期刊文献+

数据流重组中Hash-Splay查找算法 被引量:1

Hash-splay search algorithm in data-stream reassembling
下载PDF
导出
摘要 针对高速网络取证目前所面临的问题,围绕提高网络数据流重组效率,在数据流重组算法中分析比较了几种典型的查找算法,并将Hash表和Splay树组合成Hash-Splay查找算法.该算法首先建立Hash表,然后将所有的TCP连接结点分配到各个表项,每个表项用Splay树将该表项的所有连接结点组织起来.查找时,根据连接标识通过Hash函数计算出Hash地址,再对该Hash地址对应的Splay树进行查找,找到后按照Splay树的操作规则进行查找、插入和删除等操作.由于根据连接标识找到对应Splay树的时间开销很小,可以忽略不计,因此Hash-Splay算法的复杂度可以看作是每棵Splay树操作的平均复杂度,算法同时具有Hash表和Splay树的优点,查找效率比Hash表和Splay树的都高. Against problems existed in high-speed network forensics, data-stream reassembling algorithm is discussed in terms of improving performance of reassembling. Combining the merits of hash table and splay tree, Hash-Splay search algorithm is given out based on analysis of several search algorithms to improve performance. Firstly, Hash table is established, and all TCP(transmission control protocol) connection points are assigned to individual table item, Then, all connection points of the table item will be organized with the Splay tree. While searching, the operations such as search, insertion and deletion et al will be based on the splay tree corresponding to a hash address that is acquired by using hash function according to the connection marked flag. Because the time for finding the corresponding splay tree is very small that can be ignored, therefore the Hash-Splay search algorithm's complexity can be regarded as the Splay tree algorithm's complexity. The algorithm has the advantages of Hash table and Splay tree. However, its efficiency is higher than both.
出处 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2008年第A01期47-54,共8页 Journal of Southeast University:Natural Science Edition
关键词 网络取证 数据流重组 高速网络 Hash-Splay查找算法 network forensics data-stream reassembling high-speed network Hash-Splay searchalgorithm
  • 相关文献

参考文献12

  • 1Wooldridge Michael, Jennings Nicholas R. Intelligent agent: theory and practice [J]. Knowledge Engineering Review, 1995, 10(2): 115-152.
  • 2Warren G, Kruse I I, Heiser Jay G. Computer forensics: incident response essentials [M]. Boston: Addison-Wesley Professional, 2001.5-20.
  • 3Carber L. Computer forensics: high-tech law enforcement [J]. Computer, 2001, 34(1): 22-27.
  • 4More H B, Jie W U. Throughput improvement through dynamic load balancing [C]// Proceedings of Creative Technology Transfer-A Global Affair. Miami, FL, USA: IEEE, 1994: 339-342.
  • 5戴江山,肖军模.网络取证研究现状及其发展趋势[J].军事通信技术,2005,26(4):28-32. 被引量:6
  • 6Kruegel C, Valeur F, Vigna G, et al. Stateful intrusion detection for high-speed networks [C]// Proceedings of the IEEE Symposium on Security and Privacy. Washington DC, USA: IEEE CS, 2002: 285-293.
  • 7Keith W R, David D Y. Optimal load balancing and scheduling in a distributed computer system [J]. Journal of the ACM. New York, NY, USA: ACM, 1991: 676-689.
  • 8Coit J, Staniford S, Mcalerney J. Towards faster string matching for intrusion detection or exceeding the speed of snort [C]// DARPA Information Survivability Conference and Exposition (DISCEX II'01) . Washington DC, USA: IEEE CS, 2001: 367-373.
  • 9李飞宇,颜永红,文燕.用ASIC实现TCP数据流的重组和交付[J].电子与封装,2005,5(7):32-35. 被引量:1
  • 10Ross K W. Hash routing for collections of shared web caches [J]. IEEE Network Magazine, 1997, 11(6): 37-44.

二级参考文献10

  • 1L e ig l R.A form a lization of d ig ita l forens ics[].In ternationa l Journa l of D ig ita l Ev idence.2004
  • 2Pa lm er G.A road m ap for d ig ita l forens ics research[]..2001
  • 3T ye B S.A u tom ated ana lys is for d ig ita l forens ic sc ience[]..2002
  • 4S rem ak J C.Form a liz ing com pu ter forens ic ana lys is:a proof-based m ethodo logy[]..2004
  • 5K ruse W G,H e iser J G.Com pu ter forens ics:inc iden t response essen tia ls[]..2001
  • 6Somm er P.Ev idence form cyberspace:dow n loads,logs and captures[].Journa l of F inanc ia l C rim e.2000
  • 7Savage S,W ethera ll D,K arlin A,et a l.N etw ork support for IP traceback[].IEEE/ACM T ransactions on N etw ork.2001
  • 8S tephenson P.M ode ling of post-inc iden t root cause ana lys is[].In ternationa l Journa l of D ig ita l Ev idence.2003
  • 9D ean D,F rank lin M,S tubb lefie ld A.A n a lgebra ic approach to IP traceback[].ACM T ransactions on In form ation andSystem Security.2002
  • 10M ichae l A V.L aw en forcem en t too ls and techno log ies for investigation cyber attack[]..2002

共引文献5

同被引文献4

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部