COMPARATIVE STUDY OF BLOOM FILTER ARCHITECTURES
Keywords:
Bloom filters, network intrusion detection, universal hash function, FPR (False positive rate)
Abstract
Hardware based virus protection systems are required for identifying the malicious content and further removing it from network streams. Network Intrusion Detection System(NIDS) is needed to protect the end user machines from threats. An effective NIDS is therefore a network security system capable of protecting the end user machines well before a threat affects.NIDS requires a space efficient data base for detection of threats in high speed conditions. Bloom Filters are one of the security filters that consume significant power to detect and then filter out malicious content. A Bloom filter is a space efficient randomized data structure for representing a set in order to support membership queries. The aim of this paper is to compare the different architectures of Bloom filter like Standard Bloom filter, pipelined bloom filter, counting Bloom filter and parallel processing architecture of bloom filter in terms of their merits and demerits by using algorithmic
Downloads
- Article PDF
- TEI XML Kaleidoscope (download in zip)* (Beta by AI)
- Lens* NISO JATS XML (Beta by AI)
- HTML Kaleidoscope* (Beta by AI)
- DBK XML Kaleidoscope (download in zip)* (Beta by AI)
- LaTeX pdf Kaleidoscope* (Beta by AI)
- EPUB Kaleidoscope* (Beta by AI)
- MD Kaleidoscope* (Beta by AI)
- FO Kaleidoscope* (Beta by AI)
- BIB Kaleidoscope* (Beta by AI)
- LaTeX Kaleidoscope* (Beta by AI)
How to Cite
Published
2012-03-15
Issue
Section
License
Copyright (c) 2012 Authors and Global Journals Private Limited
This work is licensed under a Creative Commons Attribution 4.0 International License.