IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications 2007
DOI: 10.1109/infcom.2007.106
|View full text |Cite
|
Sign up to set email alerts
|

Using Online Traffic Statistical Matching for Optimizing Packet Filtering Performance

Abstract: Packet classification plays a critical role in many of the current networking technologies, and efficient yet lightweight packet classification techniques are highly crucial for their successful deployment. Most of the current packet classification techniques exploit the characteristics of classification policies, without considering the traffic behavior in optimizing their search data structures. In this paper, we present novel techniques that utilize traffic characteristics coupled with careful analysis of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 56 publications
(26 citation statements)
references
References 22 publications
0
26
0
Order By: Relevance
“…To overcome this optimization problem, research works (Gupta et al, 2000;Hamed et al, 2006aHamed et al, , 2006bEl-Atawy et al, 2007;Al-Shear et al, 2009) proposed approaches that used statistical structures in optimizing the average packet filtering time. In (Gupta et al, 2000), alphabetic tree was used to reduce the lookup time by only searching packet destination IP addresses against entries in the routing c o m p u t e r s & s e c u r i t y 5 3 ( 2 0 1 5 ) 1 0 9 e1 3 1 table.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…To overcome this optimization problem, research works (Gupta et al, 2000;Hamed et al, 2006aHamed et al, , 2006bEl-Atawy et al, 2007;Al-Shear et al, 2009) proposed approaches that used statistical structures in optimizing the average packet filtering time. In (Gupta et al, 2000), alphabetic tree was used to reduce the lookup time by only searching packet destination IP addresses against entries in the routing c o m p u t e r s & s e c u r i t y 5 3 ( 2 0 1 5 ) 1 0 9 e1 3 1 table.…”
Section: Related Workmentioning
confidence: 99%
“…However the statistical trees were not able to scale well with the number of fields in the IDSs. To solve this problem, the authors in (El-Atawy et al, 2007) proposed a technique that is based on statistics collected from policy segments in order to build Huffman trees that dynamically adapt to the traffic statistics.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, an NIDS evasion method [6] was proposed through algorithmic complexity attacking the rule matching algorithm, making inspection times 1.5 million times slower. In [7], the skewness in network traffic distribution was utilized to yield effective attacks. Recently, attacks based on algorithmic complexity were proposed for Snort [8], [9] and regular expression matching systems [10].…”
Section: B Related Workmentioning
confidence: 99%
“…The clear difference in skewness measure of various traffic and field values between spam and benign traffic is used as fingerprinting for spambots. The skewness distribution of Internet traffic was exploited to enhance filtering in [5], [4].…”
Section: A Measuring Skewness In Traffic Distributionmentioning
confidence: 99%