2004
DOI: 10.1109/mm.2004.1268997
|View full text |Cite
|
Sign up to set email alerts
|

Deep packet inspection using parallel bloom filters

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
221
0
3

Year Published

2008
2008
2018
2018

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 384 publications
(228 citation statements)
references
References 7 publications
0
221
0
3
Order By: Relevance
“…The Bloom filter is widely used in many network applications, such as Web caching, P2P collaboration, network measurements and monitoring, and packet processing. For example, Dharmapurikar et al [34] proposed parallel Bloom filters to significantly improve the performance of DPI. Bonomi et al [4] proposed an approximate concurrent state machine, where d-left hashing and fingerprinting schemes [35] were used to build a stateful Bloom filter, thus achieving fast per-flow state lookups.…”
Section: Related Workmentioning
confidence: 99%
“…The Bloom filter is widely used in many network applications, such as Web caching, P2P collaboration, network measurements and monitoring, and packet processing. For example, Dharmapurikar et al [34] proposed parallel Bloom filters to significantly improve the performance of DPI. Bonomi et al [4] proposed an approximate concurrent state machine, where d-left hashing and fingerprinting schemes [35] were used to build a stateful Bloom filter, thus achieving fast per-flow state lookups.…”
Section: Related Workmentioning
confidence: 99%
“…FPGAs have been proposed to match exact patterns with Bloom filters [13,30,45], CAMs [6,44], or Aho-Corasick automata [11,20,43], and to match regular expressions with direct hardware synthesis [20,28] or DFAs [31]. Most of these solutions are fast enough for use in a Network Intrusion Detection System, which filters incoming traffic at wire speed (several Gbps of throughput), although they usually exhibit a very limited dictionary capacity.…”
Section: Related Workmentioning
confidence: 99%
“…Additionally, Dharmapurikar et al adopted bloom filters (BFs), and Kim et al employed mask filters in the FPGA-based packet inspection [11,19]. However, these two methods only act as filters and have to cooperate with another string matching algorithm to verify a match.…”
Section: Other Approachesmentioning
confidence: 99%