当前位置:网站首页>Deep packet inspection using cuckoo filter paper summary
Deep packet inspection using cuckoo filter paper summary
2022-07-26 15:18:00 【Tongqing ice butterfly kiyotaka】
Deep Packet Inspection Using Cuckoo Filter A summary of the paper
Abstract

Less memory consumption , The false alarm rate is low , Higher insertion performance , Higher lookup throughput , Support delete operation
INTRODUCTION

- stay DPI Use in BF The main challenge is the need (k) Additional calculation of hash function
- Even though QF Use only one hash function , but QF The query nature of brings extra slowness .
- Member query data structure Cuckoo filter [11] Has been used as DPI Method , To overcome simultaneous use BF and QF The resulting restrictions
Higher throughput and simpler to implement than using both Bloom and Quotient filters.
More accurate because Cuckoo filter has less false positive rate than both Bloom and Quotient filters.
Consuming less memory than using both Bloom and Quotient filters.
Less memory accesses than using both BF and QF.
Higher throughput and simpler to implement than using both Bloom and Quotient filters.
More accurate because Cuckoo filter has less false positive rate than both Bloom and Quotient filters.
Consuming less memory than using both Bloom and uotient filters.
Less memory accesses than using both BF and QF.
REALATED WORKS
Consequently, in this paper a Cuckoo filter that support delete operation has been used and employed in a DPI approach to get better results than employing both BF and QF.
CUCKOO FILTER

See this article for details : QCF for deep packet inspection A summary of the paper
Insertion process

Lookup process

Deletion process

Mapping signatures into CF

Architecture of the proposed approach

- Map all predefined signatures to CF
- Take the incoming packet as input , Specify the size of the search window .
- Traverse the bytes of all packets , The algorithm queries CF To check all bytes , To find interested (iinteresting) Any appearance of the string
- There is any match , The algorithm will take appropriate actions and stop searching immediately , Wait for the next packet , And so on
- otherwise , If the end of the packet has been reached , But not with CF matching , Then the packet will be forwarded to its original destination .
Proposed DPI approach

EVALUATION
Insertion throughput

False positive rate

Query throughput

Memory accesses
DPI time improvement

Deletion throughput

CONCLUSION

- Support frequent signature set updates
- Consume less memory
- Greater insertion throughput
- Higher discovery performance
- Support deletion and lower false positive rate
边栏推荐
- R语言ggplot2可视化:可视化折线图、使用aes函数中的group参数为不同分组可视化折线图
- Prometheus adds email alarm and enterprise wechat robot alarm
- JMeter distributed
- pytorch---进阶篇(函数使用技巧/注意事项)
- Crystal special decoration submitted for registration: the first quarter revenue fell by 80%, and Chen Bo controlled 68.5% of the equity
- 持续集成(二)Jenkins基本使用介绍
- Deep Packet Inspection Using Quotient Filter论文总结
- Postman environment variable setting code storage
- 晶品特装递交注册:第一季营收降80% 陈波控制68.5%股权
- Prometheus adds redis and MySQL node monitoring
猜你喜欢

采购实用技巧,5个瓶颈物料的采购方法

Double the efficiency of dual screen collaboration lingyao x dual screen Pro leads the new trend of dual screen technology

如何查找国内各大学本科学位论文?

JMeter distributed

QCF for deep packet inspection论文总结

QCF for deep packet inspection paper summary

The practice of software R & D should start from the design

Cs224w (Figure machine learning) 2021 winter course learning notes 5

FOC电机控制基础

筑牢生态安全防线,广州开展突发环境事件应急演练
随机推荐
How much help does solid state disk have for game operation
【留点代码】将transformer运用到目标检测上来,通过debug了解模型的模型运算流程
示波器的使用
有哪些科研人员看文献必用的软件?
DICOM学习资料收集
【五分钟Paper】基于参数化动作空间的强化学习
Advanced Qt development: how to fit the window width and height when displaying (fitwidth+fitheight)
Yifang biological fell 16% on the first day of listing: the company's market value was 8.8 billion, and Hillhouse and Lilly were shareholders
OSPF and mGRE experiments
The civil construction of the whole line of Guangzhou Metro Line 13 phase II has been completed by 53%, and it is expected to open next year
SharkTeam发布2022年第二季度Web3安全态势感知报告
二叉树的创建以及遍历
Everything is available Cassandra: the fairy database behind Huawei tag
R语言ggplot2可视化:可视化折线图、使用aes函数中的group参数为不同分组可视化折线图
Notes (5)
Environment regulation system based on Internet of things (esp32-c3+onenet+ wechat applet)
Operation method of abbkine elikine human alpha fetoprotein (AFP) ELISA quantitative Kit
Parallel d-Pipeline: A Cuckoo Hashing Implementation for Increased Throughput论文总结
带你熟悉云网络的“电话簿”:DNS
USB转串口参数配置功能