Melecon 2010 - 2010 15th IEEE Mediterranean Electrotechnical Conference 2010
DOI: 10.1109/melcon.2010.5476244
|View full text |Cite
|
Sign up to set email alerts
|

Adapting the Bloom filter to multithreaded environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…On the one hand, we could design more flexible algorithms to build binary fuse filters: e.g., so that they become bulk updatable. On the other hand, we could seek to better document applications where immutable probabilistic filters are best suited: e.g., when the filter is sent over a network, bundled with a front-end or used in a multi-threaded environment where locking is undesirable [18,24].…”
mentioning
confidence: 99%
“…On the one hand, we could design more flexible algorithms to build binary fuse filters: e.g., so that they become bulk updatable. On the other hand, we could seek to better document applications where immutable probabilistic filters are best suited: e.g., when the filter is sent over a network, bundled with a front-end or used in a multi-threaded environment where locking is undesirable [18,24].…”
mentioning
confidence: 99%
“…The expected space overhead for optimal Bloom filters is 44%: it requires setting k = − log ϵ where ϵ is the desired bound on the false-positive probability. Bloom filters can be made concurrent [39].…”
Section: Bloom Filter Variantsmentioning
confidence: 99%
“…To reduce the calculation time and the space of memory to detect the flooding DDoS attack, fthe detection methods using the bloom filter [21], [22] have been investigated [23]- [25]. The bloom filter was first designed by Burton Howard Bloom in 1970 [21] and has since then become a standard and widely used algorithm for a quick set with large sets and/or low memory conditions [22]. Since the bloom filter can reduce disk access frequency, it has been successfully used in various network-related tasks.…”
Section: Mitigation Approachesmentioning
confidence: 99%
“…Moreover, the large memory space for analyzing attack features is needed to execute processes. In order to defect the flooding DDoS attack at once with lightweight space for process, a bloom filter [21], [22] is utilized for the detection of the flooding DDoS attack [23]- [25]. The flooding DDoS attack is detected by recording the IP address into the bloom filter.…”
Section: Introductionmentioning
confidence: 99%