2017
DOI: 10.5573/ieiespc.2017.6.1.027
|View full text |Cite
|
Sign up to set email alerts
|

Multi-match Packet Classification Scheme Combining TCAM with an Algorithmic Approach

Abstract: Packet classification is one of the essential functionalities of Internet routers in providing quality of service. Since the arrival rate of input packets can be tens-of-millions per second, wirespeed packet classification has become one of the most challenging tasks. While traditional packet classification only reports a single matching result, new network applications require multiple matching results. Ternary content-addressable memory (TCAM) has been adopted to solve the multi-match classification problem … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 20 publications
0
1
0
Order By: Relevance
“…In this paper, we evaluate whether the de facto packet classification algorithm widely used in many popular software switches (OVS as our running example) is robust against denial-of-service (DoS) attacks ( §3). Our study has great importance since the targeted packet classification algorithm, namely, Tuple Space Search scheme (TSS) [64], is extensively used not only in traditional appliances but also in wide range of virtualized networked systems; just to name a few, software based intrusion detection systems [43], stateful NAT implementation [33,48], cloud management systems [25,71].…”
Section: Introductionmentioning
confidence: 99%
“…In this paper, we evaluate whether the de facto packet classification algorithm widely used in many popular software switches (OVS as our running example) is robust against denial-of-service (DoS) attacks ( §3). Our study has great importance since the targeted packet classification algorithm, namely, Tuple Space Search scheme (TSS) [64], is extensively used not only in traditional appliances but also in wide range of virtualized networked systems; just to name a few, software based intrusion detection systems [43], stateful NAT implementation [33,48], cloud management systems [25,71].…”
Section: Introductionmentioning
confidence: 99%