期刊文献+

异或和取模运算的负载均衡算法 被引量:2

Load balancing algorithm with modular and exclusive-or arithmetic
下载PDF
导出
摘要 引入信息熵对哈希函数的输入值进行随机度测试,实验证明增加异或字段数并划分字段后进行异或运算能提高运算结果的随机测度值。标识字段有很高的位熵值,函数输入值中加入此值能减少负载迁移次数而运算效率与CRC16接近。采用源IP、目的IP、源端口、目的端口、标识字段作为输入值,并划分为8位的比特串进行异或运算,然后再进行取模运算的双哈希算法运算效率较高而且均衡性好,适合于高速网络环境下的入侵检测。 Information entropy is adopted to consider the input of Hash function. The experimental results show that adding exclusiveor segments and partitioning exclusive-or bytes enhance the random measurement of operation results, reduce the movement of load, and the efficiency is closed to CRC 16 algorithm. Resource IP, destination IP, resource port, destination port and flag segments are regarded as input data, which partitioned eight bit strings are made exclusive-or and then modular operations. The algorithm named as double Hash is efficient and well balanced, and very fitful to intrusion detection systems in high-speed networks.
出处 《计算机工程与设计》 CSCD 北大核心 2007年第6期1290-1291,1483,共3页 Computer Engineering and Design
基金 山西省自然科学基金项目(20041047)
关键词 入侵检测 高速网络 负载均衡 哈希算法 异或 intrusion detection high-speed networks load balancing Hash exclusive-or operation
  • 相关文献

参考文献7

  • 1Kruegel C,Valeur F,Vigna G,et al.Stateful intrusion detection for high-speed networks[C].Washington.DC.USA:Proceedings of the IEEE Symposium on Security and Privacy(SP),IEEE Computer Society,2002.285-293.
  • 2Dittmann G,Herkersdorf A.Network processor load balancing for high-speed links[C].Proceedings of the 2002 International Symposium on Performance Evaluation of Computer and Telecommunication Systems,2002.727-735.
  • 3Charitakis I,Anagnostakis KG,Markatos E.An active traffic splitter architecture for intrusion detection[C].MASCOTS,2003.238-214.
  • 4Cao Z,Wang Z,Zegura E W.Performance of hashing-based schemes for internet load balancing[C].Proceedings of IEEE Infocom,2000.323-341.
  • 5孙钦东,张德运,高鹏,张晓.并行入侵检测系统的负载均衡算法[J].小型微型计算机系统,2004,25(12):2215-2217. 被引量:13
  • 6程光,龚俭,丁伟,徐加羚.面向IP流测量的哈希算法研究[J].软件学报,2005,16(5):652-658. 被引量:54
  • 7MIT Lincoln Laboratory.1999 DARPA intrusion detection testing data-week5[EB/OL].http://www.ll.mit.edu/IST/ideval/data/1999/testing/week5/index.html.

二级参考文献13

  • 1IP Flow information export (ipfix). 2004. http://www.ietf. org/html.charters/ipfix-charter.html
  • 2Thompson K, Miller G, Wilder R. Wide area Internet traffic patterns and characteristics. IEEE Network, 1997,11(6):10-23.
  • 3Cisco Netflow. 2004. http://www.cisco.com/warp/public/732/Tech/nmp/netflow/index.shtml
  • 4Jain R. A comparison of hashing schemes for address lookup in computer networks. IEEE Trans. on Communications, 1992,40(3):1570-1573.
  • 5Cao Z, Wang Z, Zegura E. Performance of hashing-based schemes for Internet load balancing. In: Nokia FB, ed. Proc. of the IEEE INFOCOM 2000. Piscataway: IEEE Computer and Communications Societies, 2000. 332-341.
  • 6Duffield NG, Grossglauser M. Trajectory sampling for direct traffic observation. IEEE/ACM Trans. on Networking, 2001,9(3):280-292.
  • 7NLANR network traffic packet header traces. 2004. http://pma.nlanr.net/Traces/
  • 8Niccolini S, Molina M, Duffield N. Hash functions description for packet selection. 2003. http://www.watersprings.org/pub/id/draft-niccolini-hash-descr-00.txt
  • 9NSS Group. Intrusion detection and vulnerability assessment[R]. Technical Report, NSS, Oakwood House, Wennington, Cambridge shire, UK, 2000.
  • 10Kruegel C, Valeur F, Vigna G, Kemmerer R. Stateful intrusion detection for high-speed networks[C]. Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, 2002, 285-293.

共引文献64

同被引文献9

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部