-chip memory, an IP address lookup can be performed with less than 0.0003 off-chip accesses on average in our proposed architecture.

Secure Data De-duplication Scheme for Protect of Data Ownership Using Bloom Filter (블룸필터 활용을 통한 데이터 소유권 보호 암호데이터 중복제거 기술)

  • Kim, Won-Bin;Lee, Im-Yeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.270-273
    • /
    • 2016
  • 암호데이터 중복제거 기술이란 클라우드 서버에 전송된 데이터를 기존의 클라우드 서버에 저장된 데이터와 비교하여 데이터의 중복된 저장을 방지하는 기술이다. 이러한 데이터 중복제거 기술은 다양한 보안 위협이 발생하는데, 이 중 소유권 위조 공격은 원본 데이터를 소유하지 않은 공격자가 데이터의 소유권을 획득하여 클라우드 스토리지에 저장된 데이터를 취득할 수 있는 위협이다. 이러한 위협을 해결하기 위해 암호화 기술을 적용한 여러 기술들이 제안되어왔지만 과도하게 많은 통신 횟수와 연산량으로 인해 효율성이 떨어지는 문제가 존재한다. 따라서 본 논문에서는 클라우드 스토리지에 저장되는 데이터의 기밀성과 무결성을 보장하며, 연산량과 통신량 측면에서 효율적인 암호데이터 중복제거 기술을 제안한다.

주파수 도메인 채널접근: 최신 연구동향 및 효율적인 다이버시티 활용 프로토콜

  • Lee, Su-Cheol;Park, Se-Ung;Kim, Jong-Gwon
    • Information and Communications Magazine
    • /
    • v.31 no.9
    • /
    • pp.77-85
    • /
    • 2014
  • 최근 멀티미디어 데이터 사용의 증가에 따라 무료로 고속의 데이터 송수신이 가능한 무선랜에 대한 관심이 증가하였다. OFDM기술은 높은 주파수 이용효율과 용이한 구현장점으로 무선랜을 포함한 많은 표준에서 채택하고 있는 물리층 데이터 전송기술이다. 그러나 물리적으로 고속의 데이터전송이 가능해짐에 따라 MAC프로토콜 효율성에 대한 문제가 지적되어 왔으며 최근 이를 해결하기 위한 주파수 도메인 채널경쟁 방법을 도입한 연구들이 발표되었다. 본고에서는 OFDM의 특징을 활용한 주파수 도메인 채널접근 방법에 대한 최신 연구동향을 살펴보고 효율적 다이버시티 활용 주파수 도메인 채널접근 프로토콜인 D-Fi를 소개한다. D-Fi는 블룸필터를 활용하여 프로토콜 효율성 문제를 해결하는 한편 지능적으로 다이버시티를 활용하게 되어 기존방법에 비해 1.5배의 성능을 낸다.