• DocumentCode
    2494688
  • Title

    Aggregated Bloom Filters for Intrusion Detection and Prevention Hardware

  • Author

    Artan, N. Sertac ; Sinkar, Kaustubh ; Patel, Jalpa ; Chao, H. Jonathan

  • Author_Institution
    Polytech. Univ., Brooklyn
  • fYear
    2007
  • fDate
    26-30 Nov. 2007
  • Firstpage
    349
  • Lastpage
    354
  • Abstract
    Bloom Filters (BFs) are fundamental building blocks in various network security applications, where packets from high-speed links are processed using state-of-the-art hardware- based systems. In this paper, we propose Aggregated Bloom Filters (ABFs) to increase the throughput and scalability of BFs. The proposed ABF has two methods to improve average speed and scalability. The first method leverages the query mechanism for hardware BFs. We optimize queries by removing redundant hash calculations and memory accesses. First, to remove redundancy, the hash functions for each query are calculated sequentially. As soon as we have a no match in any of the hash results, the query is immediately abandoned. We then aggregate multiple queries and query a BF with all of these queries in parallel, which maximizes the throughput of the BF. The second method addresses scalability issues regarding the on-chip memory resources. In most applications multiple BFs are required to store many sets with different numbers of elements. These sets may also be too small for the unit memory on-chip. So, most of the memory is left unused, causing low memory utilization. The second method aggregates small distributed BFs to a single BF allowing better on-chip memory utilization. For the application of Network Intrusion Detection and Prevention Systems (NIDPSs), our proposed ABF shows seven-fold improvement in the average query throughput and four times less memory usage.
  • Keywords
    computer networks; cryptography; filtering theory; network-on-chip; query processing; resource allocation; telecommunication security; aggregated bloom filter; hash function; intrusion detection; network security application; on-chip memory resource utilization; prevention hardware; query mechanism; query optimization; Aggregates; Chaos; Computer security; Data security; Data structures; Filters; Hardware; Intrusion detection; Scalability; Throughput;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Global Telecommunications Conference, 2007. GLOBECOM '07. IEEE
  • Conference_Location
    Washington, DC
  • Print_ISBN
    978-1-4244-1042-2
  • Electronic_ISBN
    978-1-4244-1043-9
  • Type

    conf

  • DOI
    10.1109/GLOCOM.2007.72
  • Filename
    4410982