The increasing use of computers in various fields has led to the popularization of cloud computing due to its advantages, such as large scale, high performance, low power consumption, high reliability, and low cost. However, the rapid growth of business volume and kinds of computer hardware resources, along with complex computer architecture, poses challenges in allocating hardware resources. Traditional methods struggle to meet the varying requirements of different businesses, hinder automatic tuning, and limit the improvement of overall system performance. In this regard, we propose an automatic QoS-aware resource partitioning framework that aims to maximize the overall performance of the system. Our contributions include an automatic performance tuning framework for cloud environments, a Deep Q-learning Network (DQN) based performance optimization method, and achieving a speed-up of at most 1.73 times compared to uniform partitions for CPU overload scenarios involving throughput-aware and latency-critical workloads. The proposed framework addresses the challenges faced by cloud computing by adopting different allocation methods for hardware resources that maximize performance in different application scenarios. The framework efficiently utilizes emerging hardware resource control capabilities to improve hardware and system performance. The use of DQN in performance optimization allows the framework to learn from past experiences and adapt to different situations, resulting in better resource allocation decisions. The proposed framework can significantly reduce the waste of resources and unnecessary expenditures for governments and enterprises. Our framework can serve as a guide for future research in cloud computing and related fields.
Passwords are critical issues in the world of cyber security. Unfortunately, despite best efforts, passwords continue to be compromised and leaked onto the Internet, leading to an alarming number of compromised passwords in circulation. In this study, we compare honeypot-captured data from 2021 and 2023 to measure the prevalence of compromised passwords in real-world cyberattacks. Specially, we designed and deployed an online SSH honeypot on the cloud server to capture the latest cyber intelligence in the wild. Our findings show that over 90% of brute force attacks involve the use of compromised passwords, indicating a high level of password vulnerability. Additionally, we observe that the effectiveness of strong-password policies in mitigating such attacks appears limited. This study highlights the need for better password security strategies to counter the high prevalence of compromised passwords in cyberattacks.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.